Deck 20: Network and Cloud Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 20: Network and Cloud Technology
1
Which of the following is the protocol commonly used for wireless LAN?
A) IEEE 802.11
B) LISTSERV
C) DSL
D) IEEE 802.3
A) IEEE 802.11
B) LISTSERV
C) DSL
D) IEEE 802.3
A
2
Which of the following statements is true of digital subscriber lines (DSLs)?
A) DSLs use television lines for data transmission.
B) Their signals do not interfere with voice telephone service.
C) Digital subscriber lines use standard protocols.
D) DSL services and speed are standardized across applications.
A) DSLs use television lines for data transmission.
B) Their signals do not interfere with voice telephone service.
C) Digital subscriber lines use standard protocols.
D) DSL services and speed are standardized across applications.
B
3
Which of the following protocols is commonly used by wired LAN?
A) IEEE 802.3
B) DSL
C) EVDO
D) WiMax
A) IEEE 802.3
B) DSL
C) EVDO
D) WiMax
A
4
Which of the following statements is true of an ISP?
A) It separates the phone signals from computer signals on a DSL at every user's location.
B) It facilitates a one-way information transfer process between the user's computer and the Internet.
C) It provides free access to the Internet.
D) It serves as a user's gateway to the Internet.
A) It separates the phone signals from computer signals on a DSL at every user's location.
B) It facilitates a one-way information transfer process between the user's computer and the Internet.
C) It provides free access to the Internet.
D) It serves as a user's gateway to the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements about LAN protocols is true?
A) LAN protocols are determined by the ISPs.
B) The IEEE 802.11 protocol is also called Ethernet.
C) Wired LANs use IEEE 802.11 protocol.
D) The IEEE 802.3 protocol specifies only hardware characteristics.
A) LAN protocols are determined by the ISPs.
B) The IEEE 802.11 protocol is also called Ethernet.
C) Wired LANs use IEEE 802.11 protocol.
D) The IEEE 802.3 protocol specifies only hardware characteristics.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
A ________ is used to provide seamless flow of data across networks.
A) layered protocol
B) database
C) Web page
D) commerce server
A) layered protocol
B) database
C) Web page
D) commerce server
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements best defines an IP address?
A) It is a protocol that specifies the format of Web pages.
B) It is a number that identifies a particular device.
C) It is a piece of a message that is handled by programs that implement internet protocol.
D) It is a program that breaks up network traffic into pieces before transmission.
A) It is a protocol that specifies the format of Web pages.
B) It is a number that identifies a particular device.
C) It is a piece of a message that is handled by programs that implement internet protocol.
D) It is a program that breaks up network traffic into pieces before transmission.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
A(n)________ connects computers at different geographic locations.
A) LAN
B) WAN
C) Ethernet
D) SOHO LAN
A) LAN
B) WAN
C) Ethernet
D) SOHO LAN
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)________ is a set of rules that programs on two communicating devices follow.
A) domain
B) attribute
C) protocol
D) database
A) domain
B) attribute
C) protocol
D) database
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following statements is true of cable lines?
A) Cable lines provide high-speed data transmission using telephone cables.
B) Performance of cable lines is stable irrespective of the number of users sending and receiving data.
C) Cable lines generally use standard protocols.
D) The signals from cable modems do not interfere with TV signals.
A) Cable lines provide high-speed data transmission using telephone cables.
B) Performance of cable lines is stable irrespective of the number of users sending and receiving data.
C) Cable lines generally use standard protocols.
D) The signals from cable modems do not interfere with TV signals.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)________ is a unique name that is affiliated with a public IP address.
A) tag
B) protocol
C) domain name
D) assigned name
A) tag
B) protocol
C) domain name
D) assigned name
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Devices such as wireless mice and keyboards use ________ to connect to the computer.
A) routers
B) broadband
C) cables
D) Bluetooth
A) routers
B) broadband
C) cables
D) Bluetooth
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
A ________ is a networking device that detects the speed that a given device on a LAN can handle and communicates with it at that speed.
A) bus
B) switch
C) domain
D) SOHO LAN
A) bus
B) switch
C) domain
D) SOHO LAN
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Which protocol standard used for wired LAN connections specifies hardware characteristics such as the signal to be carried by each wire?
A) intranet
B) WiMax
C) Ethernet
D) RuBee
A) intranet
B) WiMax
C) Ethernet
D) RuBee
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
The IEEE 802.3 protocol standard is also known as ________.
A) TCP/IP
B) Ethernet
C) Bluetooth
D) HTTP
A) TCP/IP
B) Ethernet
C) Bluetooth
D) HTTP
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
The computers in two separate company sites must be connected using a ________.
A) LAN
B) WAN
C) SOHO LAN
D) MAC
A) LAN
B) WAN
C) SOHO LAN
D) MAC
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following statements is true about LANs and their components?
A) The numbers in the term "10/100/1000 Ethernet" refer to the number of devices that can be connected.
B) For communications equipment, the M in Mbps stands for 1024×1024.
C) The expansion of kbps is kilobits per second.
D) IEEE 802.11ac is the current standard for wired LAN.
A) The numbers in the term "10/100/1000 Ethernet" refer to the number of devices that can be connected.
B) For communications equipment, the M in Mbps stands for 1024×1024.
C) The expansion of kbps is kilobits per second.
D) IEEE 802.11ac is the current standard for wired LAN.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following statements is true of private and public IP addresses?
A) The use of separate private and public IP addresses increases the number of domain names.
B) An IP address can be associated with just one domain name.
C) The IP address that a domain name points to can be changed.
D) In a URL, the IP address must be followed by the protocol.
A) The use of separate private and public IP addresses increases the number of domain names.
B) An IP address can be associated with just one domain name.
C) The IP address that a domain name points to can be changed.
D) In a URL, the IP address must be followed by the protocol.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
The distinguishing characteristic of a local area network (LAN)is that ________.
A) it connects at multiple locations
B) it connects at a single location
C) it is a network of networks
D) all lines need not reside at the same geographic location
A) it connects at multiple locations
B) it connects at a single location
C) it is a network of networks
D) all lines need not reside at the same geographic location
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following refers to an address on the Internet?
A) File Transfer Protocol
B) Digital Subscriber Line
C) Uniform Resource Locator
D) Internet Service Provider
A) File Transfer Protocol
B) Digital Subscriber Line
C) Uniform Resource Locator
D) Internet Service Provider
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following purposes does an HTTP protocol serve?
A) determine IP address of devices on a network
B) provide reliable network for data communication
C) enable communication between programs
D) divide network traffic into packets
A) determine IP address of devices on a network
B) provide reliable network for data communication
C) enable communication between programs
D) divide network traffic into packets
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
A ________ receives requests from users via the Web server,takes some action,and returns a response to the users via the Web server.
A) content delivery network
B) commerce server
C) URL
D) browser
A) content delivery network
B) commerce server
C) URL
D) browser
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following statements is true of JavaScript Object Notation (JSON)?
A) It contains a lot of metadata to validate the format of documents.
B) It is used to transmit volumes of data between browsers and servers.
C) Documents using JSON can be processed only using Java programming language.
D) JSON cannot be used to support Web services.
A) It contains a lot of metadata to validate the format of documents.
B) It is used to transmit volumes of data between browsers and servers.
C) Documents using JSON can be processed only using Java programming language.
D) JSON cannot be used to support Web services.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The most popular protocol for LAN is the IEEE 802.11 protocol.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
A common use of FTP is to ________.
A) transmit data
B) balance server loads
C) format responses
D) manage network traffic
A) transmit data
B) balance server loads
C) format responses
D) manage network traffic
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following statements is true of service-oriented architecture (SOA)?
A) Work is assigned to Web servers based on their geographic proximity to the user.
B) SOA services are used only between the Web server and the users.
C) The number of database servers and Web servers should be in a certain ratio.
D) JavaScripts in Web pages can invoke services defined by a server application.
A) Work is assigned to Web servers based on their geographic proximity to the user.
B) SOA services are used only between the Web server and the users.
C) The number of database servers and Web servers should be in a certain ratio.
D) JavaScripts in Web pages can invoke services defined by a server application.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Users can download data at a maximum speed of 10 Mbps using cable lines.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is the second tier in the three-tier architecture arrangement?
A) client tier
B) database tier
C) server tier
D) user tier
A) client tier
B) database tier
C) server tier
D) user tier
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
A SOHO LAN (small office or a home office LAN)requires that a dozen or more computers and printers be connected.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
The "S" in HTTPS stands for ________.
A) site
B) status
C) speed
D) secure
A) site
B) status
C) speed
D) secure
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
________ is the language that is commonly used for coding Web pages.
A) HTML
B) VPN
C) DSL
D) XML
A) HTML
B) VPN
C) DSL
D) XML
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
LAN connections cannot be made with optical fiber cables.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following protocols allows secure data transmissions?
A) HTTPS
B) TCP
C) FTP
D) SMTP
A) HTTPS
B) TCP
C) FTP
D) SMTP
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
A LAN would be used to connect computers located in Seattle and Philadelphia.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
With a WAN,an organization can place communications lines wherever it wants because all lines reside on its premises.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements is true about protocols supporting Web services?
A) SOAP is a lower-level Internet protocol.
B) XML is preferred for transmitting large volumes of data between servers and browsers.
C) WSDL documents are read by developer tools to configure a programming environment.
D) The metadata in JSON is well-suited for validating the format and completeness of the document.
A) SOAP is a lower-level Internet protocol.
B) XML is preferred for transmitting large volumes of data between servers and browsers.
C) WSDL documents are read by developer tools to configure a programming environment.
D) The metadata in JSON is well-suited for validating the format and completeness of the document.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following statements is true of Web servers?
A) They are not programs.
B) They run on a user tier computer.
C) They are used only to send and receive Webmail.
D) They send and receive Web pages to and from clients.
A) They are not programs.
B) They run on a user tier computer.
C) They are used only to send and receive Webmail.
D) They send and receive Web pages to and from clients.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
A protocol is a set of rules that programs on two communicating devices follow.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
A private internet that is used exclusively within an organization is also called an intranet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a component of the user tier?
A) computers that have browsers that request and process Web pages
B) computers that run Web servers and process application programs
C) computers that run a DBMS that processes requests for data from a commerce server
D) computers that receive Web page requests and send them to an available server to minimize customer delays in a facility called a Web farm
A) computers that have browsers that request and process Web pages
B) computers that run Web servers and process application programs
C) computers that run a DBMS that processes requests for data from a commerce server
D) computers that receive Web page requests and send them to an available server to minimize customer delays in a facility called a Web farm
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
The user tier consists of computers,phones,and other devices.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
What is Bluetooth? What are its uses?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
Cable lines provide high-speed data transmission using phone lines.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
An HTTPS connection is a secure connection.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
Differentiate between private and public IP addresses.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
The TCP/IP Protocol architecture uses the same protocol in all its layers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
What is a domain name? What is the procedure to get a domain name?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
Wireless mice use Bluetooth to connect to a computer.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Bluetooth is a protocol that can transmit data over long distances.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
The protocols used on the Internet are arranged according to a structure known as the TCP/IP Protocol architecture.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
DSL operates on the same lines as voice telephones.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
The movement from one network to another is called hop.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
The IEEE 802.3 protocol is used for wired LAN connections.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
What is the difference between a LAN and a WAN? Give an example of how each one could be used in business.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
What is HTTP? How does it work?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
File Transfer Protocol is generally used for email transmissions.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
What is the TCP/IP Protocol architecture? Where is the application layer protocol?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
SOAP is a protocol for requesting and responding to Web services.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
The server tier consists of computers that run a DBMS that processes requests to retrieve and store data.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
What are the three important functions of an ISP?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
What is the difference between a Web server and a commerce server?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
What are the different tiers in the three-tier architecture?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck