Deck 6: The Cloud

ملء الشاشة (f)
exit full mode
سؤال
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is the best-of-breed security and disaster recovery.
سؤال
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
سؤال
An intranet is a private internet that is used exclusively within an organization.
سؤال
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
سؤال
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
سؤال
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
سؤال
Wired LAN connections use a protocol standard called Ethernet to communicate.
سؤال
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
سؤال
The World Wide Web sponsors committees that create and publish protocols and other standards.
سؤال
Bluetooth is a common wired protocol designed to transmit data over long distances.
سؤال
A university would use a WAN to connect its campuses in two cities.
سؤال
A switch detects the speed that a given device can handle and communicates with it at that speed.
سؤال
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
سؤال
A computer network between Seattle and Philadelphia is made possible through a LAN.
سؤال
IEEE LAN protocols always start with the numbers 802.
سؤال
An Internet is a network of networks that connects LANs, WANs, and other internets.
سؤال
The term "pooled" can be used to describe the cloud as different organizations use the cloud to share hardware through virtualization.
سؤال
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
سؤال
The committee that addresses LAN standards is called the ICANN.
سؤال
TCP/IP Protocol Architecture is a scheme of protocol types arranged in four layers.
سؤال
The owner of a domain name can change the affiliated IP addresses at its discretion.
سؤال
SOAP is a protocol for requesting web services and for sending responses to web service requests.
سؤال
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
سؤال
"smtp" is the protocol used between browsers and Web servers.
سؤال
Unlike FTP, HTTP does not have a secure version.
سؤال
Digital subscriber lines use their own protocols for data transmission.
سؤال
If one had a private IP address for one's computer, every time one moved it, the Internet would have to update its addressing mechanisms to route traffic to one's new location.
سؤال
"https" is the secure version of "http."
سؤال
A URL consists of a protocol followed by a domain name or public IP address.
سؤال
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
سؤال
A domain name is a worldwide-unique name that is affiliated with a public IP address.
سؤال
Both WSDLs and SOAP messages are coded in XML.
سؤال
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
سؤال
A cable line is the second type of LAN connection.
سؤال
ICANN controls the assignment of both public and private IP addresses.
سؤال
FTP is the protocol used mainly for email transmissions.
سؤال
An ISP provides a customer with a legitimate Internet address.
سؤال
Cable modems modulate in such a way that their signals interfere with TV signals.
سؤال
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
سؤال
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
سؤال
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
سؤال
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
سؤال
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
سؤال
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
سؤال
Google Drive can be classified as a PaaS.
سؤال
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
سؤال
An organization that provides software as a service provides only operating systems and application programs.
سؤال
Amazon EC2 and Amazon S3 are both examples of platform as a service.
سؤال
The term ________, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.

A) portable
B) pooled
C) programmatic
D) elastic
سؤال
Teleaction increases the value of local mediocrity.
سؤال
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
سؤال
Small companies usually lack the technical expertise and management to venture into loading operating systems onto servers acquired via the cloud.
سؤال
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or data storage.
سؤال
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
سؤال
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
سؤال
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
سؤال
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolesce
D) in-depth visibility of security
سؤال
Which of the following is a characteristic of in-house hosting?

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
سؤال
Telesurgery increases the value of robotics in the field of medical science.
سؤال
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
سؤال
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
سؤال
Which of the following statements is true about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
سؤال
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
سؤال
Which of the following is true about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
سؤال
Which of the following features distinguishes a LAN from a WAN?

A) LAN connects computers in a single location.
B) WAN has a limit on the number of users
C) WAN has relatively lower bandwidth
D) LAN has stringent hardware requirements
سؤال
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
سؤال
The IEEE 802.3 protocol standard is also known as ________.

A) Bluetooth
B) Ethernet
C) intranet
D) Internet
سؤال
Compared to in-house hosting, cloud-based hosting ________.

A) provides better vision of disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
سؤال
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
سؤال
________ signals do not interfere with TV signals, even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
سؤال
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in depth visibility of security and disaster preparedness
D) fewer training requirements
سؤال
Communications speeds are expressed in ________.

A) bits
B) bytes
C) hertz
D) packets
سؤال
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
سؤال
Which of the following is true of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems do for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
سؤال
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
سؤال
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
سؤال
Which of the following statements is true about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
سؤال
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
سؤال
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: The Cloud
1
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
True
2
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is the best-of-breed security and disaster recovery.
True
3
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
True
4
An intranet is a private internet that is used exclusively within an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
5
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
6
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
7
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
8
Wired LAN connections use a protocol standard called Ethernet to communicate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
9
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
10
The World Wide Web sponsors committees that create and publish protocols and other standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
11
Bluetooth is a common wired protocol designed to transmit data over long distances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
12
A university would use a WAN to connect its campuses in two cities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
13
A switch detects the speed that a given device can handle and communicates with it at that speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
14
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
15
A computer network between Seattle and Philadelphia is made possible through a LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
16
IEEE LAN protocols always start with the numbers 802.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
17
An Internet is a network of networks that connects LANs, WANs, and other internets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
18
The term "pooled" can be used to describe the cloud as different organizations use the cloud to share hardware through virtualization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
19
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
20
The committee that addresses LAN standards is called the ICANN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
21
TCP/IP Protocol Architecture is a scheme of protocol types arranged in four layers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
22
The owner of a domain name can change the affiliated IP addresses at its discretion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
23
SOAP is a protocol for requesting web services and for sending responses to web service requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
24
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
25
"smtp" is the protocol used between browsers and Web servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
26
Unlike FTP, HTTP does not have a secure version.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
27
Digital subscriber lines use their own protocols for data transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
28
If one had a private IP address for one's computer, every time one moved it, the Internet would have to update its addressing mechanisms to route traffic to one's new location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
29
"https" is the secure version of "http."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
30
A URL consists of a protocol followed by a domain name or public IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
31
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
32
A domain name is a worldwide-unique name that is affiliated with a public IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
33
Both WSDLs and SOAP messages are coded in XML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
34
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
35
A cable line is the second type of LAN connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
36
ICANN controls the assignment of both public and private IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
37
FTP is the protocol used mainly for email transmissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
38
An ISP provides a customer with a legitimate Internet address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
39
Cable modems modulate in such a way that their signals interfere with TV signals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
40
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
41
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
43
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
46
Google Drive can be classified as a PaaS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
48
An organization that provides software as a service provides only operating systems and application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
49
Amazon EC2 and Amazon S3 are both examples of platform as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
50
The term ________, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.

A) portable
B) pooled
C) programmatic
D) elastic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
51
Teleaction increases the value of local mediocrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
52
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
53
Small companies usually lack the technical expertise and management to venture into loading operating systems onto servers acquired via the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
54
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
55
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolesce
D) in-depth visibility of security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is a characteristic of in-house hosting?

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
60
Telesurgery increases the value of robotics in the field of medical science.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
61
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
62
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following statements is true about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
64
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following is true about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following features distinguishes a LAN from a WAN?

A) LAN connects computers in a single location.
B) WAN has a limit on the number of users
C) WAN has relatively lower bandwidth
D) LAN has stringent hardware requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
67
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
68
The IEEE 802.3 protocol standard is also known as ________.

A) Bluetooth
B) Ethernet
C) intranet
D) Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
69
Compared to in-house hosting, cloud-based hosting ________.

A) provides better vision of disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ signals do not interfere with TV signals, even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in depth visibility of security and disaster preparedness
D) fewer training requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
73
Communications speeds are expressed in ________.

A) bits
B) bytes
C) hertz
D) packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
74
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following is true of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems do for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
77
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following statements is true about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
79
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
80
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 120 في هذه المجموعة.