Chapter 2 2 places all or almost all of the application logic

subject Type Homework Help
subject Pages 9
subject Words 1852
subject Authors Alan Dennis, Alexandra Durcikova, Jerry FitzGerald

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
22.
A “thick client” architecture approach:
a. always is a two-tier network architecture
b. always is an n-tiered architecture
c. places all or almost all of the application logic on the client
d. places all or almost all of the application logic on the server
e. refers to the size of the cable connecting the clients to the network
23.
With the “thin client” architecture, when an application changes, only the _________ with
the application logic needs to be updated.
a. client
b. server
c. middleware
d. hardware
e. software
24.
The idea for a special hypertext network, called the World Wide Web, was conceived of by:
a. Microsoft in 1994 as part of the Windows 95 project
b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in
1989
c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four
computers called ARPANET
d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC
e. the University of Minnesota as an extension of Gopher
page-pf2
25.
Marc Andreessen led a team that developed the first graphical Web browser, which was
called:
a. Internet Explorer
b. Mosaic
c. Firebird
d. Netscape Navigator
e. Mozilla
26.
To interact with the World Wide Web, a client computer needs an application layer software
package called a:
a. Web browser
b. Web server
c. Telnet package
d. Uniform Resource Locator package
e. Router package
27.
Each server on a network that needs to act as a web server needs an application layer
software package called a (n) ______________.
a. browser
b. application web
c. web server
d. operating system
e. none of the above
page-pf3
28.
To get a page from the Web, a user must type in a URL, which stands for:
a. Unknown Resource Locator
b. Unknown Router Location
c. Uniform Router Location
d. Uniform Resource Locator
e. Uniform Resource Library
29.
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web
page from a Microsoft Web server is called the _____________________.
a. Hypertext Transfer Protocol
b. File Transfer Protocol
c. Simple Mail Transfer Protocol
d. Internet Message Access Protocol
e. Hyperlink Transfer Protocol.
30.
There are optional and required parts of an HTTP request. They are:
a. request address, request body
b. request address, request header, request body
c. request line, request header
d. request line, request body
e. request line, request header, request body
31.
There are required and optional parts of an HTTP response. They are:
a. response status, response header, response body
b. response address, response header, response body
c. response status, response body
d. response address, response header
e. response status, response header
page-pf4
32.
A response status code of 404 means:
a. the requested page was not found
b. the server is currently unavailable
c. the sever is currently busy
d. your browser is incompatible with the Web server software.
e. your browser needs to be updated to the latest version.
33.
The acronym, HTML, refers to:
a. Header Markup Language
b. Hypertext Markup Locator
c. Hypertext Markup Language
d. Hypertext Markup Library
e. Hypertext Modulating Language
34.
Which of the following is not an advantage of instant messaging?
a. It usually takes days for an IM message to be delivered to the recipient.
b. It allows real time typed messages to be exchanged.
c. Some products are ICQ and AOL Instant Messenger.
d. It is generally faster than snail-mail.
e. It helps people avoid telephone tag.
35.
The most commonly used e-mail standard is:
a. Simple Mail Transfer Protocol
b. X.400
c. CMC
d. Post Office Protocol
e. Telnet
page-pf5
36.
In a two-tier client-server architecture, a client computer needs to use an application layer
software package called a ________________ to send e-mail:
a. message transfer agent
b. router agent
c. mail user agent
d. Webcast package
e. gateway agent
37.
Which of the following is not an example of a mail user agent software package?
a. Outlook Express
b. Microsoft Word
c. Eudora
d. Microsoft Outlook
e. All of these are mail user agent packages
38.
Another term for a mail user agent is:
a. message transfer agent
b. router agent
c. e-mail client
d. Webcast package
e. Web client
page-pf6
39.
IMAP (Internet Message Access Protocol):
a. is a set of standards that define how email is to be processed between mail servers
b. is exactly the same as SMTP
c. copies an e-mail message from the client computer’s hard disk, deletes it from the
client, and stores it on the mail server
d. is exactly the same as POP
e. permits an e-mail message to remain stored on the mail server even after they have
been read by a client computer
40.
In a ___________ architecture, computers are both client and server, thus sharing the work.
a. Host-based
b. Client-based
c. Client-server
d. Peer-to-peer
e. Network
41.
The acronym, MIME, refers to:
a. Multimedia Internet Mail Enterprise
b. Multiple Internet Media Extension
c. Multipurpose Internet Mail Extension
d. Media Internet Mail Extension
e. Multimedia Internet Mime Extension
42.
One of the most frequently used Telnet applications is
a. WS-FTP
b. PuTTY
c. Outlook
d. Word
e. FTP
page-pf7
43.
What technique is used by most videoconferencing applications to reduce the amount of data
being transmitted?
a. hashing
b. encryption
c. authentication
d. identification
e. compression
44.
Which of the following is not true about Telnet?
a. Telnet requires an application layer program on the client computer and an
application layer program on the server or host computer.
b. Telnet poses no security threat.
c. Telnet was designed in the early days of the Internet.
d. Keystrokes are sent over the network in clear text.
e. One program that conforms to the Telnet standard is PuTTY.
45.
_________ is a special type of one directional; videoconferencing in which content is sent
from the server to the user.
a. broadcasting
b. instant messaging
c. webcasting
d. H.323
e. Net Meeting.
46. In a host-based system with a mainframe, upgrades to the host are _____________.
a. Small
b. Cheap
c. Lumpy
d. Never going to happen
e. Always performed annually
page-pf8
47. The software that runs on the mail server is referred to as the ____________
a. Mail transfer agent
b. Mail user agent
c. Microsoft Outlook
d. Web server
e. SMTP
48. The standards H.320, H.323, and MPEG-2 are commonly used with
a. Telnet
b. Videoconferencing
c. Email
d. IM
e. Microsoft Office
50. The ________________ cloud deployment model provides the highest levels of control,
privacy and security.
a. private
b. public
c. community
d. hybrid
51. The ________________ clouds realize the benefits from cloud infrastructure (such as
speed of deployment) with the added level of privacy and security that private clouds offer.
a. private
b. public
c. community
d. hybrid
page-pf9
52. With ______________, the cloud provider manages the hardware including servers,
storage, and networking components. The organization is responsible for all the software,
including operating system (and virtualization software), database software, and its
applications and data.
a. private clouds
b. hardware clouds
c. storage services
d. IaaS
Essay and Short Answer Questions
1. Describe the history of the Internet and the Web (part of this is in Chapter 1, part
in Chapter 2). Where do you forsee the future evolution of the Internet heading,
and why?
2. What do the following tools enable you to do: the Web, email, Telnet, IM?
3. How can the Internet be used for competitive advantage in business? Describe
three firms which are using the Internet for conducting business, and speculate as
to the underlying technologies which might be in use in these firms. Will the
Internet become an essential business tool like the telephone or will it go the way
of the dinosaurs? What do you envision the Internet and web becoming in the
future for businesses? Discuss.
4. For what is HTTP used? What are its major parts? Are all required?
5. For what is HTML used? What are its major parts? Are all required?
6. Describe how a Web browser and Web server work together to send a web page
to a user.
7. Describe how mail user agents and message transfer agents work together to
transfer mail messages, including a diagram.
8. Describe the difference between a two tier and three tier email message transfer,
using diagrams and discussing how this approach differs from the two layer email
transfer. Do users always require the same architecture for email? Why or why
not? Discuss.
9. What is MIME? What does it stand for? Why was it developed?
10. What are the standards SMTP, POP, and IMAP? What roles do SMTP, POP, and
IMAP play in sending and receiving email on the Internet? What do these
acronyms stand for?
11. What are the major parts of an email message?
12. What is X.400 and CMC?
13. What is cloud computing and how is it useful?
14. What is Telnet and why is it useful?
15. What is IM? How does it work?
17. Discuss the functions of a web browser. Describe two web browsers. What was
the first graphical Web browser? What are three search engines that you might
use to find information on the Internet?
18. What are the three major parts of an HTTP request and what information does
each part contain? Why does HTTP include a version number as part of the
packet?
19. What do a user agent and message transfer agent do in an SMTP/IMAP email
system? What are some examples of user agent packages?
20. Describe a two-tier, three-tier and n-tier architecture. What is a network
architecture? Compare and contrast two-tiered, three-tiered, and n-tiered client
server architectures. What are the technical differences and what advantages and
disadvantages do each offer? How does a two-tier client server network differ
from an n-tier client server network. Describe one advantage and one
disadvantage that a three-tier architecture has compared to a two-tier architecture.
21. What are the advantages and disadvantages of host-based networks versus client-
server networks? Explain two major benefits and/or limitations of client-server
networks compared to host-based networks.
22. What is middleware and what does it do?
23. Suppose your organization was contemplating switching from a host-based
architecture to client-server. What problems would you foresee?
24. Compare private, public, and community cloud architectures.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.