Filters
Question type

Study Flashcards

Describe the three-tier architecture for Web applications such as e-commerce.

Correct Answer

verifed

verified

The three-tier architecture is an arrang...

View Answer

A ________ is a cloud that is owned and operated by an organization for its own benefit.


A) private cloud
B) virtual private network
C) wide area network
D) service as a cloud

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is an example of IaaS?


A) Apple iCloud
B) Microsoft Azure
C) Office 365
D) Amazon S3

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Identify a characteristic that is a disadvantage of cloud-based hosting.


A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.


A) megabytes
B) megabits
C) kilobytes
D) kilobits

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A URL consists of a protocol followed by a domain name or public IP address.

A) True
B) False

Correct Answer

verifed

verified

To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping.

A) True
B) False

Correct Answer

verifed

verified

In cloud computing, resources are said to be "pooled" because organizations ________.


A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is an example of PaaS?


A) Apple iCloud
B) Amazon S3
C) Oracle On Demand
D) Office 365

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is a computer network? What are the various types of networks?

Correct Answer

verifed

verified

A computer network is a collection of co...

View Answer

The connection between a VPN client and a VPN server is called a(n) ________.


A) data highway
B) hyperlink
C) tunnel
D) access point

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

ftp is the protocol used mainly for email transmissions.

A) True
B) False

Correct Answer

verifed

verified

________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead.


A) WSDL
B) SOAP
C) JSON
D) XML

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Discuss TCP/IP Protocol Architecture, and define Internet protocols.

Correct Answer

verifed

verified

The basic plumbing of the Internet is go...

View Answer

Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.

A) True
B) False

Correct Answer

verifed

verified

What is a virtual private network (VPN)? Explain how VPNs ensure the security of transmissions.

Correct Answer

verifed

verified

A virtual private network (VPN)uses the ...

View Answer

With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.

A) True
B) False

Correct Answer

verifed

verified

For communications equipment, k stands for ________.


A) 1000
B) 1024
C) 100
D) 1042

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The committee that addresses LAN standards is called ICANN.

A) True
B) False

Correct Answer

verifed

verified

Which of the following protocols guarantees secure data transmission?


A) http
B) ftp
C) https
D) smtp

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer