Deck 11: Networked Applications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/95
Play
Full screen (f)
Deck 11: Networked Applications
1
If a hacker takes over an application,he or she gets all the privileges of the application on the computer.
True
2
Antivirus software checks e-mail attachments for ________.
A)viruses
B)Trojan horses
C)both A and B
D)neither A nor B
A)viruses
B)Trojan horses
C)both A and B
D)neither A nor B
C
3
Which of the following allows you to read your e-mail easily on an Internet cafe's computer?
A)POP
B)Web-enabled e-mail
C)both A and B
D)neither A nor B
A)POP
B)Web-enabled e-mail
C)both A and B
D)neither A nor B
B
4
A media gateway connects a client computer or VoIP phone to the VoIP network.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
5
Mail servers communicate with each other by using ________.
A)POP
B)HTTP
C)RFC 2822
D)SMTP
A)POP
B)HTTP
C)RFC 2822
D)SMTP
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
6
A networked application is an application that requires a network to operate.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
7
E-mail bodies that have non-English text use ________.
A)RFC 822 and RFC 2822
B)HTTP
C)POP
D)UNICODE
A)RFC 822 and RFC 2822
B)HTTP
C)POP
D)UNICODE
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
8
VoIP uses ________ switching.
A)circuit
B)packet
C)either A or B
A)circuit
B)packet
C)either A or B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
9
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following offers more reliable antivirus protection?
A)antivirus software on user PCs
B)antivirus software on the mail server
C)Both A and B are about equally reliable.
A)antivirus software on user PCs
B)antivirus software on the mail server
C)Both A and B are about equally reliable.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
11
If you are using a Web-enabled e-mail system ________.
A)you have to install a special Web-enabled e-mail client to access your e-mail
B)you access and send mail by using a Web browser
C)you are more likely to be susceptible to viruses being introduced on your computer
D)you are unable to send/receive e-mail messages containing information other than letters or numbers
A)you have to install a special Web-enabled e-mail client to access your e-mail
B)you access and send mail by using a Web browser
C)you are more likely to be susceptible to viruses being introduced on your computer
D)you are unable to send/receive e-mail messages containing information other than letters or numbers
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
12
Users are primarily concerned about the ________ layer.
A)application
B)transport
C)internet
D)physical
A)application
B)transport
C)internet
D)physical
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
13
If companies place antivirus software on all of their client PCs,this will stop almost all virus infections.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
14
The way in which application layer functions are spread among computers to deliver service to users is called ________.
A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
15
RFC 822 and RFC 2822 standards govern ________.
A)plain text content of e-mail messages
B)HTTP page contents
C)HTML commands and content
D)plain text, graphic, and video content of e-mail messages
A)plain text content of e-mail messages
B)HTTP page contents
C)HTML commands and content
D)plain text, graphic, and video content of e-mail messages
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
16
A media gateway translates ________ transmissions.
A)signaling
B)transport
C)both A and B
D)neither A nor B
A)signaling
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
17
According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).
A)1
B)2
C)3
D)4
A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
18
The advance that made the client/server application architecture possible was ________.
A)the Internet
B)client processing power
C)application sophistication
D)input/output methods
A)the Internet
B)client processing power
C)application sophistication
D)input/output methods
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
19
A traditional e-mail user sending messages to his or her mail server would most likely use ________.
A)the IMAP standard
B)the POP standard
C)either the IMAP or POP standard
D)the SMTP standard
A)the IMAP standard
B)the POP standard
C)either the IMAP or POP standard
D)the SMTP standard
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
20
Having all privileges on a computer is known as having ________.
A)all access
B)total control
C)root privileges
D)all of the above
A)all access
B)total control
C)root privileges
D)all of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
21
The code "200" may be found in HTTP ________ messages.
A)request
B)response
C)both A and B
D)neither A nor B
A)request
B)response
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
22
Variability in time delays between successive packets in a transport stream is called ________.
A)a timing error
B)a warble
C)a SIP violation
D)jitter
A)a timing error
B)a warble
C)a SIP violation
D)jitter
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is used to retrieve Web pages?
A)HTTP
B)HTML
C)RTP
D)SQL
A)HTTP
B)HTML
C)RTP
D)SQL
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
24
Speech codecs vary with respect to ________.
A)compression
B)voice quality
C)both A and B
D)neither A nor B
A)compression
B)voice quality
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
25
SIP is a ________ protocol for VoIP.
A)signaling
B)transport
C)both A and B
D)neither A nor B
A)signaling
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
26
SaaS software vendors may make an application available by ________.
A)hosting it on their own webservers
B)allowing the application to be downloaded to the consumer device
C)both A and B
D)neither A nor B
A)hosting it on their own webservers
B)allowing the application to be downloaded to the consumer device
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
27
For the transport layer,VoIP uses ________ for transport transmission.
A)TCP
B)UDP
C)codec standards
D)IP
A)TCP
B)UDP
C)codec standards
D)IP
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
28
In HTTP,keywords usually are followed by a ________.
A)colon (:)
B)carriage return/line feed
C)blank line
D)space
A)colon (:)
B)carriage return/line feed
C)blank line
D)space
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
29
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?
A)3
B)4
C)88
D)91
A)3
B)4
C)88
D)91
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
30
VoIP users have ________ in their phones or on their computers.
A)media gateways
B)codecs
C)both A and B
D)neither A nor B
A)media gateways
B)codecs
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
31
In HTTP,fields normally are ended by a ________.
A)colon (:)
B)carriage return/line feed
C)blank line
D)space
A)colon (:)
B)carriage return/line feed
C)blank line
D)space
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
32
In HTTP response messages,the attached file is preceded by a ________.
A)colon (:)
B)space
C)blank line
D)any of the above
A)colon (:)
B)space
C)blank line
D)any of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is used in webpage bodies?
A)HTTP
B)HTML
C)both A and B
D)neither A nor B
A)HTTP
B)HTML
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
34
In cloud ________,the user accesses the software over the Internet,often with a browser.
A)SaaS
B)utility computing
A)SaaS
B)utility computing
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
35
________ is a standard to describe a file's format type.
A)RFC 2822
B)SMTP
C)HTML
D)MIME
A)RFC 2822
B)SMTP
C)HTML
D)MIME
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
36
Which header comes SECOND in a VoIP transport packet?
A)RTP
B)UDP
C)TCP
D)Application
A)RTP
B)UDP
C)TCP
D)Application
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
37
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?
A)1
B)2
C)3
D)none of the above
A)1
B)2
C)3
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
38
Codec data comes after the ________ header in VoIP transport frames.
A)IP
B)TCP
C)UDP
D)RTP
A)IP
B)TCP
C)UDP
D)RTP
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
39
RTP supports ________.
A)faster transmission speed
B)jitter control
C)both A and B
D)neither A nor B
A)faster transmission speed
B)jitter control
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is likely to dominate in VoIP?
A)SIP
B)H)323
A)SIP
B)H)323
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is not an issue for cloud utility computing?
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)very high costs
D)security concerns
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)very high costs
D)security concerns
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
42
A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not an issue for cloud utility computing?
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)security concerns
D)All of the above are issues for cloud utility computing.
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)security concerns
D)All of the above are issues for cloud utility computing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
44
SOAs are language-independent.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
45
In virtualization,the real computer's capacity is divided among a number of ________.
A)hypervisors
B)virtual machines
C)neither A nor B
A)hypervisors
B)virtual machines
C)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is an attraction of cloud SaaS?
A)potential lowered costs in hardware and personnel
B)mobility
C)collaboration
D)all of the above
A)potential lowered costs in hardware and personnel
B)mobility
C)collaboration
D)all of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
47
In SOA,what language can be used to create service objects?
A)Java
B)C++
C)both A and B
D)neither A nor B
A)Java
B)C++
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
48
In ________,a company offloads server processing work to another company at a remote site.
A)utility computing
B)software as a service
C)none of the above
A)utility computing
B)software as a service
C)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
49
In SOA,calls are placed to ________.
A)programs
B)subprograms
C)subroutines
D)service objects
A)programs
B)subprograms
C)subroutines
D)service objects
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
50
When deciding whether to use cloud computing,a company must consider security risk.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a factor that has contributed to the popularity of cloud computing?
A)the Internet
B)web services
C)both A and B
D)neither A nor B
A)the Internet
B)web services
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is an attraction of cloud utility computing?
A)flexibility
B)control over operations
C)both A and B
D)neither A nor B
A)flexibility
B)control over operations
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
53
Utility computing is a new phenomenon.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
54
Utility computing is usually offered as a pay-as-you-go service.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
55
If a company runs its own data center,it might face problems with ________.
A)overprovisioning
B)underprovisioning
C)both A and B
D)neither A nor B
A)overprovisioning
B)underprovisioning
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
56
An organization that provides cloud services is called a cloud ISP.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
57
Virtualization has contributed to the popularity of cloud computing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
58
In virtualization,each virtual machine acts like a stand-alone computer to its users.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is not an issue for cloud Software as a Service?
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)security concerns
D)All of the above are issues for cloud Software as a Service.
A)the possibility of losing access
B)the possibility of getting locked into proprietary software
C)security concerns
D)All of the above are issues for cloud Software as a Service.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
60
SOAs are attractive because of ________.
A)reuse
B)language independence
C)both A and B
D)neither A nor B
A)reuse
B)language independence
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
61
By definition,Web services are implemented using SOAP.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
62
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.
A)BitTorrent
B)client/server
C)both A and B
D)neither A nor B
A)BitTorrent
B)client/server
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
63
In ________ file retrieval,your computer downloads a file from a server.
A)P2P
B)client/server
C)BitTorrent
D)none of the above
A)P2P
B)client/server
C)BitTorrent
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is a security risk associated with BitTorrent?
A)danger caused by opening TCP ports on the firewall
B)danger that an employee may download an infected file
C)both A and B
D)neither A nor B
A)danger caused by opening TCP ports on the firewall
B)danger that an employee may download an infected file
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
65
The purpose of ________ is to help someone to find an appropriate service object.
A)SOAP
B)XML
C)WDSL
D)UDDI
A)SOAP
B)XML
C)WDSL
D)UDDI
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
66
In BitTorrent file sharing,you download parts of the file simultaneously from multiple peers.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
67
In SOAs,a program written in C++ can communicate with a program written in Java.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
68
In BitTorrent,the group of all connected computers that have all or part of the file to be downloaded is called the ________.
A)swarm
B)index
C)tracker
D)none of the above
A)swarm
B)index
C)tracker
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
69
In BitTorrent,a(n)________ is a server that coordinates the file transfer.
A)swarm
B)index
C)tracker
D)none of the above
A)swarm
B)index
C)tracker
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
70
In BitTorrent,a(n)________ website is a site the BitTorrent client program goes to in order to get .torrent files.
A)swarm
B)index
C)tracker
D)none of the above
A)swarm
B)index
C)tracker
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
71
Skype offers ________.
A)free calling among Skype customers
B)free calling to and from Public Switched Telephone Network customers
C)both A and B
D)neither A nor B
A)free calling among Skype customers
B)free calling to and from Public Switched Telephone Network customers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is true?
A)A Web service is one way to implement a SOA.
B)SOAP is one way to implement a Web service.
C)both A and B
D)neither A nor B
A)A Web service is one way to implement a SOA.
B)SOAP is one way to implement a Web service.
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
73
In SOA,SOAP messages are encoded in ________.
A)HTML
B)XML
C)both A and B
D)neither A nor B
A)HTML
B)XML
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?
A)underutilized processing capacity of client PCs
B)potential for essential data/services to become unavailable as a device is turned off
C)both A and B
D)neither A nor B
A)underutilized processing capacity of client PCs
B)potential for essential data/services to become unavailable as a device is turned off
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
75
________ use ________ that provide services to customers using WWW interaction standards.
A)Web services, service objects
B)Service objects, web services
A)Web services, service objects
B)Service objects, web services
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
76
The terms SOA and Web services mean the same thing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is true?
A)Web service is one way to implement a SOA.
B)SA Web service is one way to implement SOAP.
C)both A and B
D)neither A nor B
A)Web service is one way to implement a SOA.
B)SA Web service is one way to implement SOAP.
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
78
The purpose of ________ is to allow a calling program to understand how to use a service object.
A)SOAP
B)XML
C)WDSL
D)UDDI
A)SOAP
B)XML
C)WDSL
D)UDDI
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
79
Transient client presence tends to be a problem in ________.
A)P2P applications
B)client/server applications
C)both A and B
D)neither A nor B
A)P2P applications
B)client/server applications
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
80
To be considered a peer-to-peer application architecture,there can be no dedicated servers included on the network.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck