click below
click below
Normal Size Small Size show me how
CEN4021 Chapter 12
| Question | Answer |
|---|---|
| The computing architecture in which the server performs practically all of the work is known as _____. | server-based architecture |
| Which of the following is NOT one of the four basic functions of a computer application? | networking logic |
| A server can be a(n) _____ | mainframe |
| The application function that allows data to be stored and retrieved is called _____. | data storage |
| A server in the client-server architecture performs which of the following application functions? | data access logic and data storage |
| What is one primary problem with server-based computing architectures? | As more users place heavier demands on the server, it is expensive to increase server capacity. |
| Scalability refers to the _____. | easy increase or decrease of the storage and processing capabilities of the computer |
| In an n-tiered architecture, the _____ is spread across two or more different sets of servers. | application logic |
| Which of the following is the general term for the middleware between the clients and servers? | DOC |
| The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____. | interface capabilities, control and security, scalability |
| Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. The architecture Ethan should select is _____. | client-server |
| A network model will depict _____. | all of the above |
| Elements of a deployment diagram include _____. | Nodes, artifacts, and communication paths |
| Which one of the following type of operational requirements attempts to anticipate the future requirements? | Maintainability requirements |
| Which one of the following is not part of the security requirements? | Capacity requirements |
| In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________. | Encrypt data, decrypt data |
| The public key infrastructure (PKI) is ______. | all of the above |
| Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year. | 90 |
| Systems designed to handle multiple languages on the fly are ____ multilingual systems. | concurrent |
| Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems. | unstated |