Deck 12: Physical Architecture Layer Design

ملء الشاشة (f)
exit full mode
سؤال
Systems designed to handle multiple languages on the fly are ____ multilingual systems.

A) ad-hoc
B) concurrent
C) versatile
D) discrete
E) global
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

A) server-based
B) client-based
C) client-server
D) network-based
E) client-network server
سؤال
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.

A) cultural
B) specialized
C) variable
D) idiosyncratic
E) unstated
سؤال
Elements of a deployment diagram include _____.

A) Nodes, artifacts, and locations of middleware components
B) Client PCs, servers, and locations of application logic modules
C) Servers, external networks, and data access logic
D) Primarily servers
E) Nodes, artifacts, and communication paths
سؤال
Scalability refers to the _____.

A) easy increase or decrease of the storage and processing capabilities of the computer
B) fact that there is no central point of failure in the system
C) deployment of middleware in the system
D) support of many different types of clients and servers
E) ease of decreasing the cost of the infrastructure during economic downturn
سؤال
A network model will depict _____.

A) clients
B) network equipment
C) external networks
D) servers
E) all of these
سؤال
A server can be a(n) _____.

A) mainframe
B) mainframe, minicomputer, or microcomputer
C) microcomputer
D) minicomputer
E) low-end personal computer
سؤال
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
سؤال
The application function that allows data to be stored and retrieved is called _____.

A) application logic
B) data access logic
C) data storage
D) presentation logic
E) network logic
سؤال
The public key infrastructure (PKI) is ______.

A) hardware
B) software
C) organizations
D) policies
E) all of these
سؤال
Which of the following is NOT one of the four basic functions of a computer application?

A) application logic
B) data access logic
C) data storage
D) networking logic
E) presentation logic
سؤال
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.

A) 90
B) 80
C) 70
D) 60
E) 50
سؤال
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
سؤال
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
سؤال
A server in the client-server architecture performs which of the following application functions?

A) application logic and data storage
B) application logic and presentation logic
C) data access logic and presentation logic
D) data access logic and data storage
E) data storage logic and presentation logic
سؤال
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.

A) control and security, scalability, cost of programming
B) interface capabilities, control and security, cost of programming
C) interface capabilities, control and security, scalability
D) interface capabilities, control, and security
E) interface capabilities, scalability, cost of programming
سؤال
The computing architecture in which the server performs practically all of the work is known as _____.

A) client connection based architecture
B) client-based architecture
C) client-server architecture
D) server-based architecture
E) middleware architecture
سؤال
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

A) Encrypt data, decrypt data
B) Store data, restore data
C) Access data, access information
D) Password-protect data, retrieve password
E) Encrypt login id, encrypt password
سؤال
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.

A) Infrastructure as a service (IaaS)
B) Platform as a service (PasS)
C) Software as a service (SaaS)
D) Utility as a service (UaaS)
E) Computing as a service (CaaS)
سؤال
What is one primary problem with server-based computing architectures?

A) As more users place heavier demands on the server, it is expensive to increase server capacity.
B) Client terminals are no longer made by hardware vendors.
C) It is difficult to maintain security in the server-based environment.
D) Servers are no longer made by hardware vendors.
E) Servers cannot be manufactured quickly by vendors.
سؤال
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
سؤال
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
سؤال
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
سؤال
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
سؤال
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
سؤال
The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

A) cloud computing
B) big data
C) machine learning
D) Internet of Things (IoT)
E) e-business
سؤال
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
سؤال
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
سؤال
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.

A) the cost of the cloud
B) the level of availability of the cloud
C) the security in the cloud
D) the safety of the cloud
E) the usability of the cloud
سؤال
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
سؤال
In the server-based architecture, all data stored on one computer.
سؤال
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
سؤال
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
سؤال
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.

A) distributed computing
B) e-business
C) Remote Method Invocation (RMI)
D) virtualization
E) networking
سؤال
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
سؤال
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
سؤال
Essentially, ___________computing is the idea that computing takes place everywhere and in everything.

A) Internet
B) cloud
C) ubiquitous
D) data
E) business
سؤال
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
سؤال
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
سؤال
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
سؤال
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
سؤال
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
سؤال
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
سؤال
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
سؤال
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
سؤال
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
سؤال
The function that provides the logic related to the problem domain layer is called application logic.
سؤال
The languages in which the system needs to operate are documented as part of the customization requirements.
سؤال
Encryption and authentication requirements address virus control measures.
سؤال
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
سؤال
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
سؤال
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
سؤال
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
سؤال
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
سؤال
Client-based systems are ill equipped to meet operational, performance, security, and cultural/political requirements.
سؤال
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
سؤال
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
سؤال
"The system should be operational on a 24/7 basis for the users." This is an example of the availability and reliability requirements.
سؤال
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
سؤال
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
سؤال
Enhanced objects are a type of magic objects.
سؤال
Ubiquitous computing is the idea that computing takes place everywhere and in everything.
سؤال
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
سؤال
Legacy databases and systems are one of seven factors in the hardware and software specification document
سؤال
Virtualization is another term for cloud computing.
سؤال
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
سؤال
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
سؤال
Security concerns are one of the set of obstacles for adopting the cloud.
سؤال
Enchanted objects should be in the background simply providing its message for you to receive at your leisure; not "in your face."
سؤال
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
سؤال
What is an enchanted object?
سؤال
Cost of cloud is one of the set of obstacles for adopting the cloud.
سؤال
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
سؤال
Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Physical Architecture Layer Design
1
Systems designed to handle multiple languages on the fly are ____ multilingual systems.

A) ad-hoc
B) concurrent
C) versatile
D) discrete
E) global
B
2
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

A) server-based
B) client-based
C) client-server
D) network-based
E) client-network server
C
3
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.

A) cultural
B) specialized
C) variable
D) idiosyncratic
E) unstated
E
4
Elements of a deployment diagram include _____.

A) Nodes, artifacts, and locations of middleware components
B) Client PCs, servers, and locations of application logic modules
C) Servers, external networks, and data access logic
D) Primarily servers
E) Nodes, artifacts, and communication paths
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
5
Scalability refers to the _____.

A) easy increase or decrease of the storage and processing capabilities of the computer
B) fact that there is no central point of failure in the system
C) deployment of middleware in the system
D) support of many different types of clients and servers
E) ease of decreasing the cost of the infrastructure during economic downturn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
6
A network model will depict _____.

A) clients
B) network equipment
C) external networks
D) servers
E) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
7
A server can be a(n) _____.

A) mainframe
B) mainframe, minicomputer, or microcomputer
C) microcomputer
D) minicomputer
E) low-end personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
8
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
9
The application function that allows data to be stored and retrieved is called _____.

A) application logic
B) data access logic
C) data storage
D) presentation logic
E) network logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
10
The public key infrastructure (PKI) is ______.

A) hardware
B) software
C) organizations
D) policies
E) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT one of the four basic functions of a computer application?

A) application logic
B) data access logic
C) data storage
D) networking logic
E) presentation logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
12
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.

A) 90
B) 80
C) 70
D) 60
E) 50
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
15
A server in the client-server architecture performs which of the following application functions?

A) application logic and data storage
B) application logic and presentation logic
C) data access logic and presentation logic
D) data access logic and data storage
E) data storage logic and presentation logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
16
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.

A) control and security, scalability, cost of programming
B) interface capabilities, control and security, cost of programming
C) interface capabilities, control and security, scalability
D) interface capabilities, control, and security
E) interface capabilities, scalability, cost of programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
17
The computing architecture in which the server performs practically all of the work is known as _____.

A) client connection based architecture
B) client-based architecture
C) client-server architecture
D) server-based architecture
E) middleware architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

A) Encrypt data, decrypt data
B) Store data, restore data
C) Access data, access information
D) Password-protect data, retrieve password
E) Encrypt login id, encrypt password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
19
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.

A) Infrastructure as a service (IaaS)
B) Platform as a service (PasS)
C) Software as a service (SaaS)
D) Utility as a service (UaaS)
E) Computing as a service (CaaS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is one primary problem with server-based computing architectures?

A) As more users place heavier demands on the server, it is expensive to increase server capacity.
B) Client terminals are no longer made by hardware vendors.
C) It is difficult to maintain security in the server-based environment.
D) Servers are no longer made by hardware vendors.
E) Servers cannot be manufactured quickly by vendors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
21
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
22
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
23
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
24
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
25
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

A) cloud computing
B) big data
C) machine learning
D) Internet of Things (IoT)
E) e-business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
27
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
28
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.

A) the cost of the cloud
B) the level of availability of the cloud
C) the security in the cloud
D) the safety of the cloud
E) the usability of the cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
30
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
31
In the server-based architecture, all data stored on one computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
32
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
33
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
34
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.

A) distributed computing
B) e-business
C) Remote Method Invocation (RMI)
D) virtualization
E) networking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
35
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
36
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
37
Essentially, ___________computing is the idea that computing takes place everywhere and in everything.

A) Internet
B) cloud
C) ubiquitous
D) data
E) business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
38
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
39
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
40
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
41
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
42
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
43
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
44
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
45
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
46
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
47
The function that provides the logic related to the problem domain layer is called application logic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
48
The languages in which the system needs to operate are documented as part of the customization requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
49
Encryption and authentication requirements address virus control measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
50
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
51
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
52
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
53
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
54
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
55
Client-based systems are ill equipped to meet operational, performance, security, and cultural/political requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
56
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
57
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
58
"The system should be operational on a 24/7 basis for the users." This is an example of the availability and reliability requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
59
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
60
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
61
Enhanced objects are a type of magic objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
62
Ubiquitous computing is the idea that computing takes place everywhere and in everything.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
63
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
64
Legacy databases and systems are one of seven factors in the hardware and software specification document
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
65
Virtualization is another term for cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
66
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
67
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
68
Security concerns are one of the set of obstacles for adopting the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
69
Enchanted objects should be in the background simply providing its message for you to receive at your leisure; not "in your face."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
70
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is an enchanted object?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
72
Cost of cloud is one of the set of obstacles for adopting the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
73
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
74
Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.