Deck 13: Internet and Distributed Application Services

Full screen (f)
exit full mode
Question
​With P2P architecture, there are more potential bottlenecks and points of failure.
Use Space or
up arrow
down arrow
to flip the card.
Question
​LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).
Question
​HTTPS is the "secure" version of HTTP
Question
​A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.
Question
​Every IP packet carries the destination node's IP address.
Question
​There is a standard objectclass or attribute name for all entities and resources common to most directories, such as people and shared printers.
Question
​Active Directory is based on LDAP and DNS, so it responds to standard LDAP information requests and uses LDAP concepts, such as objectclasses and OUs, to store and organize directory information hierarchically.
Question
Three-layer architecture simplifies distributing or replicating application software across a network.
Question
​Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.
Question
​A server hosts a single service or resource.
Question
​HTML extends XML to describe the structure, format, and content of documents.
Question
​The client/server architectural model can be applied in many ways.
Question
​Every network attached to the Internet has at least one server designated as a DNS server.
Question
​In large networks, responsibility for maintaining directory content and answering queries is centralized to a few individuals who manage the network.
Question
A server manages system resources and provides access to these resources through a well-defined communication interface.​
Question
​A port number is an unsigned 24-bit integer
Question
​Static connections are easy to initialize and maintain.
Question
​As OSs have evolved, they have incorporated fewer and fewer middleware functions.
Question
​An operating system's primary role is to manage hardware, software, and data resources.
Question
​LDAP queries contain plaintext characters and the syntax is simple and straight forward.
Question
​With ____, a resource user asks for a resource, and if it isn't found in the local resource registry, the resource locator searches for it in external locations.

A) ​static connections
B) ​fixed connections
C) ​dynamic connections
D) ​mapped connections
Question
In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.

A) model
B) ​view
C) ​controller
D) ​presentation
Question
Vendor lock-in risk rises with PaaS because the vendor provides system software components in addition to hardware.
Question
​Distributing parts of an information system across many computer systems and locations is called ____.

A) ​distributed computing
B) ​local computing
C) ​parallel computing
D) ​linear computing
Question
​Three current distribution modes that fit in the cloud computing paradigm are support as a service, platform as a service and infrastructure as a service.
Question
​Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.

A) ​protocol stack
B) ​system stack
C) ​conversion stack
D) ​application stack
Question
​____ are composed of software components distributed across many computer systems and geographic locations.

A) ​Information processes
B) ​Information systems
C) ​Information networks
D) ​Information controls
Question
The risk of vendor lock-in is lower with SaaS because most vendors use similar virtualization environments.
Question
​SMTP and MIME are protocols that enable a user on one Internet host to interact with the OS command layer of another Internet host.
Question
​In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.

A) ​network map registry
B) ​local resource registry
C) ​system resource registry
D) ​remote resource registry
Question
​SaaS has substantial benefits from a consumer perspective.
Question
​Users access Web applications via a URL.
Question
Vendor lock-in is a recent phenomenon with the advent of SaaS.
Question
​A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.

A) ​DNS
B) ​DHCP
C) ​BOOTP
D) ​WINS
Question
Data- and graphics-intensive applications can use ordinary Internet connections as part of SaaS.
Question
​____ is a method of organizing software to provide and access distributed information and computing resources.

A) ​monolithic architecture
B) ​unified architecture
C) ​master/slave architecture
D) ​client/server architecture
Question
​IaaS can be structured for only part of an application's infrastructure requirements.
Question
​In ____ architecture, the roles of client and server are combined into a single application or group of related applications.

A) ​client/server
B) ​monolithic
C) ​peer-to-peer
D) ​unified
Question
​Before accessing a remote resource, a user or system administrator must know the server and resource names to create a ____.

A) ​dynamic connection
B) ​local connection
C) ​mapped connection
D) ​static connection
Question
​A web browser can pass parameters to a script on a Web server using the RPC protocol.
Question
​____, a Microsoft specification for component interoperability, has its roots in older Microsoft specifications, including Object Linking and Embedding (OLE) and the Component Object Model (COM).

A) ​CORBA
B) ​Enterprise Java Beans
C) ​.Net
D) ​Component Object Model Plus
Question
​All objects in an LDAP schema have a(n) ____ attribute.

A) ​objectclass
B) ​distinguished name
C) ​objectType
D) ​common name
Question
​____ specifies the middleware objects use to interact across networks.

A) ​COM+
B) ​LDAP
C) ​CIFS
D) ​CORBA
Question
​A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.

A) ​map
B) ​pipe
C) ​socket
D) ​process
Question
____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.

A) XML-RPC
B) Simple Object Access Protocol
C) ​OLE
D) ​HTTP
Question
​A(n) ____ describes rights granted or denied to users, groups, and computers for accessing resources in Active Directory.

A) ​access control list
B) ​access control entry
C) ​token
D) ​access control token
Question
Under ____, e-mail messages are held on the server temporarily, downloaded to the client when a connection is established, and deleted from the server as soon as the download is finished.

A) IMAP
B) ​POP3
C) ​SMTP
D) ​NNTP
Question
A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.

A) ​object
B) ​bean
C) ​component
D) ​resource
Question
​Active Directory clients rely on a ____ to locate Active Directory servers.

A) ​WINS server
B) ​DHCP server
C) ​BOOTP server
D) ​DNS server
Question
SMTP was extended by the ____ protocol to allow including nontext files in e-mail messages.

A) ​Multimedia Internet Mail Extensions
B) ​Multiple Internet Mail Extensions
C) ​Multipurpose Internet Mail Extensions
D) ​Multiuse Internet Mail Extensions
Question
In CORBA, ____ is a component message-passing protocol.

A) Internet Inter-ORB Protocol
B) Local Inter-ORB Protocol
C) SOAP
D) ​XML-RPC
Question
​____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program.

A) ​Sockets
B) ​Packets
C) ​Pipes
D) ​Procedures
Question
​Microsoft ____ is the directory service and security system built into Windows Server.

A) ​Directory Services
B) ​Open Directory
C) ​Active Directory
D) ​Network Directory
Question
​Web resources are identified by a unique ____.

A) ​Uniform Resource Leverage
B) ​Uniform Resource Locator
C) ​Uniform Resource Link
D) ​Uniform Resource Path
Question
In CORBA, ____ is a service that maintains a component directory and routes messages between components.

A) Object Reference Broker
B) Object Request Broker
C) Object Resource Broker
D) ​Object Repair Broker
Question
____ enable developers to create user interfaces that run on a server but interact with a client Web browser or component.

A) ​JavaServer Beans
B) ​Enterprise Java Beans
C) ​JavaServer Faces
D) ​JavaFX
Question
​____ is an improved version of Telnet that encrypts data flowing between client and server to address a major security issue in Telnet.

A) ​Secure Shell
B) ​FTP
C) ​Kerberos
D) ​DCE
Question
​In an LDAP directory, a(n) ____ defines the attributes common to all member objects.

A) ​distinguished name
B) ​common name
C) ​objectType
D) ​objectclass
Question
​With the ____ protocol, a process on one machine can call a process on another machine.

A) ​Remote Activation Call
B) ​Remote Procedure Call
C) ​Remote Execution Call
D) ​Remote Calling Convention
Question
​The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.

A) ​registration services
B) ​directory services
C) ​network services
D) ​configuration services
Question
The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer's information system.

A) ​PaaS
B) ​IaaS
C) ​SaaS
D) ​AaaS
Question
​The term ____________________ describes software that "glues" together parts of a client/server or multitier application.
Question
An LDAP ____________________ stores information about LDAP objects.
Question
____________________ is a secure version of HTTP that encrypts HTTP requests and responses.
Question
​In static resource connections, the ____________________ acts as a router for resource access requests arriving from local and remote users and application programs.
Question
​Web resources are identified and accessed via a(n) ____________________.
Question
In a three-layer architecture, the ____________________ layer carries out the rules and procedures of business processing.
Question
​A(n) ____________________ pipe is a pipe with two additional features including a name that's permanently placed in a file system directory and the capability to communicate between processes on different computers.
Question
When a named pipe is created, a(n) ____________________ is also created in the local file system.
Question
A(n) ____________________ is a unique combination of an IP address and a port number, separated by a colon.
Question
The term ____ summarizes recent coarse-grained approaches to distributing and accessing software and hardware services across the Internet.

A) ​cloud computing
B) ​distributed computing
C) ​platform computing
D) ​shared computing
Question
LDAP objects are organized in a(n) ____________________ directory structure.
Question
​A(n) ____________________ uses the communication interface to request resources, and the server responds to these requests.
Question
____ is a key supporting technology in IaaS because it enables a customer / user to configure application and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.

A) ​Hardware virtualization
B) ​Software virtualization
C) ​Network virtualization
D) ​System virtualization
Question
____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.

A) ​Platform as a service
B) ​Infrastructure as a service
C) ​System as a service
D) ​Software as a service
Question
A distinguished name (DN) attribute uniquely identifies an object in a(n) ____________________.
Question
​A network ____________________ is a computer's doorway to external resources, such as Web sites and applications, databases, shared files and folders, and shared I/O devices.
Question
​____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.

A) ​Software as a service
B) ​Platform as a service
C) ​Infrastructure as a service
D) ​Application as a service
Question
In a three-layer architecture, the ____________________ layer manages stored data, usually in databases.
Question
​____________________ extends HTML to describe the structure, format, and content of documents.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/93
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Internet and Distributed Application Services
1
​With P2P architecture, there are more potential bottlenecks and points of failure.
False
2
​LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).
True
3
​HTTPS is the "secure" version of HTTP
True
4
​A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
5
​Every IP packet carries the destination node's IP address.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
6
​There is a standard objectclass or attribute name for all entities and resources common to most directories, such as people and shared printers.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
7
​Active Directory is based on LDAP and DNS, so it responds to standard LDAP information requests and uses LDAP concepts, such as objectclasses and OUs, to store and organize directory information hierarchically.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
8
Three-layer architecture simplifies distributing or replicating application software across a network.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
9
​Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
10
​A server hosts a single service or resource.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
11
​HTML extends XML to describe the structure, format, and content of documents.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
12
​The client/server architectural model can be applied in many ways.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
13
​Every network attached to the Internet has at least one server designated as a DNS server.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
14
​In large networks, responsibility for maintaining directory content and answering queries is centralized to a few individuals who manage the network.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
15
A server manages system resources and provides access to these resources through a well-defined communication interface.​
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
16
​A port number is an unsigned 24-bit integer
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
17
​Static connections are easy to initialize and maintain.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
18
​As OSs have evolved, they have incorporated fewer and fewer middleware functions.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
19
​An operating system's primary role is to manage hardware, software, and data resources.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
20
​LDAP queries contain plaintext characters and the syntax is simple and straight forward.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
21
​With ____, a resource user asks for a resource, and if it isn't found in the local resource registry, the resource locator searches for it in external locations.

A) ​static connections
B) ​fixed connections
C) ​dynamic connections
D) ​mapped connections
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
22
In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.

A) model
B) ​view
C) ​controller
D) ​presentation
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
23
Vendor lock-in risk rises with PaaS because the vendor provides system software components in addition to hardware.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
24
​Distributing parts of an information system across many computer systems and locations is called ____.

A) ​distributed computing
B) ​local computing
C) ​parallel computing
D) ​linear computing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
25
​Three current distribution modes that fit in the cloud computing paradigm are support as a service, platform as a service and infrastructure as a service.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
26
​Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.

A) ​protocol stack
B) ​system stack
C) ​conversion stack
D) ​application stack
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
27
​____ are composed of software components distributed across many computer systems and geographic locations.

A) ​Information processes
B) ​Information systems
C) ​Information networks
D) ​Information controls
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
28
The risk of vendor lock-in is lower with SaaS because most vendors use similar virtualization environments.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
29
​SMTP and MIME are protocols that enable a user on one Internet host to interact with the OS command layer of another Internet host.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
30
​In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.

A) ​network map registry
B) ​local resource registry
C) ​system resource registry
D) ​remote resource registry
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
31
​SaaS has substantial benefits from a consumer perspective.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
32
​Users access Web applications via a URL.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
33
Vendor lock-in is a recent phenomenon with the advent of SaaS.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
34
​A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.

A) ​DNS
B) ​DHCP
C) ​BOOTP
D) ​WINS
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
35
Data- and graphics-intensive applications can use ordinary Internet connections as part of SaaS.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
36
​____ is a method of organizing software to provide and access distributed information and computing resources.

A) ​monolithic architecture
B) ​unified architecture
C) ​master/slave architecture
D) ​client/server architecture
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
37
​IaaS can be structured for only part of an application's infrastructure requirements.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
38
​In ____ architecture, the roles of client and server are combined into a single application or group of related applications.

A) ​client/server
B) ​monolithic
C) ​peer-to-peer
D) ​unified
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
39
​Before accessing a remote resource, a user or system administrator must know the server and resource names to create a ____.

A) ​dynamic connection
B) ​local connection
C) ​mapped connection
D) ​static connection
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
40
​A web browser can pass parameters to a script on a Web server using the RPC protocol.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
41
​____, a Microsoft specification for component interoperability, has its roots in older Microsoft specifications, including Object Linking and Embedding (OLE) and the Component Object Model (COM).

A) ​CORBA
B) ​Enterprise Java Beans
C) ​.Net
D) ​Component Object Model Plus
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
42
​All objects in an LDAP schema have a(n) ____ attribute.

A) ​objectclass
B) ​distinguished name
C) ​objectType
D) ​common name
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
43
​____ specifies the middleware objects use to interact across networks.

A) ​COM+
B) ​LDAP
C) ​CIFS
D) ​CORBA
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
44
​A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.

A) ​map
B) ​pipe
C) ​socket
D) ​process
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
45
____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.

A) XML-RPC
B) Simple Object Access Protocol
C) ​OLE
D) ​HTTP
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
46
​A(n) ____ describes rights granted or denied to users, groups, and computers for accessing resources in Active Directory.

A) ​access control list
B) ​access control entry
C) ​token
D) ​access control token
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
47
Under ____, e-mail messages are held on the server temporarily, downloaded to the client when a connection is established, and deleted from the server as soon as the download is finished.

A) IMAP
B) ​POP3
C) ​SMTP
D) ​NNTP
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.

A) ​object
B) ​bean
C) ​component
D) ​resource
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
49
​Active Directory clients rely on a ____ to locate Active Directory servers.

A) ​WINS server
B) ​DHCP server
C) ​BOOTP server
D) ​DNS server
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
50
SMTP was extended by the ____ protocol to allow including nontext files in e-mail messages.

A) ​Multimedia Internet Mail Extensions
B) ​Multiple Internet Mail Extensions
C) ​Multipurpose Internet Mail Extensions
D) ​Multiuse Internet Mail Extensions
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
51
In CORBA, ____ is a component message-passing protocol.

A) Internet Inter-ORB Protocol
B) Local Inter-ORB Protocol
C) SOAP
D) ​XML-RPC
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
52
​____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program.

A) ​Sockets
B) ​Packets
C) ​Pipes
D) ​Procedures
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
53
​Microsoft ____ is the directory service and security system built into Windows Server.

A) ​Directory Services
B) ​Open Directory
C) ​Active Directory
D) ​Network Directory
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
54
​Web resources are identified by a unique ____.

A) ​Uniform Resource Leverage
B) ​Uniform Resource Locator
C) ​Uniform Resource Link
D) ​Uniform Resource Path
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
55
In CORBA, ____ is a service that maintains a component directory and routes messages between components.

A) Object Reference Broker
B) Object Request Broker
C) Object Resource Broker
D) ​Object Repair Broker
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
56
____ enable developers to create user interfaces that run on a server but interact with a client Web browser or component.

A) ​JavaServer Beans
B) ​Enterprise Java Beans
C) ​JavaServer Faces
D) ​JavaFX
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
57
​____ is an improved version of Telnet that encrypts data flowing between client and server to address a major security issue in Telnet.

A) ​Secure Shell
B) ​FTP
C) ​Kerberos
D) ​DCE
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
58
​In an LDAP directory, a(n) ____ defines the attributes common to all member objects.

A) ​distinguished name
B) ​common name
C) ​objectType
D) ​objectclass
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
59
​With the ____ protocol, a process on one machine can call a process on another machine.

A) ​Remote Activation Call
B) ​Remote Procedure Call
C) ​Remote Execution Call
D) ​Remote Calling Convention
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
60
​The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.

A) ​registration services
B) ​directory services
C) ​network services
D) ​configuration services
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
61
The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer's information system.

A) ​PaaS
B) ​IaaS
C) ​SaaS
D) ​AaaS
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
62
​The term ____________________ describes software that "glues" together parts of a client/server or multitier application.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
63
An LDAP ____________________ stores information about LDAP objects.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is a secure version of HTTP that encrypts HTTP requests and responses.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
65
​In static resource connections, the ____________________ acts as a router for resource access requests arriving from local and remote users and application programs.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
66
​Web resources are identified and accessed via a(n) ____________________.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
67
In a three-layer architecture, the ____________________ layer carries out the rules and procedures of business processing.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
68
​A(n) ____________________ pipe is a pipe with two additional features including a name that's permanently placed in a file system directory and the capability to communicate between processes on different computers.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
69
When a named pipe is created, a(n) ____________________ is also created in the local file system.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is a unique combination of an IP address and a port number, separated by a colon.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
71
The term ____ summarizes recent coarse-grained approaches to distributing and accessing software and hardware services across the Internet.

A) ​cloud computing
B) ​distributed computing
C) ​platform computing
D) ​shared computing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
72
LDAP objects are organized in a(n) ____________________ directory structure.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
73
​A(n) ____________________ uses the communication interface to request resources, and the server responds to these requests.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
74
____ is a key supporting technology in IaaS because it enables a customer / user to configure application and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.

A) ​Hardware virtualization
B) ​Software virtualization
C) ​Network virtualization
D) ​System virtualization
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
75
____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.

A) ​Platform as a service
B) ​Infrastructure as a service
C) ​System as a service
D) ​Software as a service
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
76
A distinguished name (DN) attribute uniquely identifies an object in a(n) ____________________.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
77
​A network ____________________ is a computer's doorway to external resources, such as Web sites and applications, databases, shared files and folders, and shared I/O devices.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
78
​____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.

A) ​Software as a service
B) ​Platform as a service
C) ​Infrastructure as a service
D) ​Application as a service
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
79
In a three-layer architecture, the ____________________ layer manages stored data, usually in databases.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
80
​____________________ extends HTML to describe the structure, format, and content of documents.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 93 flashcards in this deck.