Deck 11: Networked Applications

Full screen (f)
exit full mode
Question
If companies place antivirus software on all of their client PCs,this will stop almost all virus infections.
Use Space or
up arrow
down arrow
to flip the card.
Question
Terminal-host systems tend to have poor response times compared with client-server processing.
Question
RFC 822 and RFC 2822 standards govern ________.

A)plain text content of e-mail messages
B)HTTP page contents
C)HTML commands and content
D)plain text,graphic,and video content of e-mail messages
E)HTML commands
Question
Antivirus software checks e-mail attachments for ________.

A)viruses
B)Trojan horses
C)Both A and B
D)Neither A nor B
Question
Users are primarily concerned about the ________ layer.

A)application
B)transport
C)internet
D)data link
E)physical
Question
An e-mail user sending messages to his or her mail server would most likely use ________.

A)the IMAP standard
B)the POP standard
C)either the IMAP or POP standard
D)the SMTP standard
E)RFC 2822
Question
________ depend on the ability of mail servers to store messages.

A)Senders
B)Receivers
Question
In client-server processing,processing is done on the ________.

A)client
B)server
C)On both of the above.
D)host computer
Question
E-mail bodies that have non-English text use ________.

A)RFC 822 and RFC 2822
B)HTTP
C)MIME
D)UNICODE
E)None of the above.
Question
Mail servers communicate with each other by using ________.

A)POP
B)IMAP
C)either POP or IMAP
D)RFC 2822
E)SMTP
Question
SMTP is a standard used at the ________ layer to transfer mail messages.

A)physical
B)application
C)internet
D)data link
E)transport
Question
The most widely used standard for downloading e-mail to e-mail clients is ________.

A)the IMAP standard
B)the POP standard
C)The IMAP and POP standards are equally popular.
D)the SMTP standard
Question
Which of the following allows you to read your e-mail easily at Internet cafés?

A)POP.
B)Web-enabled e-mail.
C)Both A and B
D)Neither A nor B
Question
Which of the following offers more reliable antivirus protection?

A)Antivirus software on user PCs.
B)Antivirus software on the mail server.
C)Both A and B are about equally reliable.
Question
In terminal-host systems,almost all processing is done on the ________.

A)host
B)terminal
C)Both of the above do a good deal of processing.
D)server
Question
Viewing webpages with a Web browser is an example of a client-server architecture.
Question
According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).

A)1
B)2
C)3
Question
If you are using a Web-enabled e-mail system ________.

A)you have to install a special Web-enabled e-mail client to access your e-mail
B)you access and send mail by using a Web browser
C)you are more likely to be susceptible to viruses being introduced on your computer
D)you are unable to send/receive e-mail messages containing information other than letters or numbers
Question
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
E)Both b.and c.
Question
Processing is done only on a centralized machine in the ________ architecture.

A)client/server
B)P2P
C)terminal-host
D)None of the above.
Question
Codec data comes after the ________ header in VoIP transport frames.

A)IP
B)RTP
C)UDP
D)Ethernet
E)TCP
Question
Which of the following is likely to dominate in VoIP?

A)SIP.
B)H.323.
Question
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A)1.
B)2.
C)3.
D)4.
E)None of the above.
Question
Speech codecs vary with respect to ________.

A)compression
B)voice quality
C)Both A and B
D)Neither A nor B
Question
Variable time delays between successive packets in a transport stream is called ________.

A)a timing error
B)a warble
C)RTP
D)a SIP violation
E)jitter
Question
For the transport layer,VoIP uses ________ for transport transmission.

A)TCP
B)UDP
C)codec standards
D)IP
E)Ethernet
Question
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Question
VoIP uses ________ switching.

A)circuit
B)packet
C)Either A or B
Question
A media gateway translates ________ transmissions.

A)signaling
B)transport
C)Both A and B
D)Neither A nor B
Question
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A)1.
B)3.
C)4.
D)88.
E)91.
Question
HTTP is used at the ________ layer.

A)physical
B)data link
C)application
D)internet
E)transport
Question
VoIP users often have ________ in their phones or on their computers.

A)media gateways
B)codecs
C)Both A and B
D)Neither A nor B
Question
In HTTP,fields normally are ended by ________.

A)a colon (:)
B)a space
C)a carriage return/line feed
D)a blank line
E)All of the above.
Question
VoIP is the transmission of telephone signals over circuit-switched networks.
Question
RTP supports ________.

A)faster transmission speed
B)jitter control
C)Both A and B
D)Neither A nor B
Question
Which of the following is used in webpage bodies?

A)HTTP.
B)HTML.
C)Both A and B
D)Neither A nor B
Question
A media gateway connects a client computer or VoIP phone to the VoIP network.
Question
SIP is a ________ protocol for VoIP.

A)signaling
B)transport
C)Both A and B
D)Neither A nor B
Question
Which header comes SECOND in a VoIP transport packet?

A)RTP.
B)UDP.
C)IP.
D)Application.
Question
Which of the following is used to retrieve Web pages?

A)HTTP.
B)HTML.
Question
In cloud ________,the user accesses the software over the Internet,often with a browser.

A)SaaS
B)utility computing
Question
Which of the following is an attraction of cloud utility computing?

A)Flexibility.
B)Control over operations.
C)Both A and B
D)Neither A nor B
Question
In virtualization,the real computer's capacity is divided among a number of ________.

A)hypervisors
B)virtual machines
C)Neither A nor B
Question
Utility computing is usually offered as a pay-as-you-go service.
Question
________ is a standard to describe a file's format type.

A)RFC 2822
B)SMTP
C)HTML
D)MIME
Question
Which of the following is not an issue for cloud utility computing?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Very high costs.
D)Security concerns.
E)Legal complications.
Question
Utility computing is a new phenomenon.
Question
If a company runs its own data center,it might face problems with ________.

A)overprovisioning
B)underprovisioning
C)Both A and B
D)Neither A nor B
Question
In ________,a company offloads server processing work to another company at a remote site.

A)utility computing
B)Software as a Service
C)None of the above.
Question
Cloud computing is a form of computing where the company outsources some combination of servers,server applications,and client PC software to a cloud service provider.
Question
Virtualization has contributed to the popularity of cloud computing.
Question
In HTTP response messages,the attached file is preceded by a ________.

A)colon (:)
B)space
C)blank line
D)All of the above.
Question
SaaS software vendors may make an application available by ________.

A)hosting it on their own webservers
B)allowing the application to be downloaded to the consumer device
C)Both A and B
D)Neither A nor B
Question
In HTTP,keywords usually are followed by ________.

A)a colon (:)
B)a space
C)a carriage return/line feed
D)a blank line
E)All of the above.
Question
Which of the following is a factor that has contributed to the popularity of cloud computing?

A)The Internet.
B)Web services.
C)Both A and B
D)Neither A nor B
Question
Which of the following services predates cloud computing?

A)Software as a Service.
B)Utility computing.
C)Both A and B
D)Neither A nor B
Question
Which of the following is not an issue for cloud Software as a Service?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Security concerns.
D)Legal complications.
E)All of the above are issues for cloud Software as a Service.
Question
The code "200" may be found in HTTP ________ messages.

A)request
B)response
C)Both A and B
D)Neither A nor B
Question
Which of the following is an attraction of cloud SaaS?

A)Potential lowered costs in hardware and personnel.
B)Mobility.
C)Collaboration.
D)All of the above.
Question
Which of the following is not an issue for cloud utility computing?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Security concerns.
D)Legal complications.
E)All of the above are issues for cloud utility computing.
Question
Which of the following is true?

A)A Web service is one way to implement a SOA.
B)SOAP is one way to implement a Web service.
C)Both A and B
D)Neither A nor B
Question
The purpose of ________ is to allow a calling program to understand how to use a service object.

A)SOAP
B)XML
C)WDSL
D)UDDI
Question
By definition,Web services are implemented using SOAP.
Question
In SOA,what language can be used to create service objects?

A)Java.
B)C++.
C)Both A and B
D)Neither A nor B
Question
In SOA,access to service objects is ________.

A)ad hoc
B)standardized
C)Either a.not b.
D)Neither A nor B
Question
The purpose of ________ is to help someone to find an appropriate service object.

A)SOAP
B)XML
C)WDSL
D)UDDI
Question
Transient client presence tends to be a problem in ________.

A)P2P applications
B)client/server applications
C)Both A and B
D)Neither A nor B
Question
In SOA,SOAP messages are encoded in ________.

A)HTML
B)XML
C)Both A and B
D)Neither A nor B
Question
SOAs are language-independent.
Question
SOAs are attractive because of ________

A)reuse
B)language independence
C)Both A and B
D)Neither A nor B
Question
________ use ________ that provide services to customers using WWW interaction standards.

A)Web services,service objects
B)Service objects,web services
Question
To be considered a peer-to-peer application architecture,there can be no dedicated servers included on the network.
Question
Which of the following is true?

A)A Web service is one way to implement a SOA.
B)A Web service is one way to implement SOAP.
C)Both A and B
D)Neither A nor B
Question
A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service.
Question
When deciding whether to use cloud computing,a company must consider security risk.
Question
Which of the following is considered a bigger problem with traditional client-server based architectures than with peer-to-peer architectures?

A)Underutilized processing capacity of client PCs.
B)Potential for essential data/services to become unavailable as a device is turned off.
C)Both A and B
D)Neither A nor B
Question
In virtualization,each virtual machine acts like a stand-alone computer to its users.
Question
In ________ file retrieval,your computer downloads a file from a server.

A)P2P
B)client/server
C)BitTorrent
D)None of the above.
Question
The terms SOA and Web services mean the same thing.
Question
In SOA,calls are placed to ________.

A)programs
B)subprograms
C)subroutines
D)service objects
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/103
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Networked Applications
1
If companies place antivirus software on all of their client PCs,this will stop almost all virus infections.
False
2
Terminal-host systems tend to have poor response times compared with client-server processing.
True
3
RFC 822 and RFC 2822 standards govern ________.

A)plain text content of e-mail messages
B)HTTP page contents
C)HTML commands and content
D)plain text,graphic,and video content of e-mail messages
E)HTML commands
A
4
Antivirus software checks e-mail attachments for ________.

A)viruses
B)Trojan horses
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
5
Users are primarily concerned about the ________ layer.

A)application
B)transport
C)internet
D)data link
E)physical
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
6
An e-mail user sending messages to his or her mail server would most likely use ________.

A)the IMAP standard
B)the POP standard
C)either the IMAP or POP standard
D)the SMTP standard
E)RFC 2822
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
7
________ depend on the ability of mail servers to store messages.

A)Senders
B)Receivers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
8
In client-server processing,processing is done on the ________.

A)client
B)server
C)On both of the above.
D)host computer
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
9
E-mail bodies that have non-English text use ________.

A)RFC 822 and RFC 2822
B)HTTP
C)MIME
D)UNICODE
E)None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
10
Mail servers communicate with each other by using ________.

A)POP
B)IMAP
C)either POP or IMAP
D)RFC 2822
E)SMTP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
11
SMTP is a standard used at the ________ layer to transfer mail messages.

A)physical
B)application
C)internet
D)data link
E)transport
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
12
The most widely used standard for downloading e-mail to e-mail clients is ________.

A)the IMAP standard
B)the POP standard
C)The IMAP and POP standards are equally popular.
D)the SMTP standard
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following allows you to read your e-mail easily at Internet cafés?

A)POP.
B)Web-enabled e-mail.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following offers more reliable antivirus protection?

A)Antivirus software on user PCs.
B)Antivirus software on the mail server.
C)Both A and B are about equally reliable.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
15
In terminal-host systems,almost all processing is done on the ________.

A)host
B)terminal
C)Both of the above do a good deal of processing.
D)server
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
16
Viewing webpages with a Web browser is an example of a client-server architecture.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
17
According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).

A)1
B)2
C)3
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
18
If you are using a Web-enabled e-mail system ________.

A)you have to install a special Web-enabled e-mail client to access your e-mail
B)you access and send mail by using a Web browser
C)you are more likely to be susceptible to viruses being introduced on your computer
D)you are unable to send/receive e-mail messages containing information other than letters or numbers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
19
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
E)Both b.and c.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
20
Processing is done only on a centralized machine in the ________ architecture.

A)client/server
B)P2P
C)terminal-host
D)None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
21
Codec data comes after the ________ header in VoIP transport frames.

A)IP
B)RTP
C)UDP
D)Ethernet
E)TCP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is likely to dominate in VoIP?

A)SIP.
B)H.323.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
23
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A)1.
B)2.
C)3.
D)4.
E)None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
24
Speech codecs vary with respect to ________.

A)compression
B)voice quality
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
25
Variable time delays between successive packets in a transport stream is called ________.

A)a timing error
B)a warble
C)RTP
D)a SIP violation
E)jitter
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
26
For the transport layer,VoIP uses ________ for transport transmission.

A)TCP
B)UDP
C)codec standards
D)IP
E)Ethernet
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
27
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
28
VoIP uses ________ switching.

A)circuit
B)packet
C)Either A or B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
29
A media gateway translates ________ transmissions.

A)signaling
B)transport
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
30
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A)1.
B)3.
C)4.
D)88.
E)91.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
31
HTTP is used at the ________ layer.

A)physical
B)data link
C)application
D)internet
E)transport
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
32
VoIP users often have ________ in their phones or on their computers.

A)media gateways
B)codecs
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
33
In HTTP,fields normally are ended by ________.

A)a colon (:)
B)a space
C)a carriage return/line feed
D)a blank line
E)All of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
34
VoIP is the transmission of telephone signals over circuit-switched networks.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
35
RTP supports ________.

A)faster transmission speed
B)jitter control
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is used in webpage bodies?

A)HTTP.
B)HTML.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
37
A media gateway connects a client computer or VoIP phone to the VoIP network.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
38
SIP is a ________ protocol for VoIP.

A)signaling
B)transport
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
39
Which header comes SECOND in a VoIP transport packet?

A)RTP.
B)UDP.
C)IP.
D)Application.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is used to retrieve Web pages?

A)HTTP.
B)HTML.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
41
In cloud ________,the user accesses the software over the Internet,often with a browser.

A)SaaS
B)utility computing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is an attraction of cloud utility computing?

A)Flexibility.
B)Control over operations.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
43
In virtualization,the real computer's capacity is divided among a number of ________.

A)hypervisors
B)virtual machines
C)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
44
Utility computing is usually offered as a pay-as-you-go service.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
45
________ is a standard to describe a file's format type.

A)RFC 2822
B)SMTP
C)HTML
D)MIME
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is not an issue for cloud utility computing?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Very high costs.
D)Security concerns.
E)Legal complications.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
47
Utility computing is a new phenomenon.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
48
If a company runs its own data center,it might face problems with ________.

A)overprovisioning
B)underprovisioning
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
49
In ________,a company offloads server processing work to another company at a remote site.

A)utility computing
B)Software as a Service
C)None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
50
Cloud computing is a form of computing where the company outsources some combination of servers,server applications,and client PC software to a cloud service provider.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
51
Virtualization has contributed to the popularity of cloud computing.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
52
In HTTP response messages,the attached file is preceded by a ________.

A)colon (:)
B)space
C)blank line
D)All of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
53
SaaS software vendors may make an application available by ________.

A)hosting it on their own webservers
B)allowing the application to be downloaded to the consumer device
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
54
In HTTP,keywords usually are followed by ________.

A)a colon (:)
B)a space
C)a carriage return/line feed
D)a blank line
E)All of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is a factor that has contributed to the popularity of cloud computing?

A)The Internet.
B)Web services.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following services predates cloud computing?

A)Software as a Service.
B)Utility computing.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is not an issue for cloud Software as a Service?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Security concerns.
D)Legal complications.
E)All of the above are issues for cloud Software as a Service.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
58
The code "200" may be found in HTTP ________ messages.

A)request
B)response
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is an attraction of cloud SaaS?

A)Potential lowered costs in hardware and personnel.
B)Mobility.
C)Collaboration.
D)All of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is not an issue for cloud utility computing?

A)The possibility of losing access.
B)The possibility of getting locked into proprietary software.
C)Security concerns.
D)Legal complications.
E)All of the above are issues for cloud utility computing.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is true?

A)A Web service is one way to implement a SOA.
B)SOAP is one way to implement a Web service.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
62
The purpose of ________ is to allow a calling program to understand how to use a service object.

A)SOAP
B)XML
C)WDSL
D)UDDI
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
63
By definition,Web services are implemented using SOAP.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
64
In SOA,what language can be used to create service objects?

A)Java.
B)C++.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
65
In SOA,access to service objects is ________.

A)ad hoc
B)standardized
C)Either a.not b.
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
66
The purpose of ________ is to help someone to find an appropriate service object.

A)SOAP
B)XML
C)WDSL
D)UDDI
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
67
Transient client presence tends to be a problem in ________.

A)P2P applications
B)client/server applications
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
68
In SOA,SOAP messages are encoded in ________.

A)HTML
B)XML
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
69
SOAs are language-independent.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
70
SOAs are attractive because of ________

A)reuse
B)language independence
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
71
________ use ________ that provide services to customers using WWW interaction standards.

A)Web services,service objects
B)Service objects,web services
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
72
To be considered a peer-to-peer application architecture,there can be no dedicated servers included on the network.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is true?

A)A Web service is one way to implement a SOA.
B)A Web service is one way to implement SOAP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
74
A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
75
When deciding whether to use cloud computing,a company must consider security risk.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is considered a bigger problem with traditional client-server based architectures than with peer-to-peer architectures?

A)Underutilized processing capacity of client PCs.
B)Potential for essential data/services to become unavailable as a device is turned off.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
77
In virtualization,each virtual machine acts like a stand-alone computer to its users.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
78
In ________ file retrieval,your computer downloads a file from a server.

A)P2P
B)client/server
C)BitTorrent
D)None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
79
The terms SOA and Web services mean the same thing.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
80
In SOA,calls are placed to ________.

A)programs
B)subprograms
C)subroutines
D)service objects
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 103 flashcards in this deck.