Deck 12: Designing Distributed and Internet Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/164
Play
Full screen (f)
Deck 12: Designing Distributed and Internet Systems
1
In the client/server architecture,the client workstation is most often responsible for managing the user interface.
True
2
File server-based architectures benefit from having a very fast hard disk and cache memory in both clients and the server,enhancing their ability to transfer files to and from the network,RAM,and hard disk.
True
3
When using file servers on local area networks,excessive data movement is one limitation.
True
4
Upsizing is the process of linking previous stand-alone computers together to form networks that support workgroup computing.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
5
The database engine is the front-end portion of the client/server database system that provides the user interface and data manipulation functions.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
6
In a file server environment,the DBMS runs only on the file server.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
7
The primary characteristic of a client-based LAN is that all data manipulation is performed at the client PC,not at the file server.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
8
Downsizing is the process of migrating mainframe applications to personal computers,workstations,and networks.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
9
In a client-based LAN,the file server acts as a shared data storage device,provides additional resources,supports collaborative applications,and provides access to shared data.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
10
In the client/server architecture,the server executes all requests for data so that only data that match the requested criteria are passed across the network to client stations.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
11
In a client-based LAN,the file server handles all data manipulations.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
12
In a file server environment,each PC stores a copy of the database.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
13
In a basic LAN environment,all data manipulation occurs on the file server.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
14
An advantage to using file servers on local area networks is the ability to centralize data control.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
15
Private network refers to the cabling,hardware,and software used to connect workstations,computers,and file servers located in a confined geographical area.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
16
In a typical client/server architecture,all database recovery,security,and access management is localized at the client.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
17
Corporate downsizing has lessened the individual manager's span of control.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
18
When designing distributed and Internet systems,the primary deliverables from this stage are decision tables,structure charts,and throwaway prototypes.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
19
When designing distributed and Internet systems,you should consider information about the site,processing needs,and data for each location.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
20
An advantage to using file servers on local area networks is the ability to use thin clients.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
21
The data analysis function manages all interaction between software and files and databases,including data retrieval/querying,updating,security,concurrency control,and recovery.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
22
Network PCs are examples of thin clients.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
23
XSL-based formatting consists of methods for transforming XML documents into a generic comprehensive form and formatting the generic comprehensive form into a device specific form.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
24
Usually,link titles should be less than 80 characters.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
25
When comparing file server and client/server architectures,the file server architecture requires greater coordination between the client and server.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
26
When migrating relational DBMSs and other LAN-based technologies into the client/server environment,issues such as compatibility of data types,query optimization,distributed databases,data administration of distributed data,CASE tool code generators,and cross operating system integration may arise.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
27
XML refers to software building blocks that are used to ensure that common system capabilities,such as user interfaces and printing,as well as modules are standardized to facilitate data exchange between clients and servers.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
28
XML is the most basic way to implement a standard style design within a Website.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
29
Designers can create vocabularies for any type of application in XML.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
30
Providing Internet content to users based upon knowledge of that customer defines customization.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
31
BIND is a method for translating Internet domain names into Internet Protocol addresses.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
32
A file server architecture is most appropriate for applications that are relatively small in size with little or no concurrent data access by multiple users.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
33
The remote presentation approach to designing client/server architectures places all data presentation functions on the client machine so that the client has total responsibility for formatting data.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
34
API refers to a combination of hardware,software,and communication technologies that bring together data management,presentation,and analysis into a three-tiered client/server environment.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
35
The primary difference between an application built using the client/server architecture and a centralized database system on a mainframe is that each client is an intelligent part of the application processing system.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
36
XSL allows designers to dictate how Web pages are displayed and the type of client device.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
37
Having a Website that is connected to the rest of the Web is one way designers can convey trustworthiness in a Website.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
38
A benefit of the client/server architecture is that it allows most processing to be performed close to the source of the processed data,thereby improving response times and reducing network traffic.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
39
An application server is a computing server where data analysis functions primarily reside.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
40
An advantage of client/server architectures is the ability to decouple the client environment from the server environment.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
41
A major difference between two-level and three-level data warehouses is the creation of an enterprise data warehouse.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
42
The primary purpose of an informational system is to run the business on a current basis.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
43
The cabling,hardware,and software used to connect workstations,computers,and file servers located in a confined geographical area describes a:
A)metropolitan area network
B)wide area network
C)local area network
D)company network
A)metropolitan area network
B)wide area network
C)local area network
D)company network
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
44
The primary users of an operational system are managers,business analysts,and customers.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
45
The process of linking together previous stand-alone personal computers to form networks that support workgroup computing is sometimes called:
A)upsizing
B)downsizing
C)upgrading
D)communicating
A)upsizing
B)downsizing
C)upgrading
D)communicating
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
46
The process of migrating mainframe applications to personal computers,workstations,and networks is sometimes called:
A)upsizing
B)downsizing
C)downgrading
D)resizing
A)upsizing
B)downsizing
C)downgrading
D)resizing
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
47
When designing distributed and Internet systems,the deliverable is:
A)an updated Baseline Project Plan that details the work necessary to turn the selected design strategy into the desired replacement information system
B)a set of structured descriptions and diagrams that outline the logic contained within each DFD process
C)a set of physical design specifications for each separate part of the system
D)a document that will consolidate the information that must be considered when implementing a system design
A)an updated Baseline Project Plan that details the work necessary to turn the selected design strategy into the desired replacement information system
B)a set of structured descriptions and diagrams that outline the logic contained within each DFD process
C)a set of physical design specifications for each separate part of the system
D)a document that will consolidate the information that must be considered when implementing a system design
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
48
In a three-layer data warehouse architecture,users access the data that have been derived from the enterprise data warehouse that are stored in data marts.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
49
The primary characteristic of a client-based LAN is that:
A)all data manipulation is performed at the file server,not at the client PC
B)all data manipulation is performed at the client PC,not at the file server
C)each client has a copy of the database and performs all data manipulations
D)the database is stored on the file server and all data manipulations are performed by the file server
A)all data manipulation is performed at the file server,not at the client PC
B)all data manipulation is performed at the client PC,not at the file server
C)each client has a copy of the database and performs all data manipulations
D)the database is stored on the file server and all data manipulations are performed by the file server
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
50
A data warehouse is a subject-oriented,integrated,time-variant,nonvolatile collection of data used in support of management decision making.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
51
Online transaction processing is the immediate automated responses to the requests of users.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
52
Integration depth is a method that helps you to better understand how a system fits within existing business activities and data.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
53
The design goal of an informational system is performance.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
54
To support concurrent access from multiple users of a shared database,the LAN modules of a DBMS add:
A)concurrent access controls
B)extra security features
C)query or transaction queuing management
D)all of the above
A)concurrent access controls
B)extra security features
C)query or transaction queuing management
D)all of the above
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
55
Information that must be considered when designing distributed and Internet systems includes:
A)site information for each location in the distributed environment
B)processing needs for each location in the distributed environment
C)data information for each location in the distributed environment
D)all of the above
A)site information for each location in the distributed environment
B)processing needs for each location in the distributed environment
C)data information for each location in the distributed environment
D)all of the above
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
56
A device that manages file operations and is shared by each client PC that is attached to a LAN best describes a:
A)file server
B)print server
C)data server
D)minicomputer
A)file server
B)print server
C)data server
D)minicomputer
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
57
Customer bookmarks,links from other sites,search engines referrals,and old content adds value are four reasons why Web pages must live forever.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
58
Generally speaking,an enterprise data warehouse is directly accessible by end users.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
59
In a basic LAN environment,all data manipulation occurs:
A)on the mainframe where the data are stored
B)on the file server where the data are stored
C)at the workstations where the data are requested
D)on the superserver where the data are stored
A)on the mainframe where the data are stored
B)on the file server where the data are stored
C)at the workstations where the data are requested
D)on the superserver where the data are stored
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
60
The biggest driver for developing new types of systems is:
A)electronic and mobile commerce
B)corporate mergers
C)downsizing
D)CASE tools
A)electronic and mobile commerce
B)corporate mergers
C)downsizing
D)CASE tools
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
61
The front-end portion of the client/server database system that provides the user interface and data manipulation functions describes a(n):
A)client
B)server
C)database engine
D)application program interface
A)client
B)server
C)database engine
D)application program interface
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following functions manages all interaction between software and files and databases,including data retrieval/querying,updating,security,concurrency control,and recovery?
A)data analysis
B)data presentation
C)data management
D)transport management
A)data analysis
B)data presentation
C)data management
D)transport management
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
63
A LAN-based computing environment in which a central database server or engine performs all database commands sent to it from client workstations,and in which application programs on each client concentrate on user interface functions,describes a:
A)file server environment
B)client/server architecture
C)bus architecture
D)metropolitan area network
A)file server environment
B)client/server architecture
C)bus architecture
D)metropolitan area network
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
64
When using a DBMS in a file server environment:
A)data security checks and file and record locking are done at the file server
B)data security checks and file and record locking are done on the mainframe
C)data security checks and file and record locking are done at the client PCs
D)data security checks are performed at the file server,and file and record locking are done at the client PCs
A)data security checks and file and record locking are done at the file server
B)data security checks and file and record locking are done on the mainframe
C)data security checks and file and record locking are done at the client PCs
D)data security checks are performed at the file server,and file and record locking are done at the client PCs
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following statements regarding the differences between file server and client/server architectures is true?
A)While database security and integrity are low on a file server architecture,they are high on a client/server architecture.
B)While network usage involves efficient data transfers on a file server architecture,it is not efficient on a client/server architecture.
C)In terms of hardware and system software flexibility,there is less need for coordination between the client and server on a client/server architecture than on a file server architecture.
D)In terms of concurrent data access,concurrent data access is managed by the client in a client/server architecture.
A)While database security and integrity are low on a file server architecture,they are high on a client/server architecture.
B)While network usage involves efficient data transfers on a file server architecture,it is not efficient on a client/server architecture.
C)In terms of hardware and system software flexibility,there is less need for coordination between the client and server on a client/server architecture than on a file server architecture.
D)In terms of concurrent data access,concurrent data access is managed by the client in a client/server architecture.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
66
The back-end portion of the client/server database system running on the server and providing database processing and shared access functions describes a(n):
A)intelligent agent
B)server
C)database engine
D)client
A)intelligent agent
B)server
C)database engine
D)client
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following functions manages just the interface between system users and the software,including the display and printing of forms and reports and possibly validating system inputs?
A)data analysis
B)data presentation
C)data management
D)transport management
A)data analysis
B)data presentation
C)data management
D)transport management
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following client/server architectures freshens up the delivery of existing server-based applications to distributed clients?
A)distributed function
B)remote presentation
C)remote data management
D)distributed presentation
A)distributed function
B)remote presentation
C)remote data management
D)distributed presentation
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is a primary reason for creating three-tiered client/server architectures?
A)Applications can be partitioned in a way that best fits the organizational computing needs.
B)Making global changes or customizing processes for individual users is relatively easy.
C)Because data analysis is separate from the user interface,it is a lot easier to change one or both without affecting the other.
D)All of the above.
A)Applications can be partitioned in a way that best fits the organizational computing needs.
B)Making global changes or customizing processes for individual users is relatively easy.
C)Because data analysis is separate from the user interface,it is a lot easier to change one or both without affecting the other.
D)All of the above.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following functions transforms inputs into outputs,including simple summarization to complex mathematical modeling like regression analysis?
A)data analysis
B)data presentation
C)data management
D)transport management
A)data analysis
B)data presentation
C)data management
D)transport management
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is not a benefit of adopting a client/server architecture?
A)Companies can leverage the benefits of microcomputer technology.
B)Numerous tools for systems design and performance monitoring are available in a client/server environment.
C)It facilitates the use of graphical user interfaces.
D)It allows for and encourages the acceptance of open systems.
A)Companies can leverage the benefits of microcomputer technology.
B)Numerous tools for systems design and performance monitoring are available in a client/server environment.
C)It facilitates the use of graphical user interfaces.
D)It allows for and encourages the acceptance of open systems.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following combines three logical and distinct applications (data management,presentation,and analysis)into a single information system application?
A)analytical server
B)application server
C)three-tiered client/server
D)trinity server
A)analytical server
B)application server
C)three-tiered client/server
D)trinity server
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is a combination of hardware,software,and communication technologies that bring together data management,presentation,and analysis into a three-tiered client/server environment?
A)middleware
B)transparency software
C)presentation software
D)partitioning software
A)middleware
B)transparency software
C)presentation software
D)partitioning software
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is a file server limitation?
A)decentralized data control
B)need for powerful client workstations
C)excessive data movement
D)all of the above
A)decentralized data control
B)need for powerful client workstations
C)excessive data movement
D)all of the above
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
75
Client-based deliveries of applications to users of PCs and workstations are called:
A)client-delivery applications
B)local applications
C)front-end applications
D)back-end applications
A)client-delivery applications
B)local applications
C)front-end applications
D)back-end applications
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
76
In the typical client/server architecture:
A)all database recovery,security,and concurrent access management are centralized at the server
B)all database recovery,security,and concurrent access management are moved to the client
C)only database recovery and concurrent access management are centralized at the server
D)database security and recovery are provided by the client
A)all database recovery,security,and concurrent access management are centralized at the server
B)all database recovery,security,and concurrent access management are moved to the client
C)only database recovery and concurrent access management are centralized at the server
D)database security and recovery are provided by the client
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
77
Software building blocks that are used to assure that common system capabilities like user interfaces and printing are standardized as well as modules for facilitating the data exchange between clients and servers best describes:
A)firmware
B)a software patch
C)a database management system
D)an application program interface
A)firmware
B)a software patch
C)a database management system
D)an application program interface
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
78
A computing server where data analysis functions primarily reside best defines:
A)file server
B)analytical server
C)dedicated server
D)application server
A)file server
B)analytical server
C)dedicated server
D)application server
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
79
The primary difference between an application built using the client/server architecture and a centralized database system on a mainframe is that:
A)in a mainframe environment,all interactions with the user and local devices are handled by local intelligent terminals
B)in a client/server environment,each client is an intelligent part of the application processing system
C)in a client/server environment,all parts of the information system are managed and executed by the central computer
D)none of the above
A)in a mainframe environment,all interactions with the user and local devices are handled by local intelligent terminals
B)in a client/server environment,each client is an intelligent part of the application processing system
C)in a client/server environment,all parts of the information system are managed and executed by the central computer
D)none of the above
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following statements regarding the differences between file server and client/server architectures is true?
A)While the file server architecture involves efficient data transfers,the client/server architecture has large file and data transfers.
B)Servers and clients perform processing in a file server architecture.Only servers perform processing in a client/server architecture.
C)While database security and integrity on a file server architecture is high,it is low on the client/server architecture.
D)While software maintenance on the file server architecture is considered low,software maintenance on the client/server architecture is mixed since some new parts must be delivered to each client.
A)While the file server architecture involves efficient data transfers,the client/server architecture has large file and data transfers.
B)Servers and clients perform processing in a file server architecture.Only servers perform processing in a client/server architecture.
C)While database security and integrity on a file server architecture is high,it is low on the client/server architecture.
D)While software maintenance on the file server architecture is considered low,software maintenance on the client/server architecture is mixed since some new parts must be delivered to each client.
Unlock Deck
Unlock for access to all 164 flashcards in this deck.
Unlock Deck
k this deck