Thursday 26 January 2017

TEST BANK OF SYSTEMS ARCHITECTURE 7TH EDITION BY BURD





IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download





If You Face Any Problem E- Mail Us At  whisperhills@gmail.com


Chapter 13 Internet and Distributed Application Services

1. A server manages system resources and provides access to these resources through a well-defined communication interface.​


2. ​A server hosts a single service or resource.


3. ​The client/server architectural model can be applied in many ways.


4. ​Three-layer architecture simplifies distributing or replicating application software across a network.


5. ​As OSs have evolved, they have incorporated fewer and fewer middleware functions.


6. ​Advantages of P2P architecture include improved scalability and reducing the number of computer and network connections needed to support an application.


7. ​With P2P architecture, there are more potential bottlenecks and points of failure.


8. ​An operating system’s primary role is to manage hardware, software, and data resources.


9. ​Static connections are easy to initialize and maintain.


10. ​Every IP packet carries the destination node’s IP address.


11. ​Every network attached to the Internet has at least one server designated as a DNS server.


12. ​In large networks, responsibility for maintaining directory content and answering queries is centralized to a few individuals who manage the network.


13. ​LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).


14. ​A fully qualified DN specifies a complete path from a directory root node through one or more container objects to a specific object.


15. ​LDAP queries contain plaintext characters and the syntax is simple and straight forward.


16. ​There is a standard objectclass or attribute name for all entities and resources common to most directories, such as people and shared printers.


17. ​Active Directory is based on LDAP and DNS, so it responds to standard LDAP information requests and uses LDAP concepts, such as objectclasses and OUs, to store and organize directory information hierarchically.


18. ​A port number is an unsigned 24-bit integer


19. ​HTML extends XML to describe the structure, format, and content of documents.


20. ​HTTPS is the “secure” version of HTTP


21. ​SMTP and MIME are protocols that enable a user on one Internet host to interact with the OS command layer of another Internet host.


22. ​A web browser can pass parameters to a script on a Web server using the RPC protocol.


23. ​Users access Web applications via a URL.


24. ​Three current distribution modes that fit in the cloud computing paradigm are support as a service, platform as a service and infrastructure as a service.


25. ​SaaS has substantial benefits from a consumer perspective.


26. ​Data- and graphics-intensive applications can use ordinary Internet connections as part of SaaS.


27. ​IaaS can be structured for only part of an application’s infrastructure requirements.


28. ​Vendor lock-in is a recent phenomenon with the advent of SaaS.


29. ​The risk of vendor lock-in is lower with SaaS because most vendors use similar virtualization environments.


30. ​Vendor lock-in risk rises with PaaS because the vendor provides system software components in addition to hardware.


31. ​____ are composed of software components distributed across many computer systems and geographic locations.


32. ​Distributing parts of an information system across many computer systems and locations is called ____.


33. ​____ is a method of organizing software to provide and access distributed information and computing resources.


34. ​In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.


35. ​In ____ architecture, the roles of client and server are combined into a single application or group of related applications.


36. ​Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.


37. ​Before accessing a remote resource, a user or system administrator must know the server and resource names to create a ____.


38. ​In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.


39. ​With ____, a resource user asks for a resource, and if it isn’t found in the local resource registry, the resource locator searches for it in external locations.


40. ​A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.


41. ​The term ____ describes middleware that stores the name and network address of distributed resources, responds to directory queries, accepts directory updates, and synchronizes replicated or distributed directory copies.


42. ​In an LDAP directory, a(n) ____ defines the attributes common to all member objects.


43. ​All objects in an LDAP schema have a(n) ____ attribute.


44. ​Microsoft ____ is the directory service and security system built into Windows Server.


45. ​A(n) ____ describes rights granted or denied to users, groups, and computers for accessing resources in Active Directory.


46. ​Active Directory clients rely on a ____ to locate Active Directory servers.


47. ​A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.


48. ​____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messages between components in a large program.


49. ​With the ____ protocol, a process on one machine can call a process on another machine.


50. ​Web resources are identified by a unique ____.


51. ​____ is an improved version of Telnet that encrypts data flowing between client and server to address a major security issue in Telnet.


52. ​SMTP was extended by the ____ protocol to allow including nontext files in e-mail messages.


53. ​Under ____, e-mail messages are held on the server temporarily, downloaded to the client when a connection is established, and deleted from the server as soon as the download is finished.


54. ​A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.


55. ​____ specifies the middleware objects use to interact across networks.


56. In CORBA, ____ is a service that maintains a component directory and routes messages between components.


57. In CORBA, ____ is a component message-passing protocol.


58. ​____, a Microsoft specification for component interoperability, has its roots in older Microsoft specifications, including Object Linking and Embedding (OLE) and the Component Object Model (COM).


59. ____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.


60. ​____ enable developers to create user interfaces that run on a server but interact with a client Web browser or component.


61. ​The term ____ summarizes recent coarse-grained approaches to distributing and accessing software and hardware services across the Internet.


62. ​____ is a Web-based architectural approach in which users interact via a Web browser or other Web-enabled view layer with application software provided by a third party.


63. ​____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.


64. ​____ is a key supporting technology in IaaS because it enables a customer/user to configure application and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.


65. ​The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer’s information system.


66. ​A(n) ____________________ uses the communication interface to request resources, and the server responds to these requests.

67. ​In a three-layer architecture, the ____________________ layer manages stored data, usually in databases.

68. In a three-layer architecture, the ____________________ layer carries out the rules and procedures of business processing.

69. ​The term ____________________ describes software that “glues” together parts of a client/server or multitier application.

70. ​A network ____________________ is a computer’s doorway to external resources, such as Web sites and applications, databases, shared files and folders, and shared I/O devices.

71. ​In static resource connections, the ____________________ acts as a router for resource access requests arriving from local and remote users and application programs.

72. An LDAP ____________________ stores information about LDAP objects.

73. LDAP objects are organized in a(n) ____________________ directory structure.

74. A distinguished name (DN) attribute uniquely identifies an object in a(n) ____________________.

75. A(n) ____________________ is a unique combination of an IP address and a port number, separated by a colon.

76. ​A(n) ____________________ pipe is a pipe with two additional features including a name that’s permanently placed in a file system directory and the capability to communicate between processes on different computers.

77. When a named pipe is created, a(n) ____________________ is also created in the local file system.

78. ​Web resources are identified and accessed via a(n) ____________________.

79. ​____________________ extends HTML to describe the structure, format, and content of documents.

80. ____________________ is a secure version of HTTP that encrypts HTTP requests and responses.

81. ​The earliest e-mail protocol is ____________________, which defines how text messages are forwarded and routed between Internet hosts.

82. ____________________ extends POP3 to permanently store and manage e-mail messages on the server, which enables users to access stored e-mail from any Internet host.

83. ​____________________ embedded in HTML pages can perform many functions that full-fledged programs can, without the need for compiling or link editing.

84. ​____________________ are important in software development because complex programs and applications can be constructed from smaller previously developed parts.

85. ​Interoperability across hardware or software components requires well-defined and widely adopted ____________________.

86. ​SOAP messages can be transmitted by using other protocols, such as FTP and SMTP, but ____________________ is the most common transmission protocol.

87. ​In the 1990s, the term ____________________ was coined to describe this design philosophy, partly reflecting the growing dominance of client/server architecture.

88. ​With ____________________, a customer is forced to continue using a vendor because of high cost or other difficulties in switching.

89. ​What advantages do protocol stacks provide for implementing network I/O and services.

90. ​What happens when a resource access request is sent to the local resource locator?

91. ​What are the steps in the calling process for a remote procedure call?

92. ​Explain the term cloud computing.

93. ​Why are some organizations unwilling to embrace SaaS fully?



No comments:

Post a Comment