Deck 12: Physical Architecture Layer Design

Full screen (f)
exit full mode
Question
Systems designed to handle multiple languages on the fly are ____ multilingual systems.

A) ad-hoc
B) concurrent
C) versatile
D) discrete
E) global
Use Space or
up arrow
down arrow
to flip the card.
Question
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

A) server-based
B) client-based
C) client-server
D) network-based
E) client-network server
Question
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.

A) cultural
B) specialized
C) variable
D) idiosyncratic
E) unstated
Question
Elements of a deployment diagram include _____.

A) Nodes, artifacts, and locations of middleware components
B) Client PCs, servers, and locations of application logic modules
C) Servers, external networks, and data access logic
D) Primarily servers
E) Nodes, artifacts, and communication paths
Question
Scalability refers to the _____.

A) easy increase or decrease of the storage and processing capabilities of the computer
B) fact that there is no central point of failure in the system
C) deployment of middleware in the system
D) support of many different types of clients and servers
E) ease of decreasing the cost of the infrastructure during economic downturn
Question
A network model will depict _____.

A) clients
B) network equipment
C) external networks
D) servers
E) all of these
Question
A server can be a(n) _____.

A) mainframe
B) mainframe, minicomputer, or microcomputer
C) microcomputer
D) minicomputer
E) low-end personal computer
Question
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
Question
The application function that allows data to be stored and retrieved is called _____.

A) application logic
B) data access logic
C) data storage
D) presentation logic
E) network logic
Question
The public key infrastructure (PKI) is ______.

A) hardware
B) software
C) organizations
D) policies
E) all of these
Question
Which of the following is NOT one of the four basic functions of a computer application?

A) application logic
B) data access logic
C) data storage
D) networking logic
E) presentation logic
Question
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.

A) 90
B) 80
C) 70
D) 60
E) 50
Question
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
Question
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
Question
A server in the client-server architecture performs which of the following application functions?

A) application logic and data storage
B) application logic and presentation logic
C) data access logic and presentation logic
D) data access logic and data storage
E) data storage logic and presentation logic
Question
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.

A) control and security, scalability, cost of programming
B) interface capabilities, control and security, cost of programming
C) interface capabilities, control and security, scalability
D) interface capabilities, control, and security
E) interface capabilities, scalability, cost of programming
Question
The computing architecture in which the server performs practically all of the work is known as _____.

A) client connection based architecture
B) client-based architecture
C) client-server architecture
D) server-based architecture
E) middleware architecture
Question
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

A) Encrypt data, decrypt data
B) Store data, restore data
C) Access data, access information
D) Password-protect data, retrieve password
E) Encrypt login id, encrypt password
Question
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.

A) Infrastructure as a service (IaaS)
B) Platform as a service (PasS)
C) Software as a service (SaaS)
D) Utility as a service (UaaS)
E) Computing as a service (CaaS)
Question
What is one primary problem with server-based computing architectures?

A) As more users place heavier demands on the server, it is expensive to increase server capacity.
B) Client terminals are no longer made by hardware vendors.
C) It is difficult to maintain security in the server-based environment.
D) Servers are no longer made by hardware vendors.
E) Servers cannot be manufactured quickly by vendors.
Question
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
Question
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
Question
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
Question
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
Question
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
Question
The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

A) cloud computing
B) big data
C) machine learning
D) Internet of Things (IoT)
E) e-business
Question
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
Question
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
Question
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.

A) the cost of the cloud
B) the level of availability of the cloud
C) the security in the cloud
D) the safety of the cloud
E) the usability of the cloud
Question
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
Question
In the server-based architecture, all data stored on one computer.
Question
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
Question
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
Question
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.

A) distributed computing
B) e-business
C) Remote Method Invocation (RMI)
D) virtualization
E) networking
Question
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
Question
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
Question
Essentially, ___________computing is the idea that computing takes place everywhere and in everything.

A) Internet
B) cloud
C) ubiquitous
D) data
E) business
Question
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
Question
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
Question
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
Question
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
Question
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
Question
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
Question
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
Question
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
Question
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
Question
The function that provides the logic related to the problem domain layer is called application logic.
Question
The languages in which the system needs to operate are documented as part of the customization requirements.
Question
Encryption and authentication requirements address virus control measures.
Question
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
Question
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
Question
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
Question
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
Question
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
Question
Client-based systems are ill equipped to meet operational, performance, security, and cultural/political requirements.
Question
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
Question
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
Question
"The system should be operational on a 24/7 basis for the users." This is an example of the availability and reliability requirements.
Question
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
Question
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
Question
Enhanced objects are a type of magic objects.
Question
Ubiquitous computing is the idea that computing takes place everywhere and in everything.
Question
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
Question
Legacy databases and systems are one of seven factors in the hardware and software specification document
Question
Virtualization is another term for cloud computing.
Question
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
Question
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
Question
Security concerns are one of the set of obstacles for adopting the cloud.
Question
Enchanted objects should be in the background simply providing its message for you to receive at your leisure; not "in your face."
Question
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
Question
What is an enchanted object?
Question
Cost of cloud is one of the set of obstacles for adopting the cloud.
Question
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
Question
Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Physical Architecture Layer Design
1
Systems designed to handle multiple languages on the fly are ____ multilingual systems.

A) ad-hoc
B) concurrent
C) versatile
D) discrete
E) global
B
2
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

A) server-based
B) client-based
C) client-server
D) network-based
E) client-network server
C
3
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.

A) cultural
B) specialized
C) variable
D) idiosyncratic
E) unstated
E
4
Elements of a deployment diagram include _____.

A) Nodes, artifacts, and locations of middleware components
B) Client PCs, servers, and locations of application logic modules
C) Servers, external networks, and data access logic
D) Primarily servers
E) Nodes, artifacts, and communication paths
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
Scalability refers to the _____.

A) easy increase or decrease of the storage and processing capabilities of the computer
B) fact that there is no central point of failure in the system
C) deployment of middleware in the system
D) support of many different types of clients and servers
E) ease of decreasing the cost of the infrastructure during economic downturn
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
A network model will depict _____.

A) clients
B) network equipment
C) external networks
D) servers
E) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
A server can be a(n) _____.

A) mainframe
B) mainframe, minicomputer, or microcomputer
C) microcomputer
D) minicomputer
E) low-end personal computer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
The application function that allows data to be stored and retrieved is called _____.

A) application logic
B) data access logic
C) data storage
D) presentation logic
E) network logic
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
The public key infrastructure (PKI) is ______.

A) hardware
B) software
C) organizations
D) policies
E) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT one of the four basic functions of a computer application?

A) application logic
B) data access logic
C) data storage
D) networking logic
E) presentation logic
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.

A) 90
B) 80
C) 70
D) 60
E) 50
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
A server in the client-server architecture performs which of the following application functions?

A) application logic and data storage
B) application logic and presentation logic
C) data access logic and presentation logic
D) data access logic and data storage
E) data storage logic and presentation logic
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.

A) control and security, scalability, cost of programming
B) interface capabilities, control and security, cost of programming
C) interface capabilities, control and security, scalability
D) interface capabilities, control, and security
E) interface capabilities, scalability, cost of programming
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
The computing architecture in which the server performs practically all of the work is known as _____.

A) client connection based architecture
B) client-based architecture
C) client-server architecture
D) server-based architecture
E) middleware architecture
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

A) Encrypt data, decrypt data
B) Store data, restore data
C) Access data, access information
D) Password-protect data, retrieve password
E) Encrypt login id, encrypt password
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.

A) Infrastructure as a service (IaaS)
B) Platform as a service (PasS)
C) Software as a service (SaaS)
D) Utility as a service (UaaS)
E) Computing as a service (CaaS)
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
What is one primary problem with server-based computing architectures?

A) As more users place heavier demands on the server, it is expensive to increase server capacity.
B) Client terminals are no longer made by hardware vendors.
C) It is difficult to maintain security in the server-based environment.
D) Servers are no longer made by hardware vendors.
E) Servers cannot be manufactured quickly by vendors.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

A) cloud computing
B) big data
C) machine learning
D) Internet of Things (IoT)
E) e-business
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.

A) the cost of the cloud
B) the level of availability of the cloud
C) the security in the cloud
D) the safety of the cloud
E) the usability of the cloud
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
In the server-based architecture, all data stored on one computer.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.

A) distributed computing
B) e-business
C) Remote Method Invocation (RMI)
D) virtualization
E) networking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
Essentially, ___________computing is the idea that computing takes place everywhere and in everything.

A) Internet
B) cloud
C) ubiquitous
D) data
E) business
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
The function that provides the logic related to the problem domain layer is called application logic.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
The languages in which the system needs to operate are documented as part of the customization requirements.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
Encryption and authentication requirements address virus control measures.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
Client-based systems are ill equipped to meet operational, performance, security, and cultural/political requirements.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
"The system should be operational on a 24/7 basis for the users." This is an example of the availability and reliability requirements.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
Enhanced objects are a type of magic objects.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
Ubiquitous computing is the idea that computing takes place everywhere and in everything.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
Legacy databases and systems are one of seven factors in the hardware and software specification document
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
Virtualization is another term for cloud computing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
Security concerns are one of the set of obstacles for adopting the cloud.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
Enchanted objects should be in the background simply providing its message for you to receive at your leisure; not "in your face."
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
What is an enchanted object?
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
Cost of cloud is one of the set of obstacles for adopting the cloud.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 74 flashcards in this deck.