CISB 210 - Chapter 6 Mult.

11 September 2022
4.7 (114 reviews)
60 test answers

Unlock all answers in this set

Unlock answers (56)
question
The term ________, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use. A) elastic B) portable C) programmatic D) pooled
answer
A) elastic
question
Cloud resources are ________ because many different organizations use the same physical hardware. A) pooled B) programmatic C) elastic D) portable
answer
A) pooled
question
Which of the following is a characteristic of cloud-based hosting? A) full control of data location B) in-depth visibility of security C) no obsolesce D) unknown cost structure
answer
C) no obsolesce
question
Which of the following is a characteristic of in-house hosting? A) small capital requirements B) known cost structure C) industry-wide economies of scale D) in-depth visibility of disaster preparedness
answer
D) in-depth visibility of disaster preparedness
question
Which of the following is a characteristic of in-house hosting? A) control of data location B) speedy development C) superior adaptability to fluctuating demand D) possibly the best disaster preparedness
answer
A) control of data location
question
Which of the following characteristics is a disadvantage of cloud-based hosting? A) It involves significant requirement of capital. B) It involves high annual maintenance costs. C) It involves high dependency on vendor. D) It involves high ongoing support costs.
answer
C) It involves high dependency on vendor.
question
Which of the following characteristics is a disadvantage of in-house hosting? A) lack of visibility into security details B) cost uncertainties C) loss of control over data location D) dependency on vendor
answer
B) cost uncertainties
question
Which of the following characteristics is a disadvantage of cloud-based hosting? A) ongoing support costs B) loss of control over data location C) increased management requirements D) significant development effort
answer
B) loss of control over data location
question
Which of the following factors makes cloud-based hosting advantageous today? A) expensive processors B) expensive data storage C) advent of private IP addressing D) advent of virtualization
answer
D) advent of virtualization
question
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? A) the cloud B) Bluetooth C) broadband D) wiki
answer
A) the cloud
question
In cloud computing, resources are said to be "pooled" because organizations ________. A) share the same physical hardware through virtualization B) offer their services to each other free of charge, in a give-and-take arrangement C) use open source standards that enable users to modify a program's source code D) use the public Internet to create the appearance of a private connection
answer
A) share the same physical hardware through virtualization
question
Compared to in-house hosting, cloud-based hosting ________. A) provides greater control over the location of data B) requires a significant amount of capital C) provides better vision of disaster preparedness capabilities D) minimizes the risk of investing in technology that will soon become obsolete
answer
D) minimizes the risk of investing in technology that will soon become obsolete
question
Which of the following is a benefit of in-house hosting? A) lower capital requirements B) superior flexibility and adaptability to growing or fluctuating demand C) fewer training requirements D) in depth visibility of security and disaster preparedness
answer
D) in depth visibility of security and disaster preparedness
question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A) database B) network C) server D) application
answer
B) network
question
Which of the following features distinguishes a LAN from a WAN? A) WAN has relatively lower bandwidth B) LAN connects computers in a single location. C) LAN has stringent hardware requirements D) WAN has a limit on the number of users
answer
B) LAN connects computers in a single location.
question
Computers that reside in different geographic locations are connected using a(n) ________. A) XML B) URL C) LAN D) WAN
answer
D) WAN
question
A private internet that is used exclusively within an organization is called a(n) ________. A) server B) cloud C) intranet D) Ethernet
answer
C) intranet
question
A ________ is a set of rules that programs on two communicating devices follow. A) cloud B) codec C) packet D) protocol
answer
D) protocol
question
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used. A) layered protocol B) three-tier system C) virtual private network D) remote access system
answer
A) layered protocol
question
A ________ detects the speed that a given device can handle and communicates with it at that speed. A) modem B) codec C) switch D) port
answer
C) switch
question
The IEEE 802.3 protocol standard is also known as ________. A) Ethernet B) Bluetooth C) Internet D) intranet
answer
A) Ethernet
question
Which of the following statements is true about IEEE 802.3? A) It is the universal standard protocol for all WAN connections. B) It is the protocol for wired LAN connections. C) It is the protocol for wireless LAN connections. D) It is the protocol for Bluetooth.
answer
B) It is the protocol for wired LAN connections.
question
Communications speeds are expressed in ________. A) bytes B) hertz C) packets D) bits
answer
D) bits
question
Which of the following statements is true about the IEEE 802.11ac protocol? A) It is used for wired LAN connections. B) It allows speeds of up to 1.3 Gbps. C) It cannot be processed by access points. D) It is also known as Ethernet.
answer
B) It allows speeds of up to 1.3 Gbps.
question
________ is a wireless protocol designed for transmitting data over short distances, replacing cables. A) Bluetooth B) IPv4 C) IPv6 D) PaaS
answer
A) Bluetooth
question
Which of the following is a function of an ISP? A) It transmits data over short distances, replacing cables. B) It connects computers within a LAN. C) It serves as a gateway to the Internet. D) It describes how messages must be processed for wired transmission.
answer
C) It serves as a gateway to the Internet.
question
Which of the following is true of digital subscriber line signals? A) Digital subscriber line signals use the same protocols as cable modems do for data transmission. B) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously. C) Digital subscriber line signals do not interfere with telephone signals. D) Digital subscriber line signals replace phone signals and are sent to the ISP.
answer
C) Digital subscriber line signals do not interfere with telephone signals.
question
________ signals do not interfere with TV signals, even though they use the same lines. A) Cable B) Dial-up C) DSL D) ADSL
answer
A) Cable
question
Which of the following is true about cable lines? A) They provide faster download speeds than DSL modems. B) They rely on high-capacity optical fiber cables and use their own protocols for data transmission. C) They offer consistent performance, irrespective of the number of users sending and receiving data. D) They provide high-speed data transmission using telephone cables.
answer
B) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
question
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second. A) megabytes B) megabits C) kilobits D) kilobytes
answer
B) megabits
question
For communications equipment, k stands for ________. A) 500 B) 512 C) 1024 D) 1000
answer
D) 1000
question
________ has speeds that range between 500 Kbps and 1.7 Mbps. A) DSL modem to ISP B) Cable modem to ISP C) Wireless LAN D) Wireless WAN
answer
D) Wireless WAN
question
Which of the following is a sophisticated protocol that enables several devices to use the same frequency? A) Wireless WAN B) Cable modem to ISP C) DSL modem to ISP D) Wireless LAN
answer
A) Wireless WAN
question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) SMTP B) HTTP C) TCP/IP D) FTP
answer
C) TCP/IP
question
Which of the following protocols guarantees secure data transmission? A) ftp B) smtp C) http D) https
answer
D) https
question
Which of the following TCP/IP application-layer protocols is used for email transmissions? A) IP B) smtp C) https D) ftp
answer
B) smtp
question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites? A) https B) ftp C) smtp D) http
answer
B) ftp
question
A(n) ________ is a number that identifies a particular device. A) hyperlink B) IP address C) href D) domain
answer
B) IP address
question
The organization responsible for assigning public IP addresses is called ________. A) CERN B) IEEE C) ICANN D) ISO
answer
C) ICANN
question
Which of the following is the most common format for IP addresses? A) TCP B) IPv6 C) HTTP D) IPv4
answer
D) IPv4
question
A ________ is a worldwide-unique term that is affiliated with a public IP address. A) packet B) hyperlink C) URL D) domain name
answer
D) domain name
question
The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page. A) IP address B) URL C) email ID D) protocol
answer
B) URL
question
Which of the following refers to the three tiers in the three-tier architecture? A) TCP, IP, and HTTP B) HTML, XML, and JSON C) user, server, and database D) tunnel, switch, and access point
answer
C) user, server, and database
question
The ________ tier of three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. A) server B) data link C) user D) database
answer
C) user
question
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A) Server farms B) Web servers C) Web browsers D) Server racks
answer
B) Web servers
question
________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead. A) XML B) SOAP C) WSDL D) JSON
answer
A) XML
question
________ is a standard for describing the services, inputs and outputs, and other data supported by a web service. A) XML B) SOAP C) WSDL D) JSON
answer
C) WSDL
question
________ contains little metadata and is preferred for transmitting volumes of data between servers and browsers. A) JSON B) WSDL C) XML D) SOAP
answer
A) JSON
question
Which of the following is an example of PaaS, a category of cloud hosting? A) Microsoft Office 365 B) iCloud C) Amazon S3 D) Microsoft Windows Azure
answer
D) Microsoft Windows Azure
question
Which of the following is an example of SaaS? A) iCloud B) Amazon S3 C) Microsoft Windows Azure D) Oracle on Demand
answer
A) iCloud
question
Which of the following is the most basic cloud offering? A) IaaS B) SaaS C) VPN D) PaaS
answer
A) IaaS
question
Which of the following services is being offered by a cloud vendor who provides hosted computers, an operating system, and a DBMS? A) IaaS B) PaaS C) SaaS D) VPN
answer
B) PaaS
question
Which of the following is an example of PaaS? A) Oracle on Demand B) Apple iCloud C) Amazon S3 D) Office 365
answer
A) Oracle on Demand
question
Which of the following is an example of IaaS? A) Apple iCloud B) Microsoft Azure C) Amazon S3 D) Office 365
answer
C) Amazon S3
question
Rackspace is an example of ________. A) SaaS B) PaaS C) VPN D) IaaS
answer
D) IaaS
question
The connection between a VPN client and a VPN server is called a(n) ________. A) tunnel B) hyperlink C) data highway D) access point
answer
A) tunnel
question
Which of the following is true about a VPN? A) A VPN client software encrypts messages to ensure secure transmissions. B) A VPN network does not provide users with remote access. C) A VPN connection utilizes private networks instead of the public network. D) A VPN connection appears as a secure connection, though it is not.
answer
A) A VPN client software encrypts messages to ensure secure transmissions.
question
A(n) ________ uses the Internet to create the appearance of private, secure connections. A) ISP B) DSL C) URL D) VPN
answer
D) VPN
question
A ________ is a cloud that is owned and operated by an organization for its own benefit. A) Service as a cloud B) wide area network C) private cloud D) virtual private network
answer
C) private cloud
question
Which of the following would be a consequence of teleaction, a form of remote action system? A) The requirement for highly skilled employees would decrease. B) The need for local support staff would decrease. C) The value of local mediocrity would decrease. D) The industries producing high-value product would be unable to properly utilize teleaction.
answer
C) The value of local mediocrity would decrease.