Which of the following characteristics is a disadvantage of cloud-based hosting?

The term ________, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.

A) elastic

B) portable

C) programmatic

D) pooled

A) elastic

Cloud resources are ________ because many different organizations use the same physical hardware.

A) pooled

B) programmatic

C) elastic

D) portable

A) pooled

Which of the following is a characteristic of cloud-based hosting?

A) full control of data location

B) in-depth visibility of security

C) no obsolesce

D) unknown cost structure

C) no obsolesce

Which of the following is a characteristic of in-house hosting?

A) small capital requirements

B) known cost structure

C) industry-wide economies of scale

D) in-depth visibility of disaster preparedness

D) in-depth visibility of disaster preparedness

Which of the following is a characteristic of in-house hosting?

A) control of data location

B) speedy development

C) superior adaptability to fluctuating demand

D) possibly the best disaster preparedness

A) control of data location

Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves significant requirement of capital.

B) It involves high annual maintenance costs.

C) It involves high dependency on vendor.

D) It involves high ongoing support costs.

C) It involves high dependency on vendor.

Which of the following characteristics is a disadvantage of in-house hosting?

A) lack of visibility into security details

B) cost uncertainties

C) loss of control over data location

D) dependency on vendor

B) cost uncertainties

Which of the following characteristics is a disadvantage of cloud-based hosting?

A) ongoing support costs

B) loss of control over data location

C) increased management requirements

D) significant development effort

B) loss of control over data location

Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors

B) expensive data storage

C) advent of private IP addressing

D) advent of virtualization

D) advent of virtualization

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) the cloud

B) Bluetooth

C) broadband

D) wiki

A) the cloud

In cloud computing, resources are said to be "pooled" because organizations ________.

A) share the same physical hardware through virtualization

B) offer their services to each other free of charge, in a give-and-take arrangement

C) use open source standards that enable users to modify a program's source code

D) use the public Internet to create the appearance of a private connection

A) share the same physical hardware through virtualization

Compared to in-house hosting, cloud-based hosting ________.

A) provides greater control over the location of data

B) requires a significant amount of capital

C) provides better vision of disaster preparedness capabilities

D) minimizes the risk of investing in technology that will soon become obsolete

D) minimizes the risk of investing in technology that will soon become obsolete

Which of the following is a benefit of in-house hosting?

A) lower capital requirements

B) superior flexibility and adaptability to growing or fluctuating demand

C) fewer training requirements

D) in depth visibility of security and disaster preparedness

D) in depth visibility of security and disaster preparedness

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database

B) network

C) server

D) application

B) network

Which of the following features distinguishes a LAN from a WAN?

A) WAN has relatively lower bandwidth

B) LAN connects computers in a single location.

C) LAN has stringent hardware requirements

D) WAN has a limit on the number of users

B) LAN connects computers in a single location.

Computers that reside in different geographic locations are connected using a(n) ________.

A) XML

B) URL

C) LAN

D) WAN

D) WAN

A private internet that is used exclusively within an organization is called a(n) ________.

A) server

B) cloud

C) intranet

D) Ethernet

C) intranet

A ________ is a set of rules that programs on two communicating devices follow.

A) cloud

B) codec

C) packet

D) protocol

D) protocol

To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol

B) three-tier system

C) virtual private network

D) remote access system

A) layered protocol

A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) modem

B) codec

C) switch

D) port

C) switch

The IEEE 802.3 protocol standard is also known as ________.

A) Ethernet

B) Bluetooth

C) Internet

D) intranet

A) Ethernet

Which of the following statements is true about IEEE 802.3?

A) It is the universal standard protocol for all WAN connections.

B) It is the protocol for wired LAN connections.

C) It is the protocol for wireless LAN connections.

D) It is the protocol for Bluetooth.

B) It is the protocol for wired LAN connections.

Communications speeds are expressed in ________.

A) bytes

B) hertz

C) packets

D) bits

D) bits

Which of the following statements is true about the IEEE 802.11ac protocol?

A) It is used for wired LAN connections.

B) It allows speeds of up to 1.3 Gbps.

C) It cannot be processed by access points.

D) It is also known as Ethernet.

B) It allows speeds of up to 1.3 Gbps.

________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) Bluetooth

B) IPv4

C) IPv6

D) PaaS

A) Bluetooth

Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.

B) It connects computers within a LAN.

C) It serves as a gateway to the Internet.

D) It describes how messages must be processed for wired transmission.

C) It serves as a gateway to the Internet.

Which of the following is true of digital subscriber line signals?

A) Digital subscriber line signals use the same protocols as cable modems do for data transmission.

B) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.

C) Digital subscriber line signals do not interfere with telephone signals.

D) Digital subscriber line signals replace phone signals and are sent to the ISP.

C) Digital subscriber line signals do not interfere with telephone signals.

________ signals do not interfere with TV signals, even though they use the same lines.

A) Cable

B) Dial-up

C) DSL

D) ADSL

A) Cable

Which of the following is true about cable lines?

A) They provide faster download speeds than DSL modems.

B) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.

C) They offer consistent performance, irrespective of the number of users sending and receiving data.

D) They provide high-speed data transmission using telephone cables.

B) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.

A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes

B) megabits

C) kilobits

D) kilobytes

B) megabits

For communications equipment, k stands for ________.

A) 500

B) 512

C) 1024

D) 1000

D) 1000

________ has speeds that range between 500 Kbps and 1.7 Mbps.

A) DSL modem to ISP

B) Cable modem to ISP

C) Wireless LAN

D) Wireless WAN

D) Wireless WAN

Which of the following is a sophisticated protocol that enables several devices to use the same frequency?

A) Wireless WAN

B) Cable modem to ISP

C) DSL modem to ISP

D) Wireless LAN

A) Wireless WAN

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A) SMTP

B) HTTP

C) TCP/IP

D) FTP

C) TCP/IP

Which of the following protocols guarantees secure data transmission?

A) ftp

B) smtp

C) http

D) https

D) https

Which of the following TCP/IP application-layer protocols is used for email transmissions?

A) IP

B) smtp

C) https

D) ftp

B) smtp

Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

A) https

B) ftp

C) smtp

D) http

B) ftp

A(n) ________ is a number that identifies a particular device.

A) hyperlink

B) IP address

C) href

D) domain

B) IP address

The organization responsible for assigning public IP addresses is called ________.

A) CERN

B) IEEE

C) ICANN

D) ISO

C) ICANN

Which of the following is the most common format for IP addresses?

A) TCP

B) IPv6

C) HTTP

D) IPv4

D) IPv4

A ________ is a worldwide-unique term that is affiliated with a public IP address.

A) packet

B) hyperlink

C) URL

D) domain name

D) domain name

The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page.

A) IP address

B) URL

C) email ID

D) protocol

B) URL

Which of the following refers to the three tiers in the three-tier architecture?

A) TCP, IP, and HTTP

B) HTML, XML, and JSON

C) user, server, and database

D) tunnel, switch, and access point

C) user, server, and database

The ________ tier of three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.

A) server

B) data link

C) user

D) database

C) user

________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.

A) Server farms

B) Web servers

C) Web browsers

D) Server racks

B) Web servers

________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead.

A) XML

B) SOAP

C) WSDL

D) JSON

A) XML

________ is a standard for describing the services, inputs and outputs, and other data supported by a web service.

A) XML

B) SOAP

C) WSDL

D) JSON

C) WSDL

________ contains little metadata and is preferred for transmitting volumes of data between servers and browsers.

A) JSON

B) WSDL

C) XML

D) SOAP

A) JSON

Which of the following is an example of PaaS, a category of cloud hosting?

A) Microsoft Office 365

B) iCloud

C) Amazon S3

D) Microsoft Windows Azure

D) Microsoft Windows Azure

Which of the following is an example of SaaS?

A) iCloud

B) Amazon S3

C) Microsoft Windows Azure

D) Oracle on Demand

A) iCloud

Which of the following is the most basic cloud offering?

A) IaaS

B) SaaS

C) VPN

D) PaaS

A) IaaS

Which of the following services is being offered by a cloud vendor who provides hosted computers, an operating system, and a DBMS?

A) IaaS

B) PaaS

C) SaaS

D) VPN

B) PaaS

Which of the following is an example of PaaS?

A) Oracle on Demand

B) Apple iCloud

C) Amazon S3

D) Office 365

A) Oracle on Demand

Which of the following is an example of IaaS?

A) Apple iCloud

B) Microsoft Azure

C) Amazon S3

D) Office 365

C) Amazon S3

Rackspace is an example of ________.

A) SaaS

B) PaaS

C) VPN

D) IaaS

D) IaaS

The connection between a VPN client and a VPN server is called a(n) ________.

A) tunnel

B) hyperlink

C) data highway

D) access point

A) tunnel

Which of the following is true about a VPN?

A) A VPN client software encrypts messages to ensure secure transmissions.

B) A VPN network does not provide users with remote access.

C) A VPN connection utilizes private networks instead of the public network.

D) A VPN connection appears as a secure connection, though it is not.

A) A VPN client software encrypts messages to ensure secure transmissions.

A(n) ________ uses the Internet to create the appearance of private, secure connections.

A) ISP

B) DSL

C) URL

D) VPN

D) VPN

A ________ is a cloud that is owned and operated by an organization for its own benefit.

A) Service as a cloud

B) wide area network

C) private cloud

D) virtual private network

C) private cloud

Which of the following would be a consequence of teleaction, a form of remote action system?

A) The requirement for highly skilled employees would decrease.

B) The need for local support staff would decrease.

C) The value of local mediocrity would decrease.

D) The industries producing high-value product would be unable to properly utilize teleaction.

C) The value of local mediocrity would decrease.

What is the disadvantage of cloud based hosting quizlet?

Identify a characteristic that is a disadvantage of cloud-based hosting. Loss of control over data location.

What is a characteristic of cloud based hosting?

Cloud computing's characteristics and benefits include on-demand self-service, broad network access, and being very elastic and scalable.

Which of the following is a disadvantage of the cloud quizlet?

Cloud computing requires a reliable internet connection so cloud computing is impossible without an internet connection.

Which of the following is an example of a cloud hosting?

Which of the following is an example of the cloud? Explanation: Amazon Web Services (AWS), Dropbox, and Cisco WebEx are examples of cloud.