Chapter 4 Networks and Cloud Computing PDF

Title Chapter 4 Networks and Cloud Computing
Author Truc, Pham
Course Information and Research Fundamentals
Institution Vancouver Community College
Pages 12
File Size 123.8 KB
File Type PDF
Total Downloads 20
Total Views 152

Summary

Ch4...


Description

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing True / False 1. The United States has high Internet penetration among its population constituting the majority of people online. a. True b. Fals e ANSWER: Fals e 2. The Internet is the infrastructure on which the Web exists. a. True b. Fals e ANSWER: True 3. Sensors that can monitor and report on data about traffic and parking conditions are part of a network of physical objects known as the Internet of Technology. a. True b. Fals e ANSWER: Fals e 4. The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names. a. True b. Fals e ANSWER: Fals e 5. Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. a. True b. Fals e ANSWER: True 6. Like other programs, Java software can run only on specific types of computers. a. True b. Fals e ANSWER: Fals e 7. Organizations that are concerned about the security of their data should not use public cloud computing. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing b. Fals e ANSWER: True 8. JavaScript can be used to validate data entry in a Web form. a. True b. Fals e ANSWER: True 9. Twitter is a microblogging service. a. True b. Fals e ANSWER: True 10. A podcast is a video broadcast over the Internet. a. True b. Fals e ANSWER: Fals e 11. Video content can be placed on the Internet using the same approach as a blog. a. True b. Fals e ANSWER: True 12. There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high. a. True b. Fals e ANSWER: Fals e 13. Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser. a. True b. Fals e ANSWER: Fals e 14. The Internet is a hyperlink-based system that uses a client/server model. Copyright Cengage Learning. Powered by Cognero.

Page 2

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing a. True b. Fals e ANSWER: Fals e 15. In a Hypertext Markup Language (HTML), the markers are codes that tell the browser how to format the text or

graphics that will be displayed. a. True b. Fals e ANSWER: Fals e 16. A telecommunications protocol is any material substance that carries an electronic signal to support communications between a sending and receiving device. a. True b. Fals e ANSWER: Fals e 17. The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. a. True b. Fals e ANSWER: True 18. 4G will deliver 3 to 20 times the speed of 3G networks for mobile devices. a. True b. Fals e ANSWER: True 19. A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building. a. True b. Fals e ANSWER: Fals e 20. A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. a. True Copyright Cengage Learning. Powered by Cognero.

Page 3

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing b. Fals e ANSWER: Fals e 21. A client is any computer on a network that sends messages requesting services from the servers on the network. a. True b. Fals e ANSWER: True 22. Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other. a. True b. Fals e ANSWER: Fals e 23. A virtual private network (VPN) supports a secure, encrypted connection between a company’s employees and remote users through a third-party service provider. a. True b. Fals e ANSWER: True 24. When you use your lab computer to access a printer, you are using the local area network (LAN). a. True b. Fals e ANSWER: True 25. When you point the remote control to turn on/off the TV, the remote is using radio frequency. a. True b. Fals e ANSWER: True Multiple Choice 26. The ancestor of the Internet was _____. b. the ARPANET a. TCP/I P c. Telnet d. Web 1.0 ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 4

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing 27. _____ is a communication standard that enables computers to route communications traffic from one network to another as needed. a. The ARPANET b. A Uniform Resource Locator (URL) d. A Wi-Fi c. The Internet Protocol (IP) ANSWER: c 28. The fiber-optic cables that span the globe over land and under sea make up the Internet _____. b. backbone a. ultrastructur e c. layer d. protocol ANSWER: b 29. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices. a. 32-bit b. 64-bit c. 128-bit d. 256-bit ANSWER: c 30. _____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. a. The Web b. A tag c. A cache d. The motherboard ANSWER: a 31. Which of the following is a markup language for defining the visual design of a Web page or group of pages? a. JavaScrip b. Cascading Style Sheets (CSS) t c. Java d. Extensible Markup Language (XML) ANSWER: b 32. The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names. a. registry operators b. accredited domain name registrars d. independent domain name c. network information centers registries ANSWER: b 33. Domain names must always have at least _____ parts, with each part separated by a dot (period). a. two b. three c. four d. five ANSWER: a 34. _____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. Copyright Cengage Learning. Powered by Cognero.

Page 5

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing a. Grid computing c. Utility computing ANSWER: d

b. Distributed computing d. Cloud computing

35. _____ is the standard page description language for Web pages. b. JavaScript a. Extensible Markup Language (XML) c. .NET d. Hypertext Markup Language (HTML) ANSWER: d 36. _____ is a markup language designed to transport and store data on the Web. b. Extensible Markup Language (XML) a. Standard Generalized Markup Language (SGML) d. Hypermedia/Time-based Structuring c. Hypertext Markup Language (HTML) Language (HyTime) ANSWER: b 37. _____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. a. Web browsers b. Web services c. Hyperlinks d. Web forms ANSWER: b 38. Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document. b. subroutine a. cookie s s c. applets d. packets ANSWER: c 39. A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal d. search engine ANSWER: d 40. Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____. a. Web portals b. Web browsers c. Web analytics software d. search engines ANSWER: b 41. _____ is a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. a. Web content streaming b. Search engine optimization Copyright Cengage Learning. Powered by Cognero.

Page 6

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing c. Tunneling ANSWER: b

d. Internet censorship

42. _____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. a. Microwave transmission b. Wireless mesh c. Near field communication d. Wi-Fi (NFC) ANSWER: c 43. In a _____, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network b. bus network c. ring d. mesh network network ANSWER: b 44. The area covered by one or more interconnected wireless access points is commonly called a(n) _____. a. reception area b. hot spot c. coverage d. access zone area ANSWER: b 45. A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. a. very small aperture terminal (VSAT) b. microwave c. low earth orbit (LEO) d. geostationary ANSWER: c 46. A _____ network is one in which all network devices are connected to one another through a single central device called the hub node. b. personal a. mes h c. bus d. star ANSWER: d 47. A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. b. local area network (LAN) a. metropolitan area network (MAN) c. wide area network (WAN) d. personal area network (PAN) ANSWER: a 48. Which of the following statements is true of network-management software? a.One of the disadvantages of networkb.With network-management software, a Copyright Cengage Learning. Powered by Cognero.

Page 7

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing management software is the large amount of time spent on routine tasks. c.Network-management software allows software to be copied, modified, or downloaded legally or illegally.

manager on a networked personal computer can scan for viruses. d.Network-management software complicates the process of updating files and programs on computers on the network.

ANSWER: b 49. When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet. a. Bluetooth b. Wi-Fi c. near field communication d. infrared ANSWER: a 50. When you are looking for a 'hotspot', you are searching for _____. a. a wireless access point b. bluetooth signals c. free charging stations d. strong satellite signals ANSWER: a 51. Which of the following systems can help identify your geolocation? a. Geographic information systems b. Extranets c. VPNs d. GPS ANSWER: d 52. If your home air conditioner has an IP address, it is part of the ____. a. satellite communication network b. virtual private network c. Internet of Things d. satellite communication network ANSWER: c 53. Suppose a business wishes to have access to servers, and storage devices, but does not want to buy them. What is their best choice? a. Internet of Things b. cloud computing - infrastructure as a service c. cloud computing - software as a service Copyright Cengage Learning. Powered by Cognero.

Page 8

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing d. cloud computing - platform as a service ANSWER: b 54. You wish to learn a programming language that can be used on any computer. What language would it be? a. php b. JavaScrip t c. Java d. ASP.Net ANSWER: c 55. Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel ____________. a. will need her own server and IT people to run the server b. can use hosting services c. will need to learn Java d. will need to run her own web server on leased servers ANSWER: b 56. Social journalism or citizen journalism ________. a. is accurate most of the time b. may not be as reliable as mainstream media sources c. is where everyone gets their news feeds d. is a good source for mostly facts ANSWER: b 57. _____ is a good site to develop your professional network. a. LinkedIn b. Faceboo k c. Google d. Twitter ANSWER: a 58. The world-wide-web uses _____ protocol for transmitting content. a. hyper-text transfer b. mail transfer c. uniform resource location d. domain name server ANSWER: a Completion Copyright Cengage Learning. Powered by Cognero.

Page 9

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing 59. _____ is the control or suppression of the publishing or accessing of information on the Internet. ANSWER: Internet censorship 60. The ARPANET was eventually broken into two networks: _____, which included all military sites, and a new, smaller ARPANET, which included all the nonmilitary sites. ANSWER: MILNET 61. Messages on the Internet are typically sent through one or more _____ to reach their destination. ANSWER: routers 62. _____ is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. ANSWER: Tunneling 63. The _____ is the primary method for interacting with the Internet. ANSWER: Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol HTTP 64. _____ computing refers to deployments in which service providers offer their cloud-based services to the general public. ANSWER: Public cloud 65. A(n) _____ is an HTML code that tells the Web browser how to format text—such as a heading, as a list, or as body text—and whether images, sound, and other elements should be inserted. ANSWER: tag 66. _____ is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. ANSWER: JavaScript 67. Using _____, Web users can jump between Web pages stored on various Web servers, creating the illusion of interacting with one big computer. ANSWER: hyperlinks 68. The Uniform Resource Locator (URL) www.cengage.com is an example of a(n) _____ that identifies the Internet host site. ANSWER: domain name 69. Web _____ such as Adobe Flash and Real Player, provide additional features to standard Web sites. ANSWER: plugins 70. _____ is a method of transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded. Copyright Cengage Learning. Powered by Cognero.

Page 10

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing ANSWER: Content streaming 71. A(n) _____ is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. ANSWER: Web log blog 72. The Web, as a computing platform that supports software applications and the sharing of information among users, is referred to as _____. ANSWER: Web 2.0 73. _____ is online, real-time communication between two or more people who are connected to the Internet. ANSWER: Instant messaging 74. The use of social media in business is called _____. ANSWER: Enterprise 2.0 75. The computers and devices on a network are also known as _____. ANSWER: network nodes 76. A(n) ______ is a telecommunications network that connects large geographic areas. ANSWER: wide area network (WAN) wide area network WAN 77. Usually measured in bits per second (bps), _____ refers to the rate at which data is exchanged. ANSWER: channel bandwidth 78. Online ____ vendors use digital rights management to prevent illegal copying. ANSWER: music audio file media file

79. The browsers are the _____ in the worldwide web, whereas the web servers are the servers. ANSWER: clients client machines client computers client solftware client client programs

80. George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see Copyright Cengage Learning. Powered by Cognero.

Page 11

Name :

Clas s:

Dat e:

Chapter 4 - Networks and Cloud Computing if they have what he needs without contacting the salesperson. George is using an _____. ANSWER: extranet

Essay 81. Briefly explain the passing of packets over the Internet. ANSWER The various telecommunications networks that are linked to form the Internet work : much the same way—they pass data around in chunks called packets, each of which carries the address of its sender and its receiver along with other technical information. The set of conventions used to pass packets from one host to another is the Internet Protocol (IP). Many other protocols are used in connection with IP. The best known is the Transmission Control Protocol (TCP). After a network following these standards links to the Internet’s backbone, it becomes part of the worldwide Internet community. 82. Explain the rules that apply to using domain names. ANSWER Domain names always have at least two parts, with each part separated by a dot : (period). For some Internet addresses, the far right part of the domain name is the country code, such as au for Australia, ca for Canada, dk for Denmark, fr for France, de (Deutschland) for Germany, and jp for Japan.. Many Internet addresses have a code denoting affiliation categories, such as com for business sites and edu for education sites. The far left part of the domain name identifies the host network or host provider, which might be the name of a university or a business. 83. Define cloud computing and identify the business benefits of cloud computing. ANSWER Cloud computing refers to a computing environment where software and storage are : provided as an Internet service and accessed with a Web browser. By outsourcing business information systems to the cloud, a business saves on system design, installation, and maintenance. The New York Stock Exchange (NYSE), for example, is starting to offer cloud-computing applications that let customers pay for the services and data they use on Euronext—a European market for stocks, bonds, and other investments. 84. Briefly describe how a Wi-Fi network operates. ANSWER With a Wi-Fi wireless network, a user’s computer, smartphone, or cell phone has a : wireless adapter that translates data into a radio signal and transmits it using an antenna. A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the device’s wireless adapter. 85. How is the Internet of Things different from the world-wide web? ANSWER Internent of Things (IoT) is a collection of objects that send information over the internet to servers, applications or humans. Whereas the worldwide web is made up of : servers that serve web pages written in HTML to client browsers.

Copyright Cengage Learning. Powered by Cognero.

Page 12...


Similar Free PDFs