Deck 3: Managing the Information Systems Infrastructure and Services

ملء الشاشة (f)
exit full mode
سؤال
Governmental regulations such as the ________ Act mandate archiving business documents and relevant internal communication,including e-mail and instant messages.

A) Glass-Steagall
B) Sarbanes-Oxley
C) Robinson-Patman
D) Celler-Kefauver
E) Taft-Hartley
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The operating system of a computer is an example of ________ software.

A) system
B) open source
C) transitory
D) peripheral
E) application
سؤال
Which of the following statements is true about servers?

A) They are used to provide services to users within large organizations or to Web users.
B) They are primarily used as the main, central computing system for major corporations.
C) They are used primarily to assist in solving massive scientific problems.
D) They are optimized for visualization and rendering of three-dimensional models.
E) They are used for personal computing and small business computing.
سؤال
Application software helps to automate business processes,and it enables processes that would otherwise not even be possible.
سؤال
Which of the following statements is true of an intranet?

A) It secures proprietary information stored within the corporate local area network.
B) It is easily accessible to the public.
C) It can be used to access advertorial information.
D) It can be used by anyone with an Internet connection.
E) It cannot be accessed by using virtual private networks.
سؤال
Which of the following general classes of computers designed for medical,engineering,or animation and graphics design uses is optimized for visualization and rendering of three-dimensional models,and typically have fast processors,large memory,and advanced video cards?

A) mainframes
B) supercomputers
C) workstations
D) servers
E) personal computers
سؤال
Which of the following is an example of an operating system?

A) Safari
B) Microsoft Office
C) Mozilla Firefox
D) Ubuntu Linux
E) Microsoft Surface
سؤال
With respect to the general classes of computers,a ________ is used for small business computing.

A) workstation
B) personal computer
C) mainframe computer
D) server
E) supercomputer
سؤال
The most prominent type of system software,the ________,coordinates the interaction between hardware components,peripherals,application software,and users.

A) random-access memory
B) operating system
C) read-only memory
D) base station
E) point to point protocol
سؤال
Operating systems are often written in ________,a very low-level computer programming language that allows the computer to operate quickly and efficiently.

A) structured query language
B) hypertext markup language
C) assembly language
D) extensible markup language
E) practical extraction and report language
سؤال
Information systems infrastructure consists of hardware,system software,storage,networking,and data centers.
سؤال
With respect to the five general classes of computers,a ________ is typically used for scientific research.

A) mainframe computer
B) workstation
C) supercomputer
D) microcomputer
E) server
سؤال
With respect to the five general classes of computers,________ are typically used for mission critical applications,such as transaction processing.

A) workstations
B) supercomputers
C) servers
D) mainframes
E) personal computers
سؤال
________ software is the collection of programs that control the basic operations of computer hardware.

A) Application
B) Transitory
C) System
D) Open source
E) Peripheral
سؤال
With respect to the general classes of computers,a ________ is very large and is used primarily as the main,central computing system for major corporations.

A) personal computer
B) supercomputer
C) server
D) mainframe computer
E) workstation
سؤال
A fundamental component of the IS infrastructure is the ________,that is,the computers that run the applications and databases necessary for processing transactions or analyzing business data.

A) protocol
B) archival storage
C) hardware
D) system software
E) data center
سؤال
Which of the following tasks is performed by application software?

A) printing documents
B) writing a business letter
C) presenting information via a monitor
D) updating the system clock
E) saving data to a disk
سؤال
Which of the following is a difference between a server and a workstation?

A) A workstation has fast network connectivity when compared to a server.
B) A workstation is used primarily as the main, central computing system for major corporations.
C) A workstation has high reliability when compared to a server.
D) A workstation has more memory and more disk storage when compared to a server.
E) A workstation is typically used by one user at a time.
سؤال
With respect to the general classes of computers,a ________ is the most expensive and most powerful kind of computer,which is used primarily to assist in solving massive scientific problems.

A) supercomputer
B) workstation
C) mainframe computer
D) server
E) personal computer
سؤال
With respect to the general classes of computers,a ________ is any computer on a network that makes access to files,printing,communications,and other services available to users of the network.

A) workstation
B) server
C) personal computer
D) supercomputer
E) mainframe
سؤال
Bandwidth is measured in ________.

A) moles per second
B) joules per second
C) parts per million
D) bits per second
E) relays per second
سؤال
________ define the procedures that different computers follow when they transmit and receive data.

A) Consoles
B) Keyloggers
C) Protocols
D) Hosts
E) Hypertexts
سؤال
Which of the following statements is true about a Uniform Resource Locator?

A) It is used to locate specific information in a Web page.
B) It is used to identify and locate a particular Web page.
C) It is a protocol that helps Web servers store Web pages.
D) It is a standard method for specifying the format of Web pages.
E) It is a software application used to display the features of a Web page.
سؤال
The ".com" suffix in a uniform resource locater is reserved for ________.

A) non-profit organizations
B) commercial organizations
C) network organizations
D) government entities
E) educational organizations
سؤال
With respect to computer networking,________ refers to the physical pathway-cable(s)and wireless-used to carry network information.

A) multiplatform
B) transmission control protocol
C) random-access memory
D) traceroute
E) transmission media
سؤال
________ networks enable any computer or device on the network to provide and request services.All members of the network have equivalent capabilities and responsibilities.

A) Server-centric
B) Server-to-peer
C) Client-to-peer
D) Peer-to-peer
E) Client-centric
سؤال
Which of the following storage methods is used for storing long-term copies of organizational data?

A) archival
B) backup
C) operational
D) translational
E) protocol
سؤال
A hypertext document is otherwise known as a ________.

A) Web page
B) Web host
C) Web ring
D) Webmaster
E) Web consortium
سؤال
With regard to the World Wide Web,Web pages are stored on ________.

A) Web consoles
B) Web rings
C) Web consortiums
D) Web servers
E) Web hosts
سؤال
The ________ is a system of interlinked documents on the Internet,or a graphical user interface to the Internet that provides users with a simple,consistent interface to access a wide variety of information.

A) private branch exchange
B) World Wide Web
C) point to point protocol
D) Media Access Control Address
E) parameter random access memory
سؤال
With respect to computer networks,________ are also referred to as Wi-Fi networks.

A) storage area networks
B) wireless body sensor networks
C) wireless local area networks
D) campus area networks
E) personal area networks
سؤال
Which of the following features of the Web contains not only information but also references or links to other documents?

A) proxy server
B) Web ring
C) hypertext
D) codec
E) domain name
سؤال
A ________ is any computer that may both request and provide services.

A) console
B) client
C) peer
D) host
E) port
سؤال
A ________ is any computer on the network,or any software application,that uses only the services provided by the server.

A) peer
B) client
C) host
D) console
E) port
سؤال
Web servers process user requests for pages using the ________.

A) Hypertext Transfer Protocol
B) TOC Protocol
C) Address Resolution Protocol
D) Dynamic Host Configuration Protocol
E) Trivial File Transfer Protocol
سؤال
Which of the following computer networks is used for providing wireless communication between devices,using technologies such as Bluetooth?

A) personal area network
B) storage area network
C) campus area network
D) metropolitan area network
E) body sensor network
سؤال
With respect to computer networks,a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps.

A) personal area
B) metropolitan area
C) wide area
D) campus area
E) local area
سؤال
The standard method of specifying the format of Web pages is called ________.

A) Structured Query Language (SQL)
B) Practical Extraction and Report Language (PERL)
C) Extensible Markup Language (XML)
D) Assembly Language (AL)
E) Hypertext Markup Language (HTML)
سؤال
________ is the transmission capacity of a computer or communications channel,which represents how much binary data can be reliably transmitted over the medium in one second.

A) Latency
B) Data buffer
C) Bandwidth
D) Jitter
E) Codec
سؤال
A ________ is a software application that can be used to locate and display Web pages,including text,graphics,and multimedia content.

A) Webcam
B) keylogger
C) proxy server
D) Web browser
E) Webmaster
سؤال
Which of the following is likely to have the suffix ".org" after the domain name in its URL?

A) The Red Cross Society
B) Starbucks
C) The Federal Bureau of Investigation
D) McDonalds
E) Harvard Business School
سؤال
Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.

A) collocation facilities
B) multi-bay stations
C) serial port facilities
D) data ease facilities
E) datahub stations
سؤال
Workstations are optimized for access by many concurrent users and therefore have more advanced microprocessors,more memory,a larger cache,and more disk storage than single-user computers.
سؤال
Which of the following is the host name in the URL "labs.google.co.in/jack carver"?

A) labs
B) google
C) co
D) in
E) jack carver
سؤال
Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home.

A) near-me area
B) metropolitan area
C) virtual private
D) body sensor
E) storage area
سؤال
The suffix ".org" is reserved for ________.

A) governmental entities
B) commercial organizations
C) network organizations
D) educational institutions
E) non-profit organizations
سؤال
The easiest way to understand computer networking is through the human communication model.
سؤال
The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
سؤال
The application software used for various business processes can directly interact with the various types of computer hardware.
سؤال
In a URL,the ________ is the particular Web server or group of Web servers (if it is a larger Web site)that will respond to the Web request.

A) domain name
B) host name
C) client name
D) top-level domain name
E) port name
سؤال
Networking hardware and software facilitate the interconnection of different computers,enabling collaboration within organizations,across organizations,and literally around the world.
سؤال
The fundamental information units of computers are called relays.
سؤال
The protocol used by the Internet is called the ________.

A) Transmission Control Protocol (TCP)
B) Dynamic Host Configuration Protocol (DHCP)
C) Address Resolution Protocol (ARP)
D) Trivial File Transfer Protocol (TFTP)
E) TOC protocol
سؤال
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

A) Yahoo!
B) UNICEF
C) The Federal Reserve
D) Harvard Business School
E) America Online
سؤال
Which of the following is likely to have the suffix ".com" after the domain name in its URL?

A) UNICEF
B) The Federal Reserve
C) Microsoft
D) The World Wide Fund for Nature
E) Massachusetts Institute of Technology
سؤال
Which of the following statements is true about an IP address?

A) The format of an IP address is a 64-bit numeric address.
B) It is written as eight numbers separated by periods.
C) Each number separated by periods can have any number between 0 and 999.
D) It can be used to navigate to particular Web addresses.
E) It is written as a number with a period at the end.
سؤال
The name "Internet" is derived from the concept of wireless networking.
سؤال
A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users.

A) Web ring
B) static Web site
C) firewall
D) proxy server
E) Web page
سؤال
A supercomputer is primarily used as the main,central computing system for major corporations.
سؤال
Transmission media refers to the physical pathway used to carry network information.
سؤال
Which of the following statements is true about the software as a service model?

A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
B) The customer has to manage the licenses for the operating systems being used.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) The customer is provided with the basic capabilities of processing, storage, and networking.
E) The user has control over the applications but has limited or no control over the underlying infrastructure.
سؤال
As defined by the National Institute of Standards and Technology (NIST),"________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction."

A) Green computing
B) Social networking
C) Internetworking
D) Web phishing
E) Cloud computing
سؤال
Which of the following occurred in the 1964-1990 generation of computing?

A) The mainframe era began.
B) The personal computer era ended and interpersonal computing began.
C) The mainframe era ended and the personal computer era began.
D) The interpersonal computing era ended and the internetworking era began.
E) The internetworking era ended.
سؤال
List and explain the different components of a network.
سؤال
Briefly describe system software.
سؤال
Under the ________ model,organizations "rent" resources such as processing,data storage,or networking from an external provider on an as-needed basis and pay only for the services used.

A) cluster computing
B) grid computing
C) distributed computing
D) utility computing
E) parallel computing
سؤال
Why aren't IP addresses normally used to navigate Web addresses instead of domain names?
سؤال
Which of the following occurred in the 1958-1964 generation of computing?

A) The internetworking era began.
B) The personal computer era expanded.
C) The interpersonal computing era ended.
D) The interpersonal computing era began.
E) The mainframe era expanded.
سؤال
Which of the following statements is true about a public cloud?

A) It gives an organization a high degree of customizability over its data and applications.
B) It can be used by any interested party on a pay-per-use basis.
C) It is internal to an organization.
D) It does not free an organization from the issues associated with managing the cloud infrastructure.
E) It gives an organization a high degree of control over its data and applications.
سؤال
Manufacturers of hardware and software often apply the concept of planned obsolescence,meaning that ________.

A) the companies have already decided when to launch their next product
B) the product is designed in such a way as to extend its life span
C) the product is designed to last only for a certain life span
D) the product is designed to avoid obsolescence
E) the companies do not enter markets that have the risk of product obsolescence
سؤال
The prediction that the number of transistors on a chip would double about every two years is known as ________.

A) Megan's law
B) Ashby's law
C) Murphy's law
D) Metcalfe's law
E) Moore's law
سؤال
With respect to the domain name,the suffix ".com" is reserved for network organizations.
سؤال
Which of the following occurred in the 1990-2000 generation of computing?

A) The mainframe era began.
B) The personal computer era ended and the interpersonal computing era began.
C) The mainframe era ended and the personal computer era began.
D) The interpersonal computing era ended and the internetworking era began.
E) The internetworking era ended.
سؤال
Briefly explain Moore's law.
سؤال
Which of the following statements is true about the infrastructure as a service model?

A) The customer has to manage the licenses for the operating systems being used.
B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) The customer does not have to manage operating system licenses.
E) The user has control over the applications but has limited or no control over the underlying infrastructure.
سؤال
Describe the different classes of computers.
سؤال
The ability to adapt to increases or decreases in demand for processing or data storage is known as ________.

A) extensibility
B) portability
C) reliability
D) scalability
E) usability
سؤال
Which of the following occurred in the 1946-1958 generation of computing?

A) The interpersonal computing era ended and the internetworking era began.
B) The internetworking era ended.
C) The mainframe era began.
D) The mainframe era ended and the personal computer era began.
E) The personal computer era ended and the interpersonal computing era began.
سؤال
Briefly explain the history of computing.
سؤال
Which of the following statements is true about the platform as a service model?

A) The customer is provided with the basic capabilities of processing, storage, and networking.
B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) Only the basic capabilities of processing, storage, and networking are provided.
E) The customer has to manage the licenses for the operating systems being used.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/99
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Managing the Information Systems Infrastructure and Services
1
Governmental regulations such as the ________ Act mandate archiving business documents and relevant internal communication,including e-mail and instant messages.

A) Glass-Steagall
B) Sarbanes-Oxley
C) Robinson-Patman
D) Celler-Kefauver
E) Taft-Hartley
B
2
The operating system of a computer is an example of ________ software.

A) system
B) open source
C) transitory
D) peripheral
E) application
A
3
Which of the following statements is true about servers?

A) They are used to provide services to users within large organizations or to Web users.
B) They are primarily used as the main, central computing system for major corporations.
C) They are used primarily to assist in solving massive scientific problems.
D) They are optimized for visualization and rendering of three-dimensional models.
E) They are used for personal computing and small business computing.
A
4
Application software helps to automate business processes,and it enables processes that would otherwise not even be possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following statements is true of an intranet?

A) It secures proprietary information stored within the corporate local area network.
B) It is easily accessible to the public.
C) It can be used to access advertorial information.
D) It can be used by anyone with an Internet connection.
E) It cannot be accessed by using virtual private networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following general classes of computers designed for medical,engineering,or animation and graphics design uses is optimized for visualization and rendering of three-dimensional models,and typically have fast processors,large memory,and advanced video cards?

A) mainframes
B) supercomputers
C) workstations
D) servers
E) personal computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is an example of an operating system?

A) Safari
B) Microsoft Office
C) Mozilla Firefox
D) Ubuntu Linux
E) Microsoft Surface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
8
With respect to the general classes of computers,a ________ is used for small business computing.

A) workstation
B) personal computer
C) mainframe computer
D) server
E) supercomputer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
9
The most prominent type of system software,the ________,coordinates the interaction between hardware components,peripherals,application software,and users.

A) random-access memory
B) operating system
C) read-only memory
D) base station
E) point to point protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
10
Operating systems are often written in ________,a very low-level computer programming language that allows the computer to operate quickly and efficiently.

A) structured query language
B) hypertext markup language
C) assembly language
D) extensible markup language
E) practical extraction and report language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
11
Information systems infrastructure consists of hardware,system software,storage,networking,and data centers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
12
With respect to the five general classes of computers,a ________ is typically used for scientific research.

A) mainframe computer
B) workstation
C) supercomputer
D) microcomputer
E) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
13
With respect to the five general classes of computers,________ are typically used for mission critical applications,such as transaction processing.

A) workstations
B) supercomputers
C) servers
D) mainframes
E) personal computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ software is the collection of programs that control the basic operations of computer hardware.

A) Application
B) Transitory
C) System
D) Open source
E) Peripheral
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
15
With respect to the general classes of computers,a ________ is very large and is used primarily as the main,central computing system for major corporations.

A) personal computer
B) supercomputer
C) server
D) mainframe computer
E) workstation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
16
A fundamental component of the IS infrastructure is the ________,that is,the computers that run the applications and databases necessary for processing transactions or analyzing business data.

A) protocol
B) archival storage
C) hardware
D) system software
E) data center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following tasks is performed by application software?

A) printing documents
B) writing a business letter
C) presenting information via a monitor
D) updating the system clock
E) saving data to a disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is a difference between a server and a workstation?

A) A workstation has fast network connectivity when compared to a server.
B) A workstation is used primarily as the main, central computing system for major corporations.
C) A workstation has high reliability when compared to a server.
D) A workstation has more memory and more disk storage when compared to a server.
E) A workstation is typically used by one user at a time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
19
With respect to the general classes of computers,a ________ is the most expensive and most powerful kind of computer,which is used primarily to assist in solving massive scientific problems.

A) supercomputer
B) workstation
C) mainframe computer
D) server
E) personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
20
With respect to the general classes of computers,a ________ is any computer on a network that makes access to files,printing,communications,and other services available to users of the network.

A) workstation
B) server
C) personal computer
D) supercomputer
E) mainframe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
21
Bandwidth is measured in ________.

A) moles per second
B) joules per second
C) parts per million
D) bits per second
E) relays per second
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ define the procedures that different computers follow when they transmit and receive data.

A) Consoles
B) Keyloggers
C) Protocols
D) Hosts
E) Hypertexts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following statements is true about a Uniform Resource Locator?

A) It is used to locate specific information in a Web page.
B) It is used to identify and locate a particular Web page.
C) It is a protocol that helps Web servers store Web pages.
D) It is a standard method for specifying the format of Web pages.
E) It is a software application used to display the features of a Web page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ".com" suffix in a uniform resource locater is reserved for ________.

A) non-profit organizations
B) commercial organizations
C) network organizations
D) government entities
E) educational organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
25
With respect to computer networking,________ refers to the physical pathway-cable(s)and wireless-used to carry network information.

A) multiplatform
B) transmission control protocol
C) random-access memory
D) traceroute
E) transmission media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ networks enable any computer or device on the network to provide and request services.All members of the network have equivalent capabilities and responsibilities.

A) Server-centric
B) Server-to-peer
C) Client-to-peer
D) Peer-to-peer
E) Client-centric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following storage methods is used for storing long-term copies of organizational data?

A) archival
B) backup
C) operational
D) translational
E) protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
28
A hypertext document is otherwise known as a ________.

A) Web page
B) Web host
C) Web ring
D) Webmaster
E) Web consortium
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
29
With regard to the World Wide Web,Web pages are stored on ________.

A) Web consoles
B) Web rings
C) Web consortiums
D) Web servers
E) Web hosts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ________ is a system of interlinked documents on the Internet,or a graphical user interface to the Internet that provides users with a simple,consistent interface to access a wide variety of information.

A) private branch exchange
B) World Wide Web
C) point to point protocol
D) Media Access Control Address
E) parameter random access memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
31
With respect to computer networks,________ are also referred to as Wi-Fi networks.

A) storage area networks
B) wireless body sensor networks
C) wireless local area networks
D) campus area networks
E) personal area networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following features of the Web contains not only information but also references or links to other documents?

A) proxy server
B) Web ring
C) hypertext
D) codec
E) domain name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ________ is any computer that may both request and provide services.

A) console
B) client
C) peer
D) host
E) port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ________ is any computer on the network,or any software application,that uses only the services provided by the server.

A) peer
B) client
C) host
D) console
E) port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
35
Web servers process user requests for pages using the ________.

A) Hypertext Transfer Protocol
B) TOC Protocol
C) Address Resolution Protocol
D) Dynamic Host Configuration Protocol
E) Trivial File Transfer Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following computer networks is used for providing wireless communication between devices,using technologies such as Bluetooth?

A) personal area network
B) storage area network
C) campus area network
D) metropolitan area network
E) body sensor network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
37
With respect to computer networks,a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps.

A) personal area
B) metropolitan area
C) wide area
D) campus area
E) local area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
38
The standard method of specifying the format of Web pages is called ________.

A) Structured Query Language (SQL)
B) Practical Extraction and Report Language (PERL)
C) Extensible Markup Language (XML)
D) Assembly Language (AL)
E) Hypertext Markup Language (HTML)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ is the transmission capacity of a computer or communications channel,which represents how much binary data can be reliably transmitted over the medium in one second.

A) Latency
B) Data buffer
C) Bandwidth
D) Jitter
E) Codec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ________ is a software application that can be used to locate and display Web pages,including text,graphics,and multimedia content.

A) Webcam
B) keylogger
C) proxy server
D) Web browser
E) Webmaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following is likely to have the suffix ".org" after the domain name in its URL?

A) The Red Cross Society
B) Starbucks
C) The Federal Bureau of Investigation
D) McDonalds
E) Harvard Business School
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
42
Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.

A) collocation facilities
B) multi-bay stations
C) serial port facilities
D) data ease facilities
E) datahub stations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
43
Workstations are optimized for access by many concurrent users and therefore have more advanced microprocessors,more memory,a larger cache,and more disk storage than single-user computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is the host name in the URL "labs.google.co.in/jack carver"?

A) labs
B) google
C) co
D) in
E) jack carver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
45
Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home.

A) near-me area
B) metropolitan area
C) virtual private
D) body sensor
E) storage area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
46
The suffix ".org" is reserved for ________.

A) governmental entities
B) commercial organizations
C) network organizations
D) educational institutions
E) non-profit organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
47
The easiest way to understand computer networking is through the human communication model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
48
The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
49
The application software used for various business processes can directly interact with the various types of computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
50
In a URL,the ________ is the particular Web server or group of Web servers (if it is a larger Web site)that will respond to the Web request.

A) domain name
B) host name
C) client name
D) top-level domain name
E) port name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
51
Networking hardware and software facilitate the interconnection of different computers,enabling collaboration within organizations,across organizations,and literally around the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
52
The fundamental information units of computers are called relays.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
53
The protocol used by the Internet is called the ________.

A) Transmission Control Protocol (TCP)
B) Dynamic Host Configuration Protocol (DHCP)
C) Address Resolution Protocol (ARP)
D) Trivial File Transfer Protocol (TFTP)
E) TOC protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

A) Yahoo!
B) UNICEF
C) The Federal Reserve
D) Harvard Business School
E) America Online
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is likely to have the suffix ".com" after the domain name in its URL?

A) UNICEF
B) The Federal Reserve
C) Microsoft
D) The World Wide Fund for Nature
E) Massachusetts Institute of Technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following statements is true about an IP address?

A) The format of an IP address is a 64-bit numeric address.
B) It is written as eight numbers separated by periods.
C) Each number separated by periods can have any number between 0 and 999.
D) It can be used to navigate to particular Web addresses.
E) It is written as a number with a period at the end.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
57
The name "Internet" is derived from the concept of wireless networking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
58
A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users.

A) Web ring
B) static Web site
C) firewall
D) proxy server
E) Web page
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
59
A supercomputer is primarily used as the main,central computing system for major corporations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
60
Transmission media refers to the physical pathway used to carry network information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following statements is true about the software as a service model?

A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
B) The customer has to manage the licenses for the operating systems being used.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) The customer is provided with the basic capabilities of processing, storage, and networking.
E) The user has control over the applications but has limited or no control over the underlying infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
62
As defined by the National Institute of Standards and Technology (NIST),"________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction."

A) Green computing
B) Social networking
C) Internetworking
D) Web phishing
E) Cloud computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following occurred in the 1964-1990 generation of computing?

A) The mainframe era began.
B) The personal computer era ended and interpersonal computing began.
C) The mainframe era ended and the personal computer era began.
D) The interpersonal computing era ended and the internetworking era began.
E) The internetworking era ended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
64
List and explain the different components of a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
65
Briefly describe system software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
66
Under the ________ model,organizations "rent" resources such as processing,data storage,or networking from an external provider on an as-needed basis and pay only for the services used.

A) cluster computing
B) grid computing
C) distributed computing
D) utility computing
E) parallel computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
67
Why aren't IP addresses normally used to navigate Web addresses instead of domain names?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following occurred in the 1958-1964 generation of computing?

A) The internetworking era began.
B) The personal computer era expanded.
C) The interpersonal computing era ended.
D) The interpersonal computing era began.
E) The mainframe era expanded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following statements is true about a public cloud?

A) It gives an organization a high degree of customizability over its data and applications.
B) It can be used by any interested party on a pay-per-use basis.
C) It is internal to an organization.
D) It does not free an organization from the issues associated with managing the cloud infrastructure.
E) It gives an organization a high degree of control over its data and applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
70
Manufacturers of hardware and software often apply the concept of planned obsolescence,meaning that ________.

A) the companies have already decided when to launch their next product
B) the product is designed in such a way as to extend its life span
C) the product is designed to last only for a certain life span
D) the product is designed to avoid obsolescence
E) the companies do not enter markets that have the risk of product obsolescence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
71
The prediction that the number of transistors on a chip would double about every two years is known as ________.

A) Megan's law
B) Ashby's law
C) Murphy's law
D) Metcalfe's law
E) Moore's law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
72
With respect to the domain name,the suffix ".com" is reserved for network organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following occurred in the 1990-2000 generation of computing?

A) The mainframe era began.
B) The personal computer era ended and the interpersonal computing era began.
C) The mainframe era ended and the personal computer era began.
D) The interpersonal computing era ended and the internetworking era began.
E) The internetworking era ended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
74
Briefly explain Moore's law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following statements is true about the infrastructure as a service model?

A) The customer has to manage the licenses for the operating systems being used.
B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) The customer does not have to manage operating system licenses.
E) The user has control over the applications but has limited or no control over the underlying infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
76
Describe the different classes of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
77
The ability to adapt to increases or decreases in demand for processing or data storage is known as ________.

A) extensibility
B) portability
C) reliability
D) scalability
E) usability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following occurred in the 1946-1958 generation of computing?

A) The interpersonal computing era ended and the internetworking era began.
B) The internetworking era ended.
C) The mainframe era began.
D) The mainframe era ended and the personal computer era began.
E) The personal computer era ended and the interpersonal computing era began.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
79
Briefly explain the history of computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following statements is true about the platform as a service model?

A) The customer is provided with the basic capabilities of processing, storage, and networking.
B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
D) Only the basic capabilities of processing, storage, and networking are provided.
E) The customer has to manage the licenses for the operating systems being used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.