Deck 6: The Cloud

ملء الشاشة (f)
exit full mode
سؤال
A computer network between Seattle and Philadelphia is made possible through a LAN.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
سؤال
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
سؤال
An intranet is a private internet that is used exclusively within an organization.
سؤال
Bluetooth is a common wired protocol designed to transmit data over long distances.
سؤال
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
سؤال
Wired LAN connections use a protocol standard called Ethernet to communicate.
سؤال
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
سؤال
IEEE LAN protocols always start with the numbers 802.
سؤال
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is receiving the best-of-breed security.
سؤال
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
سؤال
The World Wide Web sponsors committees that create and publish protocols and other standards.
سؤال
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
سؤال
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
سؤال
A switch detects the speed that a given device can handle and communicates with it at that speed.
سؤال
The committee that addresses LAN standards is called ICANN.
سؤال
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
سؤال
An Internet is a network of networks that connects LANs, WANs, and other internets.
سؤال
A university would use a WAN to connect its campuses in two cities.
سؤال
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
سؤال
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
سؤال
In three-tier architecture, the server tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
سؤال
A domain name is a worldwide-unique name that is affiliated with a public IP address.
سؤال
https is the secure version of http.
سؤال
Cable modems undergo modulation in such a way that their signals interfere with TV signals.
سؤال
An ISP serves as a user's gateway to the Internet.
سؤال
Both WSDLs and SOAP messages are coded in XML.
سؤال
Digital subscriber lines use their own protocols for data transmission.
سؤال
All the computers on a LAN use many public IP addresses.
سؤال
A URL consists of a protocol followed by a domain name or public IP address.
سؤال
SOAP is a protocol for requesting Web services and for sending responses to Web service requests.
سؤال
The owner of a domain name can change the affiliated IP addresses at its discretion.
سؤال
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
سؤال
smtp is the protocol used between browsers and Web servers.
سؤال
Unlike ftp, http does not have a secure version.
سؤال
ftp is the protocol used mainly for email transmissions.
سؤال
A cable line is the second type of LAN connection.
سؤال
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
سؤال
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
سؤال
Assignment of both public and private IP addresses is controlled by ICANN.
سؤال
The most basic cloud offering is platform as a service (PaaS) that is the cloud hosting of a bare server computer or data storage.
سؤال
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
سؤال
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
سؤال
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
سؤال
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
سؤال
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
سؤال
Oracle On demand is an example of infrastructure as a service.
سؤال
Teleaction increases the value of local mediocrity.
سؤال
Identify a characteristic that is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
سؤال
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A) portable
B) pooled
C) programmatic
D) elastic
سؤال
Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations.
سؤال
To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping.
سؤال
Microsoft CRM OnLine can be classified as a PaaS.
سؤال
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
سؤال
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolescence
D) in-depth visibility of security
سؤال
An organization that provides software as a service provides only operating systems and application programs.
سؤال
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
سؤال
Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud.
سؤال
Identify a characteristic of in-house hosting.

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
سؤال
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
سؤال
Which of the following features distinguishes a LAN from a WAN?

A) A LAN connects computers in a single location.
B) A WAN has a limit on the number of users.
C) A WAN has low bandwidth.
D) A LAN has stringent hardware requirements.
سؤال
Which of the following statements is True about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
سؤال
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
سؤال
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
سؤال
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
سؤال
Compared to in-house hosting, cloud-based hosting ________.

A) provides better visibility of security and disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
سؤال
Which of the following statements is True about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
سؤال
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
سؤال
The ________ protocol standard is also known as Ethernet.

A) Bluetooth
B) IEEE 802.11
C) IEEE 802.3
D) IEEE 802.11ac
سؤال
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
سؤال
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
سؤال
________ signals do not interfere with TV signals even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
سؤال
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
سؤال
Which of the following statements is True about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
سؤال
For communications equipment, k stands for ________.

A) 1000
B) 1024
C) 100
D) 1042
سؤال
Which of the following statements is True of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
سؤال
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in-depth visibility of security and disaster preparedness
D) fewer training requirements
سؤال
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
سؤال
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a user's gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
سؤال
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: The Cloud
1
A computer network between Seattle and Philadelphia is made possible through a LAN.
False
2
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
False
3
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
True
4
An intranet is a private internet that is used exclusively within an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
5
Bluetooth is a common wired protocol designed to transmit data over long distances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
7
Wired LAN connections use a protocol standard called Ethernet to communicate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
8
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
9
IEEE LAN protocols always start with the numbers 802.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
10
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is receiving the best-of-breed security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
11
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
12
The World Wide Web sponsors committees that create and publish protocols and other standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
13
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
14
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
15
A switch detects the speed that a given device can handle and communicates with it at that speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
16
The committee that addresses LAN standards is called ICANN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
17
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
18
An Internet is a network of networks that connects LANs, WANs, and other internets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
19
A university would use a WAN to connect its campuses in two cities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
20
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
21
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
22
In three-tier architecture, the server tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
23
A domain name is a worldwide-unique name that is affiliated with a public IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
24
https is the secure version of http.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cable modems undergo modulation in such a way that their signals interfere with TV signals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
26
An ISP serves as a user's gateway to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
27
Both WSDLs and SOAP messages are coded in XML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
28
Digital subscriber lines use their own protocols for data transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
29
All the computers on a LAN use many public IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
30
A URL consists of a protocol followed by a domain name or public IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
31
SOAP is a protocol for requesting Web services and for sending responses to Web service requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
32
The owner of a domain name can change the affiliated IP addresses at its discretion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
33
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
34
smtp is the protocol used between browsers and Web servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
35
Unlike ftp, http does not have a secure version.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
36
ftp is the protocol used mainly for email transmissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
37
A cable line is the second type of LAN connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
38
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
39
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
40
Assignment of both public and private IP addresses is controlled by ICANN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
41
The most basic cloud offering is platform as a service (PaaS) that is the cloud hosting of a bare server computer or data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
43
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
45
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
46
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
47
Oracle On demand is an example of infrastructure as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
48
Teleaction increases the value of local mediocrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
49
Identify a characteristic that is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
50
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A) portable
B) pooled
C) programmatic
D) elastic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
51
Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
52
To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
53
Microsoft CRM OnLine can be classified as a PaaS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolescence
D) in-depth visibility of security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
56
An organization that provides software as a service provides only operating systems and application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
58
Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
59
Identify a characteristic of in-house hosting.

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following features distinguishes a LAN from a WAN?

A) A LAN connects computers in a single location.
B) A WAN has a limit on the number of users.
C) A WAN has low bandwidth.
D) A LAN has stringent hardware requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following statements is True about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
63
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
64
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
65
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
66
Compared to in-house hosting, cloud-based hosting ________.

A) provides better visibility of security and disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following statements is True about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
68
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
69
The ________ protocol standard is also known as Ethernet.

A) Bluetooth
B) IEEE 802.11
C) IEEE 802.3
D) IEEE 802.11ac
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
70
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
72
________ signals do not interfere with TV signals even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
73
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following statements is True about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
75
For communications equipment, k stands for ________.

A) 1000
B) 1024
C) 100
D) 1042
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following statements is True of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in-depth visibility of security and disaster preparedness
D) fewer training requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
78
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a user's gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
80
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.