Deck 6: The Cloud
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
Play
Full screen (f)
Deck 6: The Cloud
1
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
True
2
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is the best-of-breed security and disaster recovery.
True
3
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
True
4
An intranet is a private internet that is used exclusively within an organization.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
Wired LAN connections use a protocol standard called Ethernet to communicate.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
The World Wide Web sponsors committees that create and publish protocols and other standards.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
Bluetooth is a common wired protocol designed to transmit data over long distances.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
A university would use a WAN to connect its campuses in two cities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
A switch detects the speed that a given device can handle and communicates with it at that speed.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
A computer network between Seattle and Philadelphia is made possible through a LAN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
IEEE LAN protocols always start with the numbers 802.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
An Internet is a network of networks that connects LANs, WANs, and other internets.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
The term "pooled" can be used to describe the cloud as different organizations use the cloud to share hardware through virtualization.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
The committee that addresses LAN standards is called the ICANN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
TCP/IP Protocol Architecture is a scheme of protocol types arranged in four layers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
The owner of a domain name can change the affiliated IP addresses at its discretion.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
SOAP is a protocol for requesting web services and for sending responses to web service requests.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
"smtp" is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike FTP, HTTP does not have a secure version.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
Digital subscriber lines use their own protocols for data transmission.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
If one had a private IP address for one's computer, every time one moved it, the Internet would have to update its addressing mechanisms to route traffic to one's new location.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
"https" is the secure version of "http."
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
A URL consists of a protocol followed by a domain name or public IP address.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Both WSDLs and SOAP messages are coded in XML.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
A cable line is the second type of LAN connection.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
ICANN controls the assignment of both public and private IP addresses.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
FTP is the protocol used mainly for email transmissions.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
An ISP provides a customer with a legitimate Internet address.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
Cable modems modulate in such a way that their signals interfere with TV signals.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is a characteristic of in-house hosting?
A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following characteristics is a disadvantage of cloud-based hosting?
A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following characteristics is a disadvantage of cloud-based hosting?
A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
Google Drive can be classified as a PaaS.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following factors makes cloud-based hosting advantageous today?
A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
An organization that provides software as a service provides only operating systems and application programs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
Amazon EC2 and Amazon S3 are both examples of platform as a service.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
The term ________, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.
A) portable
B) pooled
C) programmatic
D) elastic
A) portable
B) pooled
C) programmatic
D) elastic
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
Teleaction increases the value of local mediocrity.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Small companies usually lack the technical expertise and management to venture into loading operating systems onto servers acquired via the cloud.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or data storage.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
Cloud resources are ________ because many different organizations use the same physical hardware.
A) elastic
B) pooled
C) programmatic
D) portable
A) elastic
B) pooled
C) programmatic
D) portable
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following characteristics is a disadvantage of in-house hosting?
A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
A) broadband
B) wiki
C) the cloud
D) Bluetooth
A) broadband
B) wiki
C) the cloud
D) Bluetooth
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is a characteristic of cloud-based hosting?
A) unknown cost structure
B) full control of data location
C) no obsolesce
D) in-depth visibility of security
A) unknown cost structure
B) full control of data location
C) no obsolesce
D) in-depth visibility of security
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is a characteristic of in-house hosting?
A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
Telesurgery increases the value of robotics in the field of medical science.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
In cloud computing, resources are said to be "pooled" because organizations ________.
A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
Computers that reside in different geographic locations are connected using a(n) ________.
A) WAN
B) LAN
C) URL
D) XML
A) WAN
B) LAN
C) URL
D) XML
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following statements is true about IEEE 802.3?
A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following is true about cable lines?
A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following features distinguishes a LAN from a WAN?
A) LAN connects computers in a single location.
B) WAN has a limit on the number of users
C) WAN has relatively lower bandwidth
D) LAN has stringent hardware requirements
A) LAN connects computers in a single location.
B) WAN has a limit on the number of users
C) WAN has relatively lower bandwidth
D) LAN has stringent hardware requirements
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
A private internet that is used exclusively within an organization is called a(n) ________.
A) Ethernet
B) intranet
C) cloud
D) server
A) Ethernet
B) intranet
C) cloud
D) server
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
The IEEE 802.3 protocol standard is also known as ________.
A) Bluetooth
B) Ethernet
C) intranet
D) Internet
A) Bluetooth
B) Ethernet
C) intranet
D) Internet
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
Compared to in-house hosting, cloud-based hosting ________.
A) provides better vision of disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
A) provides better vision of disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is a function of an ISP?
A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
________ signals do not interfere with TV signals, even though they use the same lines.
A) DSL
B) Dial-up
C) Cable
D) ADSL
A) DSL
B) Dial-up
C) Cable
D) ADSL
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a benefit of in-house hosting?
A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in depth visibility of security and disaster preparedness
D) fewer training requirements
A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in depth visibility of security and disaster preparedness
D) fewer training requirements
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
Communications speeds are expressed in ________.
A) bits
B) bytes
C) hertz
D) packets
A) bits
B) bytes
C) hertz
D) packets
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
A) database
B) application
C) network
D) server
A) database
B) application
C) network
D) server
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is true of digital subscriber line signals?
A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems do for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems do for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
A ________ detects the speed that a given device can handle and communicates with it at that speed.
A) codec
B) modem
C) switch
D) port
A) codec
B) modem
C) switch
D) port
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements is true about the IEEE 802.11ac protocol?
A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
A ________ is a set of rules that programs on two communicating devices follow.
A) codec
B) cloud
C) packet
D) protocol
A) codec
B) cloud
C) packet
D) protocol
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.
A) megabytes
B) megabits
C) kilobytes
D) kilobits
A) megabytes
B) megabits
C) kilobytes
D) kilobits
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck