Networking Chapter 2
____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer
Asynchronous Transfer Mode (ATM)
The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language
Hypertext Markup Language
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol.
Hypertext Transfer Protocol
With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS
IaaS
Which of the following is not an advantage of instant messaging? a. It usually takes days for an IM message to be delivered to the recipient. b. It allows real time typed messages to be exchanged. c. Some products are ICQ and AOL Instant Messenger. d. It is generally faster than snail-mail. e. It helps people avoid telephone tag.
It usually takes days for an IM message to be delivered to the recipient.
In a host-based system with a mainframe, upgrades to the host are _____________. a. Small b. Cheap c. Lumpy d. Never going to happen e. Always performed annually
Lumpy
The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP
Mail transfer agent
Which of the following is not an example of a mail user agent software package? a. Outlook Express b. Microsoft Word c. Eudora d. Microsoft Outlook e. All of these are mail user agent packages
Microsoft Word
Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla
Mosaic
The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension
Multipurpose Internet Mail Extension
In a ___________ architecture, computers are both client and server, thus sharing the work. a. Host-based b. Client-based c. Client-server d. Peer-to-peer e. Network
Peer-to-peer
One of the most frequently used Telnet applications is a. WS-FTP b. PuTTY c. Outlook d. Word e. FTP
PuTTY
The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet
Simple Mail Transfer Protocol
Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY.
Telnet poses no security threat.
The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher
Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library
Uniform Resource Locator
The standards H.320, H.323, and MPEG-2 are commonly used with a. Telnet b. Videoconferencing c. Email d. IM e. Microsoft Office
Videoconferencing
To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package
Web browser
With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic
all data on the server must travel to the client for processing
Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application access storage
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture
application architecture
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application logic
Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures
can use middleware to provide a standard way of communicating between software from more than one vendor
The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. a. private b. public c. community d. hybrid
community
What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression
compression
With the two-tier client-server architecture, the server is responsible for the ________ logic. a. application b. presentation c. data access d. session e. physical
data access
An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
data access logic
_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
data storage
Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client
e-mail client
An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
is generally more "scalable" than a three-tiered architecture
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent
mail user agent
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer
mainframe
In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer
middleware
One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered
n-tier
IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the client
A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the server
With the two-tier client-server architecture, the client is responsible for the ________ logic. a. session b. presentation c. data access d. data storage e. networking
presentation
In the three tier architecture, the software on the client computer is responsible for the ____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage
presentation logic
________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
presentation logic
The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid
private
There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body
request line, request header, request body
There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header
response status, response header, response body
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software
server
A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal
server farm
How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server
the presentation logic is on the client, while the data storage and data access logic are on the server
A response status code of 404 means: a. the requested page was not found b. the server is currently unavailable c. the sever is currently busy d. your browser is incompatible with the Web server software. e. your browser needs to be updated to the latest version.
the requested page was not found
One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
the server can get overloaded since it must process all messages
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n
two
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above
web server
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.
webcasting