IF You Want To Purchase A+ Work Then Click The Link
Below , Instant Download
Chapter
13 Internet and Distributed Application Services
1. A server manages system resources and provides access to
these resources through a well-defined communication interface.
|
2. A server hosts a single service or resource.
|
3. The client/server architectural model can be applied in
many ways.
|
4. Three-layer architecture simplifies distributing or
replicating application software across a network.
|
5. As OSs have evolved, they have incorporated fewer and
fewer middleware functions.
|
6. Advantages of P2P architecture include improved
scalability and reducing the number of computer and network connections
needed to support an application.
|
7. With P2P architecture, there are more potential
bottlenecks and points of failure.
|
8. An operating system’s primary role is to manage
hardware, software, and data resources.
|
9. Static connections are easy to initialize and maintain.
|
10. Every IP packet carries the destination node’s IP
address.
|
11. Every network attached to the Internet has at least
one server designated as a DNS server.
|
12. In large networks, responsibility for maintaining
directory content and answering queries is centralized to a few individuals
who manage the network.
|
13. LDAP defines several standard container object types,
including Country (C), Organization (O), and Organizational Unit (OU).
|
14. A fully qualified DN specifies a complete path from a
directory root node through one or more container objects to a specific
object.
|
15. LDAP queries contain plaintext characters and the
syntax is simple and straight forward.
|
16. There is a standard objectclass or attribute name for
all entities and resources common to most directories, such as people and
shared printers.
|
17. Active Directory is based on LDAP and DNS, so it
responds to standard LDAP information requests and uses LDAP concepts, such
as objectclasses and OUs, to store and organize directory information
hierarchically.
|
18. A port number is an unsigned 24-bit integer
|
19. HTML extends XML to describe the structure, format,
and content of documents.
|
20. HTTPS is the “secure” version of HTTP
|
21. SMTP and MIME are protocols that enable a user on one
Internet host to interact with the OS command layer of another Internet host.
|
22. A web browser can pass parameters to a script on a Web
server using the RPC protocol.
|
23. Users access Web applications via a URL.
|
24. Three current distribution modes that fit in the cloud
computing paradigm are support as a service, platform as a service and
infrastructure as a service.
|
25. SaaS has substantial benefits from a consumer
perspective.
|
26. Data- and graphics-intensive applications can use
ordinary Internet connections as part of SaaS.
|
27. IaaS can be structured for only part of an
application’s infrastructure requirements.
|
28. Vendor lock-in is a recent phenomenon with the advent
of SaaS.
|
29. The risk of vendor lock-in is lower with SaaS because
most vendors use similar virtualization environments.
|
30. Vendor lock-in risk rises with PaaS because the vendor
provides system software components in addition to hardware.
|
31. ____ are composed of software components distributed
across many computer systems and geographic locations.
|
32. Distributing parts of an information system across
many computer systems and locations is called ____.
|
33. ____ is a method of organizing software to provide and
access distributed information and computing resources.
|
34. In a three-layer architecture, the _____ layer accepts
user input and formats and displays processing results.
|
35. In ____ architecture, the roles of client and server
are combined into a single application or group of related applications.
|
36. Software implementing the Transport, Internet, and
Network Interface layers of the TCP/IP model is commonly called a(n) ____.
|
37. Before accessing a remote resource, a user or system
administrator must know the server and resource names to create a ____.
|
38. In static resource connections, the resource locator
maintains a ____ containing the names and locations of known resources and
services.
|
39. With ____, a resource user asks for a resource, and if
it isn’t found in the local resource registry, the resource locator searches
for it in external locations.
|
40. A ____ server maintains a registry of names and
corresponding IP addresses for each node on the local network.
|
41. The term ____ describes middleware that stores the
name and network address of distributed resources, responds to directory
queries, accepts directory updates, and synchronizes replicated or
distributed directory copies.
|
42. In an LDAP directory, a(n) ____ defines the attributes
common to all member objects.
|
43. All objects in an LDAP schema have a(n) ____
attribute.
|
44. Microsoft ____ is the directory service and security
system built into Windows Server.
|
45. A(n) ____ describes rights granted or denied to users,
groups, and computers for accessing resources in Active Directory.
|
46. Active Directory clients rely on a ____ to locate
Active Directory servers.
|
47. A ____ is a region of shared memory through which
multiple processes executing on the same machine can exchange data.
|
48. ____ are commonly used for communication between OS
components, for queuing requests to an OS service, and for exchanging
messages between components in a large program.
|
49. With the ____ protocol, a process on one machine can
call a process on another machine.
|
50. Web resources are identified by a unique ____.
|
51. ____ is an improved version of Telnet that encrypts
data flowing between client and server to address a major security issue in
Telnet.
|
52. SMTP was extended by the ____ protocol to allow
including nontext files in e-mail messages.
|
53. Under ____, e-mail messages are held on the server
temporarily, downloaded to the client when a connection is established, and
deleted from the server as soon as the download is finished.
|
54. A(n) ____ is a standardized, interchangeable software
module that is executable, has a unique identifier and has a well-known
interface.
|
55. ____ specifies the middleware objects use to interact
across networks.
|
56. In CORBA, ____ is a service that maintains a component
directory and routes messages between components.
|
57. In CORBA, ____ is a component message-passing protocol.
|
58. ____, a Microsoft specification for component
interoperability, has its roots in older Microsoft specifications, including
Object Linking and Embedding (OLE) and the Component Object Model (COM).
|
59. ____ is an open standard, developed by the World Wide
Web Consortium, for distributed object interaction that attempts to address
the shortcomings of both CORBA and COM+.
|
60. ____ enable developers to create user interfaces that
run on a server but interact with a client Web browser or component.
|
61. The term ____ summarizes recent coarse-grained
approaches to distributing and accessing software and hardware services
across the Internet.
|
62. ____ is a Web-based architectural approach in which
users interact via a Web browser or other Web-enabled view layer with
application software provided by a third party.
|
63. ____ describes an architectural approach in which an
organization rents access to system software and hardware on which it
installs its own application software and other services.
|
64. ____ is a key supporting technology in IaaS because it
enables a customer/user to configure application and system software for a
generic platform as virtual servers and then deploy these servers to a
third-party hosting site.
|
65. The highest vendor lock-in risk occurs with ____
because the vendor controls all key components of the customer’s information
system.
|
66. A(n) ____________________ uses the communication
interface to request resources, and the server responds to these requests.
|
67. In a three-layer architecture, the
____________________ layer manages stored data, usually in databases.
|
68. In a three-layer architecture, the ____________________
layer carries out the rules and procedures of business processing.
|
69. The term ____________________ describes software that
“glues” together parts of a client/server or multitier application.
|
70. A network ____________________ is a computer’s doorway
to external resources, such as Web sites and applications, databases, shared
files and folders, and shared I/O devices.
|
71. In static resource connections, the
____________________ acts as a router for resource access requests arriving
from local and remote users and application programs.
|
72. An LDAP ____________________ stores information about
LDAP objects.
|
73. LDAP objects are organized in a(n) ____________________
directory structure.
|
74. A distinguished name (DN) attribute uniquely identifies
an object in a(n) ____________________.
|
75. A(n) ____________________ is a unique combination of an
IP address and a port number, separated by a colon.
|
76. A(n) ____________________ pipe is a pipe with two
additional features including a name that’s permanently placed in a file
system directory and the capability to communicate between processes on
different computers.
|
77. When a named pipe is created, a(n) ____________________
is also created in the local file system.
|
78. Web resources are identified and accessed via a(n)
____________________.
|
79. ____________________ extends HTML to describe the
structure, format, and content of documents.
|
80. ____________________ is a secure version of HTTP that
encrypts HTTP requests and responses.
|
81. The earliest e-mail protocol is ____________________,
which defines how text messages are forwarded and routed between Internet
hosts.
|
82. ____________________ extends POP3 to permanently store
and manage e-mail messages on the server, which enables users to access
stored e-mail from any Internet host.
|
83. ____________________ embedded in HTML pages can
perform many functions that full-fledged programs can, without the need for
compiling or link editing.
|
84. ____________________ are important in software
development because complex programs and applications can be constructed from
smaller previously developed parts.
|
85. Interoperability across hardware or software
components requires well-defined and widely adopted ____________________.
|
86. SOAP messages can be transmitted by using other
protocols, such as FTP and SMTP, but ____________________ is the most common
transmission protocol.
|
87. In the 1990s, the term ____________________ was coined
to describe this design philosophy, partly reflecting the growing dominance
of client/server architecture.
|
88. With ____________________, a customer is forced to
continue using a vendor because of high cost or other difficulties in
switching.
|
89. What advantages do protocol stacks provide for
implementing network I/O and services.
|
90. What happens when a resource access request is sent to
the local resource locator?
|
91. What are the steps in the calling process for a remote
procedure call?
|
92. Explain the term cloud computing.
|
93. Why are some organizations unwilling to embrace SaaS
fully?
|
No comments:
Post a Comment