Chapter 6 T/f Answers – Flashcards

Unlock all answers in this set

Unlock answers
question
The term "pooled" can be used to describe the cloud as different organizations use the cloud to share hardware through virtualization.
answer
TRUE
question
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
answer
FALSE
question
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
answer
TRUE
question
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is the best-of-breed security and disaster recovery.
answer
TRUE
question
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly
answer
TRUE
question
A computer network between Seattle and Philadelphia is made possible through a LAN.
answer
FALSE
question
A university would use a WAN to connect its campuses in two cities.
answer
TRUE
question
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
answer
FALSE
question
An Internet is a network of networks that connects LANs, WANs, and other internets.
answer
TRUE
question
An intranet is a private internet that is used exclusively within an organization.
answer
TRUE
question
A switch detects the speed that a given device can handle and communicates with it at that speed.
answer
TRUE
question
Bluetooth is a common wired protocol designed to transmit data over long distances.
answer
FALSE
question
IEEE LAN protocols always start with the numbers 802.
answer
TRUE
question
The World Wide Web sponsors committees that create and publish protocols and other standards.
answer
FALSE
question
Wired LAN connections use a protocol standard called Ethernet to communicate
answer
TRUE
question
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
answer
TRUE
question
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
answer
FALSE
question
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
answer
FALSE
question
The committee that addresses LAN standards is called the ICANN.
answer
FALSE
question
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
answer
TRUE
question
An ISP provides a customer with a legitimate Internet address.
answer
TRUE
question
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
answer
FALSE
question
Digital subscriber lines use their own protocols for data transmission.
answer
TRUE
question
Cable modems modulate in such a way that their signals interfere with TV signals.
answer
FALSE
question
A cable line is the second type of LAN connection.
answer
FALSE
question
TCP/IP Protocol Architecture is a scheme of protocol types arranged in four layers.
answer
FALSE
question
"https" is the secure version of "http."
answer
TRUE
question
"smtp" is the protocol used between browsers and Web servers.
answer
FALSE
question
FTP is the protocol used mainly for email transmissions
answer
FALSE
question
Unlike FTP, HTTP does not have a secure version.
answer
FALSE
question
SOAP is a protocol for requesting web services and for sending responses to web service requests.
answer
TRUE
question
Both WSDLs and SOAP messages are coded in XML.
answer
TRUE
question
ICANN controls the assignment of both public and private IP addresses.
answer
FALSE
question
If one had a private IP address for one's computer, every time one moved it, the Internet would have to update its addressing mechanisms to route traffic to one's new location.
answer
FALSE
question
A domain name is a worldwide-unique name that is affiliated with a public IP address.
answer
TRUE
question
The owner of a domain name can change the affiliated IP addresses at its discretion.
answer
TRUE
question
A URL consists of a protocol followed by a domain name or public IP address.
answer
TRUE
question
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
answer
FALSE
question
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
answer
TRUE
question
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
answer
TRUE
question
An organization that provides software as a service provides only operating systems and application programs
answer
FALSE
question
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or data storage.
answer
FALSE
question
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
answer
TRUE
question
Amazon EC2 and Amazon S3 are both examples of platform as a service.
answer
FALSE
question
Small companies usually lack the technical expertise and management to venture into loading operating systems onto servers acquired via the cloud.
answer
TRUE
question
Google Drive can be classified as a PaaS.
answer
FALSE
question
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
answer
FALSE
question
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
answer
TRUE
question
Teleaction increases the value of local mediocrity.
answer
FALSE
question
Telesurgery increases the value of robotics in the field of medical science.
answer
TRUE
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New