BCIS Quiz 6

Card Set Information

Author:
malpal84
ID:
264770
Filename:
BCIS Quiz 6
Updated:
2014-03-02 23:41:06
Tags:
BCIS Quiz
Folders:

Description:
BCIS Quiz 6
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user malpal84 on FreezingBlue Flashcards. What would you like to do?


  1. What are the three tiers in three-tier architecture?

    A) router, switch, and access point
    B) user, server, and database
    C) TCP, IP, and HTTP
    D) HTML, XML, and SGML
    User, server, and database
  2. A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

    A) switch
    B) modem
    C) codec
    D) port
    Switch
  3. ________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

    A) ADSL
    B) DSL
    C) Cable
    D) Dial-up
    Cable
  4. A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.

    A) narrowband
    B) modem
    C) router
    D) access point
    Router
  5. A(n) ________ is a piece of a message that is handled by programs that implement IP.

    A) email
    B) attribute
    C) packet
    D) tag
    Packet
  6. A(n) ________ is a number that identifies a particular device.

    A) hyperlink
    B) IP address
    C) domain
    D) href
    IP address
  7. A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.

    A) HTML tag
    B) hyperlink
    C) domain
    D) IP address
    HTML tag
  8. For a printer or laptop to connect to a wireless LAN, it must have a ________.

    A) UTP cable
    B) DSL
    C) WNIC
    D) hyperlink
    WNIC
  9. A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

    A) application
    B) database
    C) server
    D) network
    Network
  10. A ________ is a worldwide-unique name that is affiliated with a public IP address.

    A) tag
    B) domain name
    C) trademark
    D) URL
    Domain name
  11. Which of the following TCP/IP application-layer protocols is used for email transmission?

    A) FTP
    B) IP
    C) SMTP
    D) HTTPS
    SMTP
  12. The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

    A) SMTP
    B) IP
    C) TCP
    D) HTTP
    IP
  13. ________ is the most common language for defining the structure and layout of Web pages.

    A) DSL
    B) URL
    C) XML
    D) HTML
    HTML
  14. Which of the following is true of DSL modems?

    A) DSL modem signals do not interfere
    with telephone signals.
    B) DSL data transmission and telephone conversations cannot occur simultaneously.
    C) DSL modem signals replace phone signals and are sent to the ISP.
    D) DSL modems use the same protocols as cable modems for data transmission.
    DSL modem signals do not interfere with telephone signals
  15. Which of the following is the most basic cloud offering?

    A) PaaS
    B) SaaS
    C) VPN
    D) IaaS
    IaaS
  16. The IEEE 802.3 protocol standard is also known as ________.


    A) Internet
    B) Ethernet
    C) Bluetooth
    D) Intranet
    Ethernet
  17. The organization responsible for assigning public IP addresses is called ________.


    A) IEEE
    B) ISO
    C) ICANN
    D) CERN
    ICANN
  18. Which of the following statements is true about the IEEE 802.11 protocol?

    A) It is used for wired LAN connections.
    B) It cannot be processed by access points.
    C) It allows speeds of up to 600 Mbps.
    D) It is also known as Ethernet.
    It allows speeds of up to 600 Mbps.
  19. Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

    A) HTTP
    B) FTP
    C) HTTPS
    D) IP
    FTP
  20. A private internet that is used exclusively within an organization is called a(n) ________.

    A) Ethernet
    B) server
    C) intranet
    D) cloud
    Intranet
  21. The top layer of TCP/IP Protocol architecture is related to ________.

    A) applications
    B) transport
    C) internets
    D) data links
    Applications
  22. To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

    A) three-tier system
    B) virtual private network
    C) remote access system
    D) layered protocol
    Layered protocol
  23. ________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

    A) IPv6
    B) Bluetooth
    C) Silverlight
    D) PaaS
    Bluetooth
  24. ________ typically have transmission speeds less than 56 Kbps.

    A) WAN wireless connections
    B) Narrowband lines
    C) Digital subscriber lines
    D) Cable modems
    Narrowband lines
  25. ________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.

    A) Web sites
    B) Web farms
    C) Web browsers
    D) Web servers
    Web servers
  26. Which of the following statements is true about IEEE 802.3?

    A) It is the protocol for Bluetooth.
    B) It is the protocol for wired LAN connections.
    C) It is the universal standard protocol for WNICs.
    D) It is the protocol for wireless LAN connections.
    It is the protocol for wired LAN connections
  27. Which of the following is the most common format for IP addresses?

    A) TCP
    B) IPv6
    C) IPv4
    D) HTTP
    IPv4
  28. Communications speeds are expressed in ________.

    A) bytes
    B) hertz
    C) packets
    D) bits
    Bits
  29. Communications speeds are expressed in ________.

    A) bytes
    B) hertz
    C) packets
    D) bits
    Hyperlink
  30. A(n) ________ uses the Internet to create the appearance of private point-to-point connections.

    A) router
    B) DSL
    C) ISP
    D) VPN
    VPN
  31. Compared to in-house hosting, cloud-based hosting ________.

    A) provides better disaster preparedness capabilities
    B) requires a significant amount of capital
    C) minimizes the risk of investing in technology that will soon become obsolete
    D) provides greater control over the location of data
    Minimizes the risk of investing in technology that will soon become obsolete
  32. A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?

    A) PaaS
    B) SaaS
    C) IaaS
    D) VPN
    PaaS
  33. In cloud computing, resources are said to be "pooled" because ________.

    A) organizations offer their services to each other free of charge, in a give-and-take arrangement
    B) organizations use the public Internet to create the appearance of a private connection
    C) organizations share the same physical hardware through virtualization
    D) organizations use open source standards which enable users to modify a program's source code
    Organizations share the same physical hardware through virtualization
  34. Amazon S3 (Simple Storage Service) is an example of ________.

    A) IaaS
    B) SaaS
    C) PaaS
    D) VPN
    IaaS
  35. An HTML document has a(n) ________ that provides metadata about the page.

    A) tag
    B) attribute
    C) heading
    D) href
    Heading
  36. Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

    A) the cloud
    B) wiki
    C) Bluetooth
    D) broadband
    The cloud
  37. Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

    A) the cloud
    B) wiki
    C) Bluetooth
    D) broadband
    The cloud
  38. A ________ is a set of rules that programs on two communicating devices follow.

    A) protocol
    B) codec
    C) URL
    D) packet
    Protocol
  39. Which of the following protocols is concerned with the application layer of TCP/IP Protocol
    architecture?

    A) HTTP
    B) IP
    C) IEEE 802.11
    D) IEEE 802.3
    HTTP
  40. An ________ and its value indicate which Web page is to be displayed when a user clicks on a link.

    A) IPv4
    B) IaaS
    C) href
    D) IPv6
    href
  41. Which of the following is true about a VPN?

    A) It utilizes private networks instead of the public network.
    B) It appears as a secure connection, though it is not.
    C) It encrypts messages to ensure secure transmissions.
    D) It does not provide users with remote access.
    It encrypts messages to ensure secure transmissions
  42. Which of the following is an example of IaaS?

    A) Microsoft Azure
    B) Office 365
    C) Apple iCloud
    D) Amazon EC2
    Amazon EC2
  43. Computers that reside in different geographic locations are connected using a(n) ________.

    A) WAN
    B) URL
    C) IP address
    D) LAN
    WAN
  44. Which of the following is a function of an ISP?

    A) It transmits data over short distances, replacing cables.
    B) It connects computers within a LAN.
    C) It serves as a gateway to the Internet.
    D) It describes how messages must be processed for wired transmission.
    It serves as a gateway to the Internet
  45. Which of the following is an example of a PaaS?

    A) Amazon EC2
    B) Oracle on Demand
    C) Office 365
    D) Apple iCloud
    Oracle on Demand
  46. Which of the following protocols guarantees secure data transmission?

    A) FTP
    B) SMTP
    C) HTTP
    D) HTTPS
    HTTPS
  47. Most LAN connections are made using ________.

    A) STP cable
    B) UTP cable
    C) Sc/TP cable
    D) F/TP cable
    UTP cable

What would you like to do?

Home > Flashcards > Print Preview