Deck 2: Application Layer

ملء الشاشة (f)
exit full mode
سؤال
All three parts (request line,request header,request body)of an HTTP request from a web browser to a web server are required when a request is made.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.
سؤال
A cluster is a group of computers that are linked together so they act as a one computer.
سؤال
The four general functions of any application program are: data storage,data access logic,application logic and presentation logic.
سؤال
Middleware is the software that sits between the application software on the client and the application software on the server.
سؤال
In a client-server network,the presentation logic is the responsibility of the client computer.
سؤال
In the three-tier architecture,the software on the client computer is responsible for the presentation logic,an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
سؤال
A "thin client" approach places most of the application logic on the client.
سؤال
Host-based and client-based networks are similar in that the client computer performs most of the work.
سؤال
The World Wide Web was conceived at University of Utah as part of the development of the Internet.
سؤال
The earliest data communications networks were client-server networks.
سؤال
A request header for an HTTP request starts with a command,such as GET,and ends with the HTTP version number that the browser understands.
سؤال
The standard protocol for communication between a Web browser and a Web server is the web protocol.
سؤال
As the demand for more and more network applications grow; host-based computing becomes the best solution.
سؤال
The two functions of middleware are to: 1)provide a standard way of communicating that can translate between software from different vendors,and 2)manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.
سؤال
To use the Web,each client computer requires a data link layer software package called a Web browser.
سؤال
A network computer is designed primarily to communicate using Internet based standards,but has no hard disk.It has only limited functionality.
سؤال
The application architecture called the distributed computing model uses the "thick" client approach.
سؤال
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.
سؤال
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.
سؤال
The two-tier e-mail architecture does not require any application software on the client computer.
سؤال
________ is the presentation of information to the user and the acceptance of the user's commands.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
سؤال
An application program function is __________,or the processing required to access data.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
سؤال
The fundamental problem in client-based networks is that all data on the server must travel to the client for processing
سؤال
A(n)__________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.

A) anonymous FTP
B) data access logic
C) fat client
D) application architecture
E) response status architecture
سؤال
One underlying problem with a host-based network is that:

A) there are economies of scale because all computer resources are centralized
B) the server can get overloaded since it must process all messages
C) the architecture is relatively simple and works well
D) the server is the one point of control which simplifies security
E) clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
سؤال
______________,or the algorithms or business logic programmed into the application,can be simple or complex depending on the application.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
سؤال
Which of the following is not the type of computer commonly used as a server:

A) personal computer
B) network computer
C) handheld
D) mainframe computer
سؤال
_________ is an application program function that deals with storing and retrieving data.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
سؤال
Which of the following is not true a dumb terminal:

A) it has a monitor, keyboard and no CPU
B) all the processing takes place on the host computer.
C) it does not participate in the processing of the data it displays
D) you can install your latest application software on it.
E) it is basically an input/output device.
سؤال
A _____________ is the type of computer you use in your home and is the most common type of client today.

A) personal computer
B) mainframe
C) handheld
D) cluster
E) transaction terminal
سؤال
Which of the following is not a general function by any application program?

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
سؤال
A ________ is a group of computers linked together so that they act as one computer.

A) workstation
B) transaction terminal
C) cluster
D) network computer
E) transaction terminal
سؤال
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously,and storing extremely large amounts of data.

A) workstation
B) transaction terminal
C) cluster
D) mainframe
E) personal computer
سؤال
The Simple Mail Transfer Protocol is the least commonly used e-mail standard.
سؤال
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
سؤال
A ________ is a group of computers linked together so that they act as one computer.

A) handheld
B) mainframe
C) network computer
D) cluster
E) transaction terminal
سؤال
With a client-based network,one fundamental problem is that:

A) the clients each must store all the data
B) the server does not have any data storage capability
C) the host or server must perform presentation logic, application logic, and data access logic at the same time
D) all data on the server must travel to the client for processing
E) the clients must perform the data storage logic
سؤال
With the two-tier client-server architecture,the client is responsible for the ________ logic and the server is responsible for the ________ logic.

A) Application; presentation
B) Presentation; data access
C) Data access; presentation
D) Application; data access
E) Presentation; application storage
سؤال
Using the POP standard for client to server e-mail communication,the e-mail messages remain on the server computer.
سؤال
With respect to costs for a client-server network,which of the following is true?

A) Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power.
B) More network capacity, which costs more money, is required for client-server networks than for client-based networks.
C) Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
D) Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client.
E) None of the above
سؤال
In a client-server network,_________ gets software from different vendors to work together.

A) a front-end processor
B) serverware
C) middleware
D) centerware
E) programmer
سؤال
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

A) Hypertext Transfer Protocol
B) File Transfer Protocol
C) Simple Mail Transfer Protocol
D) Internet Message Access Protocol
E) Hyperlink Transfer Protocol.
سؤال
A "thin client" architecture approach:

A) always is a two-tier network architecture
B) always is an n-tiered architecture
C) places all or almost all of the application logic on the client
D) places all or almost all of the application logic on the server
E) refers to the size of the cable connecting the clients to the network
سؤال
How are the application architecture functions split up in a client-server network?

A) the presentation logic and data storage are on the client, while the data access logic is on the server
B) the data storage, data access, and presentation logic are on the client
C) the presentation logic is on the client, while the data storage and data access logic are on the server
D) the data storage and data access logic are on the client, while the presentation logic are on the server
E) the presentation logic and data access logic are on the client, and the data storage is on the server
سؤال
To get a page from the Web,a user must type in a URL,which stands for:

A) Unknown Resource Locator
B) Unknown Router Location
C) Uniform Router Location
D) Uniform Resource Locator
E) Uniform Resource Library
سؤال
Marc Andreessen led a team that developed the first graphical Web browser,which was called:

A) Internet Explorer
B) Mosaic
C) Firebird
D) Netscape Navigator
E) Mozilla
سؤال
To interact with the World Wide Web,a client computer needs an application layer software package called a:

A) Web browser
B) Web server
C) Telnet package
D) Uniform Resource Locator package
E) Router package
سؤال
In the three tier architecture the software on the client computer is responsible for____________.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) application storage
سؤال
There are required and optional parts of an HTTP response.They are:

A) response status, response header, response body
B) response address, response header, response body
C) response status, response body
D) response address, response header
E) response status, response header
سؤال
There are optional and required parts of an HTTP request.They are:

A) request address, request body
B) request address, request header, request body
C) request line, request header
D) request line, request body
E) request line, request header, request body
سؤال
With the "thin client" architecture,when an application changes,only the _________ with the application logic needs to be updated.

A) client
B) server
C) middleware
D) hardware
E) software
سؤال
A(n)_________-tiered architecture uses only two sets of computers:one set of clients and one set of servers.

A) one
B) two
C) three
D) five
E) n
سؤال
____________ is not an important middleware standard.

A) CORBA (Common Object Request Broker Architecture
B) Distributed Computed Environment (DCE)
C) Asynchronous Transfer Mode (ATM)
D) Open Database Connectivity (ODBC)
E) none of the above is an appropriate answer
سؤال
Each server on a network that needs to act as a web server needs an application layer software package called a (n)______________.

A) browser
B) application web
C) web server
D) operating system
E) none of the above
سؤال
Client-server architectures:

A) cannot connect computers that use different hardware
B) are one of the least used network architectures today
C) can use middleware to provide a standard way of communicating between software from more than one vendor
D) assign the responsibility for the presentation logic to the server
E) were the earliest type of network architectures
سؤال
A "thick client" architecture approach:

A) always is a two-tier network architecture
B) always is an n-tiered architecture
C) places all or almost all of the application logic on the client
D) places all or almost all of the application logic on the server
E) refers to the size of the cable connecting the clients to the network
سؤال
One disadvantage of the ____________ architecture is that places a greater load on the network.

A) two-tier
B) three tier
C) one-tier
D) n-tier
E) layered
سؤال
An N-tiered architecture:

A) is generally more "scalable" than a three-tiered architecture
B) is generally less "scalable" than a three-tiered architecture
C) uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data
D) uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers
E) puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
سؤال
The idea for a special hypertext network,called the World Wide Web,was conceived of by:

A) Microsoft in 1994 as part of the Windows 95 project
B) Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
C) Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET
D) Howard Flieshman of IBM in 1982 as part of the development of the IBM PC
E) the University of Minnesota as an extension of Gopher
سؤال
The acronym,MIME,refers to:

A) Multimedia Internet Mail Enterprise
B) Multiple Internet Media Extension
C) Multipurpose Internet Mail Extension
D) Media Internet Mail Extension
E) Multimedia Internet Mime Extension
سؤال
In a host-based system with a mainframe,upgrades to the host are _____________.

A) Small
B) Cheap
C) Lumpy
D) Never going to happen
E) Always performed annually
سؤال
What do the following tools enable you to do: the Web,email,Telnet,IM?
سؤال
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.

A) broadcasting
B) instant messaging
C) webcasting
D) H.323
E) Net Meeting.
سؤال
Another term for a user agent is:

A) message transfer agent
B) router agent
C) e-mail client
D) Webcast package
E) Web client
سؤال
A response status code of 404 means:

A) the requested page was not found
B) the server is currently unavailable
C) the sever is currently busy
D) your browser is incompatible with the Web server software.
E) your browser needs to be updated to the latest version.
سؤال
Which of the following is not a user agent package?

A) Outlook Express
B) Microsoft Word
C) Fedora
D) Netscape Messenger
E) Microsoft Outlook
سؤال
In a two-tier client-server architecture,a client computer needs to use an application layer software package called a ________________ to send e-mail:

A) message transfer agent
B) router agent
C) user agent
D) Webcast package
E) gateway agent
سؤال
In a ___________ architecture,computers are both client and server,thus sharing the work.

A) Host-based
B) Client-based
C) Client-server
D) Peer-to-peer
E) Network
سؤال
The acronym,HTML,refers to:

A) Header Markup Language
B) Hypertext Markup Locator
C) Hypertext Markup Language
D) Hypertext Markup Library
E) Hypertext Modulating Language
سؤال
The standards H.320,H.323,and MPEG-2 are commonly used with

A) Telnet
B) Videoconferencing
C) Email
D) IM
E) Microsoft Office
سؤال
With a _____________,one computer acts as several servers.

A) Mainframe
B) Virtual server
C) Terminal
D) Network computer
E) Transaction terminal
سؤال
The fastest growing form of videoconferencing is

A) mainframe
B) Outlook
C) Telnet
D) webcasting
E) desktop
سؤال
The most commonly used e-mail standard is:

A) Simple Mail Transfer Protocol
B) X.400
C) CMC
D) Post Office Protocol
E) Telnet
سؤال
IMAP (Internet Message Access Protocol):

A) is a set of standards that define how email is to be processed between mail servers
B) is exactly the same as SMTP
C) copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server
D) is exactly the same as POP
E) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
سؤال
One of the most frequently used Telnet applications is

A) WS-FTP
B) PuTTY
C) Outlook
D) Word
سؤال
Which of the following is not true about Telnet?

A) Telnet requires an application layer program on the client computer and an application layer program on the server or host computer.
B) Telnet poses no security threat.
C) Telnet was designed in the early days of the Internet.
D) You are using a host-based architecture with Telnet.
E) One program that conforms to the Telnet standard is EWAN.
سؤال
Describe the history of the Internet and the Web (part of this is in Chapter 1,part in Chapter 2).Where do you forsee the future evolution of the Internet heading,and why?
سؤال
The software that runs on the mail server is referred to as the____________

A) Mail transfer agent
B) Mail user agent
C) Microsoft Outlook
D) Web server
E) SMTP
سؤال
Which of the following is not an advantage of instant messaging?

A) It usually takes days for an IM message to be delivered to the recipient.
B) It allows real time typed messages to be exchanged.
C) Some products are ICQ and AOL Instant Messenger.
D) It is generally faster than snail-mail.
E) It helps people avoid telephone tag.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Application Layer
1
All three parts (request line,request header,request body)of an HTTP request from a web browser to a web server are required when a request is made.
False
2
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.
False
3
A cluster is a group of computers that are linked together so they act as a one computer.
True
4
The four general functions of any application program are: data storage,data access logic,application logic and presentation logic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Middleware is the software that sits between the application software on the client and the application software on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a client-server network,the presentation logic is the responsibility of the client computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the three-tier architecture,the software on the client computer is responsible for the presentation logic,an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
A "thin client" approach places most of the application logic on the client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Host-based and client-based networks are similar in that the client computer performs most of the work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
The World Wide Web was conceived at University of Utah as part of the development of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
The earliest data communications networks were client-server networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
A request header for an HTTP request starts with a command,such as GET,and ends with the HTTP version number that the browser understands.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
The standard protocol for communication between a Web browser and a Web server is the web protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
As the demand for more and more network applications grow; host-based computing becomes the best solution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
The two functions of middleware are to: 1)provide a standard way of communicating that can translate between software from different vendors,and 2)manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
To use the Web,each client computer requires a data link layer software package called a Web browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
A network computer is designed primarily to communicate using Internet based standards,but has no hard disk.It has only limited functionality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
The application architecture called the distributed computing model uses the "thick" client approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
The two-tier e-mail architecture does not require any application software on the client computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ is the presentation of information to the user and the acceptance of the user's commands.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
An application program function is __________,or the processing required to access data.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
The fundamental problem in client-based networks is that all data on the server must travel to the client for processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n)__________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.

A) anonymous FTP
B) data access logic
C) fat client
D) application architecture
E) response status architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
One underlying problem with a host-based network is that:

A) there are economies of scale because all computer resources are centralized
B) the server can get overloaded since it must process all messages
C) the architecture is relatively simple and works well
D) the server is the one point of control which simplifies security
E) clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
______________,or the algorithms or business logic programmed into the application,can be simple or complex depending on the application.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is not the type of computer commonly used as a server:

A) personal computer
B) network computer
C) handheld
D) mainframe computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
_________ is an application program function that deals with storing and retrieving data.

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is not true a dumb terminal:

A) it has a monitor, keyboard and no CPU
B) all the processing takes place on the host computer.
C) it does not participate in the processing of the data it displays
D) you can install your latest application software on it.
E) it is basically an input/output device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
A _____________ is the type of computer you use in your home and is the most common type of client today.

A) personal computer
B) mainframe
C) handheld
D) cluster
E) transaction terminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is not a general function by any application program?

A) data storage
B) data access logic
C) application logic
D) presentation logic
E) application access storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ________ is a group of computers linked together so that they act as one computer.

A) workstation
B) transaction terminal
C) cluster
D) network computer
E) transaction terminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously,and storing extremely large amounts of data.

A) workstation
B) transaction terminal
C) cluster
D) mainframe
E) personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
The Simple Mail Transfer Protocol is the least commonly used e-mail standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ________ is a group of computers linked together so that they act as one computer.

A) handheld
B) mainframe
C) network computer
D) cluster
E) transaction terminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
With a client-based network,one fundamental problem is that:

A) the clients each must store all the data
B) the server does not have any data storage capability
C) the host or server must perform presentation logic, application logic, and data access logic at the same time
D) all data on the server must travel to the client for processing
E) the clients must perform the data storage logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
With the two-tier client-server architecture,the client is responsible for the ________ logic and the server is responsible for the ________ logic.

A) Application; presentation
B) Presentation; data access
C) Data access; presentation
D) Application; data access
E) Presentation; application storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
Using the POP standard for client to server e-mail communication,the e-mail messages remain on the server computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
With respect to costs for a client-server network,which of the following is true?

A) Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power.
B) More network capacity, which costs more money, is required for client-server networks than for client-based networks.
C) Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
D) Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client.
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
In a client-server network,_________ gets software from different vendors to work together.

A) a front-end processor
B) serverware
C) middleware
D) centerware
E) programmer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

A) Hypertext Transfer Protocol
B) File Transfer Protocol
C) Simple Mail Transfer Protocol
D) Internet Message Access Protocol
E) Hyperlink Transfer Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
A "thin client" architecture approach:

A) always is a two-tier network architecture
B) always is an n-tiered architecture
C) places all or almost all of the application logic on the client
D) places all or almost all of the application logic on the server
E) refers to the size of the cable connecting the clients to the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
How are the application architecture functions split up in a client-server network?

A) the presentation logic and data storage are on the client, while the data access logic is on the server
B) the data storage, data access, and presentation logic are on the client
C) the presentation logic is on the client, while the data storage and data access logic are on the server
D) the data storage and data access logic are on the client, while the presentation logic are on the server
E) the presentation logic and data access logic are on the client, and the data storage is on the server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
To get a page from the Web,a user must type in a URL,which stands for:

A) Unknown Resource Locator
B) Unknown Router Location
C) Uniform Router Location
D) Uniform Resource Locator
E) Uniform Resource Library
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
Marc Andreessen led a team that developed the first graphical Web browser,which was called:

A) Internet Explorer
B) Mosaic
C) Firebird
D) Netscape Navigator
E) Mozilla
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
To interact with the World Wide Web,a client computer needs an application layer software package called a:

A) Web browser
B) Web server
C) Telnet package
D) Uniform Resource Locator package
E) Router package
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
In the three tier architecture the software on the client computer is responsible for____________.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) application storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
There are required and optional parts of an HTTP response.They are:

A) response status, response header, response body
B) response address, response header, response body
C) response status, response body
D) response address, response header
E) response status, response header
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
There are optional and required parts of an HTTP request.They are:

A) request address, request body
B) request address, request header, request body
C) request line, request header
D) request line, request body
E) request line, request header, request body
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
With the "thin client" architecture,when an application changes,only the _________ with the application logic needs to be updated.

A) client
B) server
C) middleware
D) hardware
E) software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
A(n)_________-tiered architecture uses only two sets of computers:one set of clients and one set of servers.

A) one
B) two
C) three
D) five
E) n
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
____________ is not an important middleware standard.

A) CORBA (Common Object Request Broker Architecture
B) Distributed Computed Environment (DCE)
C) Asynchronous Transfer Mode (ATM)
D) Open Database Connectivity (ODBC)
E) none of the above is an appropriate answer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
Each server on a network that needs to act as a web server needs an application layer software package called a (n)______________.

A) browser
B) application web
C) web server
D) operating system
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
Client-server architectures:

A) cannot connect computers that use different hardware
B) are one of the least used network architectures today
C) can use middleware to provide a standard way of communicating between software from more than one vendor
D) assign the responsibility for the presentation logic to the server
E) were the earliest type of network architectures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
A "thick client" architecture approach:

A) always is a two-tier network architecture
B) always is an n-tiered architecture
C) places all or almost all of the application logic on the client
D) places all or almost all of the application logic on the server
E) refers to the size of the cable connecting the clients to the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
One disadvantage of the ____________ architecture is that places a greater load on the network.

A) two-tier
B) three tier
C) one-tier
D) n-tier
E) layered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
An N-tiered architecture:

A) is generally more "scalable" than a three-tiered architecture
B) is generally less "scalable" than a three-tiered architecture
C) uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data
D) uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers
E) puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
The idea for a special hypertext network,called the World Wide Web,was conceived of by:

A) Microsoft in 1994 as part of the Windows 95 project
B) Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
C) Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET
D) Howard Flieshman of IBM in 1982 as part of the development of the IBM PC
E) the University of Minnesota as an extension of Gopher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
The acronym,MIME,refers to:

A) Multimedia Internet Mail Enterprise
B) Multiple Internet Media Extension
C) Multipurpose Internet Mail Extension
D) Media Internet Mail Extension
E) Multimedia Internet Mime Extension
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
In a host-based system with a mainframe,upgrades to the host are _____________.

A) Small
B) Cheap
C) Lumpy
D) Never going to happen
E) Always performed annually
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
What do the following tools enable you to do: the Web,email,Telnet,IM?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.

A) broadcasting
B) instant messaging
C) webcasting
D) H.323
E) Net Meeting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Another term for a user agent is:

A) message transfer agent
B) router agent
C) e-mail client
D) Webcast package
E) Web client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
A response status code of 404 means:

A) the requested page was not found
B) the server is currently unavailable
C) the sever is currently busy
D) your browser is incompatible with the Web server software.
E) your browser needs to be updated to the latest version.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following is not a user agent package?

A) Outlook Express
B) Microsoft Word
C) Fedora
D) Netscape Messenger
E) Microsoft Outlook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
In a two-tier client-server architecture,a client computer needs to use an application layer software package called a ________________ to send e-mail:

A) message transfer agent
B) router agent
C) user agent
D) Webcast package
E) gateway agent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
In a ___________ architecture,computers are both client and server,thus sharing the work.

A) Host-based
B) Client-based
C) Client-server
D) Peer-to-peer
E) Network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
The acronym,HTML,refers to:

A) Header Markup Language
B) Hypertext Markup Locator
C) Hypertext Markup Language
D) Hypertext Markup Library
E) Hypertext Modulating Language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
The standards H.320,H.323,and MPEG-2 are commonly used with

A) Telnet
B) Videoconferencing
C) Email
D) IM
E) Microsoft Office
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
With a _____________,one computer acts as several servers.

A) Mainframe
B) Virtual server
C) Terminal
D) Network computer
E) Transaction terminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
The fastest growing form of videoconferencing is

A) mainframe
B) Outlook
C) Telnet
D) webcasting
E) desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
The most commonly used e-mail standard is:

A) Simple Mail Transfer Protocol
B) X.400
C) CMC
D) Post Office Protocol
E) Telnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
IMAP (Internet Message Access Protocol):

A) is a set of standards that define how email is to be processed between mail servers
B) is exactly the same as SMTP
C) copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server
D) is exactly the same as POP
E) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
One of the most frequently used Telnet applications is

A) WS-FTP
B) PuTTY
C) Outlook
D) Word
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is not true about Telnet?

A) Telnet requires an application layer program on the client computer and an application layer program on the server or host computer.
B) Telnet poses no security threat.
C) Telnet was designed in the early days of the Internet.
D) You are using a host-based architecture with Telnet.
E) One program that conforms to the Telnet standard is EWAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
Describe the history of the Internet and the Web (part of this is in Chapter 1,part in Chapter 2).Where do you forsee the future evolution of the Internet heading,and why?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
The software that runs on the mail server is referred to as the____________

A) Mail transfer agent
B) Mail user agent
C) Microsoft Outlook
D) Web server
E) SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following is not an advantage of instant messaging?

A) It usually takes days for an IM message to be delivered to the recipient.
B) It allows real time typed messages to be exchanged.
C) Some products are ICQ and AOL Instant Messenger.
D) It is generally faster than snail-mail.
E) It helps people avoid telephone tag.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.