Deck 13: Internet and Distributed Application Services
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/93
Play
Full screen (f)
Deck 13: Internet and Distributed Application Services
1
With P2P architecture, there are more potential bottlenecks and points of failure.
False
2
LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).
True
3
HTTPS is the "secure" version of HTTP
True
4
A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
5
Every IP packet carries the destination node's IP address.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
6
There is a standard objectclass or attribute name for all entities and resources common to most directories, such as people and shared printers.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
7
Active Directory is based on LDAP and DNS, so it responds to standard LDAP information requests and uses LDAP concepts, such as objectclasses and OUs, to store and organize directory information hierarchically.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
8
Three-layer architecture simplifies distributing or replicating application software across a network.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
9
Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
10
A server hosts a single service or resource.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
11
HTML extends XML to describe the structure, format, and content of documents.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
12
The client/server architectural model can be applied in many ways.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
13
Every network attached to the Internet has at least one server designated as a DNS server.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
14
In large networks, responsibility for maintaining directory content and answering queries is centralized to a few individuals who manage the network.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
15
A server manages system resources and provides access to these resources through a well-defined communication interface.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
16
A port number is an unsigned 24-bit integer
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
17
Static connections are easy to initialize and maintain.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
18
As OSs have evolved, they have incorporated fewer and fewer middleware functions.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
19
An operating system's primary role is to manage hardware, software, and data resources.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
20
LDAP queries contain plaintext characters and the syntax is simple and straight forward.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
21
With ____, a resource user asks for a resource, and if it isn't found in the local resource registry, the resource locator searches for it in external locations.
A) static connections
B) fixed connections
C) dynamic connections
D) mapped connections
A) static connections
B) fixed connections
C) dynamic connections
D) mapped connections
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
22
In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.
A) model
B) view
C) controller
D) presentation
A) model
B) view
C) controller
D) presentation
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
23
Vendor lock-in risk rises with PaaS because the vendor provides system software components in addition to hardware.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
24
Distributing parts of an information system across many computer systems and locations is called ____.
A) distributed computing
B) local computing
C) parallel computing
D) linear computing
A) distributed computing
B) local computing
C) parallel computing
D) linear computing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
25
Three current distribution modes that fit in the cloud computing paradigm are support as a service, platform as a service and infrastructure as a service.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
26
Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
A) protocol stack
B) system stack
C) conversion stack
D) application stack
A) protocol stack
B) system stack
C) conversion stack
D) application stack
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
27
____ are composed of software components distributed across many computer systems and geographic locations.
A) Information processes
B) Information systems
C) Information networks
D) Information controls
A) Information processes
B) Information systems
C) Information networks
D) Information controls
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
28
The risk of vendor lock-in is lower with SaaS because most vendors use similar virtualization environments.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
29
SMTP and MIME are protocols that enable a user on one Internet host to interact with the OS command layer of another Internet host.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
30
In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.
A) network map registry
B) local resource registry
C) system resource registry
D) remote resource registry
A) network map registry
B) local resource registry
C) system resource registry
D) remote resource registry
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
31
SaaS has substantial benefits from a consumer perspective.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
32
Users access Web applications via a URL.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
33
Vendor lock-in is a recent phenomenon with the advent of SaaS.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.
A) DNS
B) DHCP
C) BOOTP
D) WINS
A) DNS
B) DHCP
C) BOOTP
D) WINS
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
35
Data- and graphics-intensive applications can use ordinary Internet connections as part of SaaS.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
36
____ is a method of organizing software to provide and access distributed information and computing resources.
A) monolithic architecture
B) unified architecture
C) master/slave architecture
D) client/server architecture
A) monolithic architecture
B) unified architecture
C) master/slave architecture
D) client/server architecture
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
37
IaaS can be structured for only part of an application's infrastructure requirements.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
38
In ____ architecture, the roles of client and server are combined into a single application or group of related applications.
A) client/server
B) monolithic
C) peer-to-peer
D) unified
A) client/server
B) monolithic
C) peer-to-peer
D) unified
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
39
Before accessing a remote resource, a user or system administrator must know the server and resource names to create a ____.
A) dynamic connection
B) local connection
C) mapped connection
D) static connection
A) dynamic connection
B) local connection
C) mapped connection
D) static connection
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
40
A web browser can pass parameters to a script on a Web server using the RPC protocol.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
41
____, a Microsoft specification for component interoperability, has its roots in older Microsoft specifications, including Object Linking and Embedding (OLE) and the Component Object Model (COM).
A) CORBA
B) Enterprise Java Beans
C) .Net
D) Component Object Model Plus
A) CORBA
B) Enterprise Java Beans
C) .Net
D) Component Object Model Plus
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
42
All objects in an LDAP schema have a(n) ____ attribute.
A) objectclass
B) distinguished name
C) objectType
D) common name
A) objectclass
B) distinguished name
C) objectType
D) common name
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
43
____ specifies the middleware objects use to interact across networks.
A) COM+
B) LDAP
C) CIFS
D) CORBA
A) COM+
B) LDAP
C) CIFS
D) CORBA
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
44
A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.
A) map
B) pipe
C) socket
D) process
A) map
B) pipe
C) socket
D) process
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
45
____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.
A) XML-RPC
B) Simple Object Access Protocol
C) OLE
D) HTTP
A) XML-RPC
B) Simple Object Access Protocol
C) OLE
D) HTTP
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ____ describes rights granted or denied to users, groups, and computers for accessing resources in Active Directory.
A) access control list
B) access control entry
C) token
D) access control token
A) access control list
B) access control entry
C) token
D) access control token
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
47
Under ____, e-mail messages are held on the server temporarily, downloaded to the client when a connection is established, and deleted from the server as soon as the download is finished.
A) IMAP
B) POP3
C) SMTP
D) NNTP
A) IMAP
B) POP3
C) SMTP
D) NNTP
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.
A) object
B) bean
C) component
D) resource
A) object
B) bean
C) component
D) resource
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
49
Active Directory clients rely on a ____ to locate Active Directory servers.
A) WINS server
B) DHCP server
C) BOOTP server
D) DNS server
A) WINS server
B) DHCP server
C) BOOTP server
D) DNS server
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
50
SMTP was extended by the ____ protocol to allow including nontext files in e-mail messages.
A) Multimedia Internet Mail Extensions
B) Multiple Internet Mail Extensions
C) Multipurpose Internet Mail Extensions
D) Multiuse Internet Mail Extensions
A) Multimedia Internet Mail Extensions
B) Multiple Internet Mail Extensions
C) Multipurpose Internet Mail Extensions
D) Multiuse Internet Mail Extensions
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
51
In CORBA, ____ is a component message-passing protocol.
A) Internet Inter-ORB Protocol
B) Local Inter-ORB Protocol
C) SOAP
D) XML-RPC
A) Internet Inter-ORB Protocol
B) Local Inter-ORB Protocol
C) SOAP
D) XML-RPC
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
52
____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program.
A) Sockets
B) Packets
C) Pipes
D) Procedures
A) Sockets
B) Packets
C) Pipes
D) Procedures
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
53
Microsoft ____ is the directory service and security system built into Windows Server.
A) Directory Services
B) Open Directory
C) Active Directory
D) Network Directory
A) Directory Services
B) Open Directory
C) Active Directory
D) Network Directory
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
54
Web resources are identified by a unique ____.
A) Uniform Resource Leverage
B) Uniform Resource Locator
C) Uniform Resource Link
D) Uniform Resource Path
A) Uniform Resource Leverage
B) Uniform Resource Locator
C) Uniform Resource Link
D) Uniform Resource Path
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
55
In CORBA, ____ is a service that maintains a component directory and routes messages between components.
A) Object Reference Broker
B) Object Request Broker
C) Object Resource Broker
D) Object Repair Broker
A) Object Reference Broker
B) Object Request Broker
C) Object Resource Broker
D) Object Repair Broker
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
56
____ enable developers to create user interfaces that run on a server but interact with a client Web browser or component.
A) JavaServer Beans
B) Enterprise Java Beans
C) JavaServer Faces
D) JavaFX
A) JavaServer Beans
B) Enterprise Java Beans
C) JavaServer Faces
D) JavaFX
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
57
____ is an improved version of Telnet that encrypts data flowing between client and server to address a major security issue in Telnet.
A) Secure Shell
B) FTP
C) Kerberos
D) DCE
A) Secure Shell
B) FTP
C) Kerberos
D) DCE
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
58
In an LDAP directory, a(n) ____ defines the attributes common to all member objects.
A) distinguished name
B) common name
C) objectType
D) objectclass
A) distinguished name
B) common name
C) objectType
D) objectclass
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
59
With the ____ protocol, a process on one machine can call a process on another machine.
A) Remote Activation Call
B) Remote Procedure Call
C) Remote Execution Call
D) Remote Calling Convention
A) Remote Activation Call
B) Remote Procedure Call
C) Remote Execution Call
D) Remote Calling Convention
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
60
The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.
A) registration services
B) directory services
C) network services
D) configuration services
A) registration services
B) directory services
C) network services
D) configuration services
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
61
The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer's information system.
A) PaaS
B) IaaS
C) SaaS
D) AaaS
A) PaaS
B) IaaS
C) SaaS
D) AaaS
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
62
The term ____________________ describes software that "glues" together parts of a client/server or multitier application.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
63
An LDAP ____________________ stores information about LDAP objects.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is a secure version of HTTP that encrypts HTTP requests and responses.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
65
In static resource connections, the ____________________ acts as a router for resource access requests arriving from local and remote users and application programs.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
66
Web resources are identified and accessed via a(n) ____________________.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
67
In a three-layer architecture, the ____________________ layer carries out the rules and procedures of business processing.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
68
A(n) ____________________ pipe is a pipe with two additional features including a name that's permanently placed in a file system directory and the capability to communicate between processes on different computers.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
69
When a named pipe is created, a(n) ____________________ is also created in the local file system.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is a unique combination of an IP address and a port number, separated by a colon.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
71
The term ____ summarizes recent coarse-grained approaches to distributing and accessing software and hardware services across the Internet.
A) cloud computing
B) distributed computing
C) platform computing
D) shared computing
A) cloud computing
B) distributed computing
C) platform computing
D) shared computing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
72
LDAP objects are organized in a(n) ____________________ directory structure.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
73
A(n) ____________________ uses the communication interface to request resources, and the server responds to these requests.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
74
____ is a key supporting technology in IaaS because it enables a customer / user to configure application and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.
A) Hardware virtualization
B) Software virtualization
C) Network virtualization
D) System virtualization
A) Hardware virtualization
B) Software virtualization
C) Network virtualization
D) System virtualization
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
75
____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.
A) Platform as a service
B) Infrastructure as a service
C) System as a service
D) Software as a service
A) Platform as a service
B) Infrastructure as a service
C) System as a service
D) Software as a service
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
76
A distinguished name (DN) attribute uniquely identifies an object in a(n) ____________________.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
77
A network ____________________ is a computer's doorway to external resources, such as Web sites and applications, databases, shared files and folders, and shared I/O devices.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
78
____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.
A) Software as a service
B) Platform as a service
C) Infrastructure as a service
D) Application as a service
A) Software as a service
B) Platform as a service
C) Infrastructure as a service
D) Application as a service
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
79
In a three-layer architecture, the ____________________ layer manages stored data, usually in databases.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ extends HTML to describe the structure, format, and content of documents.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck