Chapter 6 Review MIS

1) Which of the following statements is true about cloud computing?
A) The elastic leasing of pooled computer resources over the Internet is called the cloud.
B) A cloud is a peer-to-peer network used to share data between users.
C) Cloud-based hosting does not operate over the Internet.
D) Any network of servers hosted in-house by an organization for its own requirements is regarded as a cloud.

A

2) Which of the following is a reason for the term elastic being used to define the cloud?
A) Computing resources can be increased or decreased dynamically in cloud-based hosting.
B) Operations staff manually allots fresh resources when the traffic increases.
C) Customers are provided a consistent bandwidth on the cloud.
D) Resources available for cloud-hosting are shared among customers.

A

3) An organization that hires cloud services ________.
A) can accommodate increase in traffic from only one city
B) is continually provided with the maximum possible bandwidth
C) can limit the response time of its web pages
D) hires a fixed number of servers

C

4) Which of the following is true of Web services?
A) They are SOA-designed programs that comply with Web service standards.
B) They are programs that comply with IEEE 802.3 protocol standard and cannot be used for cloud processing.
C) They are programs that comply with Web service standards and can only run as an independent program.
D) They can be used only with other programs from the same vendor.

A

5) Which of the following statements is true about cloud services?
A) Cloud service vendors tend to avoid virtualization.
B) In-house hosting is generally preferable to cloud hosting.
C) Cloud services always allow customers to maintain physical control over its data.
D) Financial institutions are not likely to hire cloud services from a vendor.

D

6) Which of the following statements is true of cloud-based and in-house hosting?
A) In-house hosting makes scaling up to meet the demands of increased traffic easier.
B) Cloud-based hosting involves the risk of investing in technology that may soon become obsolete.
C) In-house hosting leads to loss of physical control of data.
D) Cloud-based hosting reduces the visibility of the security being used to protect data.

D

7) Which of the following statements is true about the increase in popularity of cloud hosting?
A) Data communication is more expensive now than earlier.
B) Virtualization allows instantaneous creation of new virtual machines.
C) Internet-based standards have led to loss of flexibility in processing capabilities.
D) The technology prevalent in the 1960s was more favorable for the construction of enormous data centers.

B

8) Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers?
A) virtual private cloud
B) platform as a service (PaaS)
C) software as a service (SaaS)
D) infrastructure as a service (IaaS)

C

9) An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The phonebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users?
A) network as a service (NaaS)
B) platform as a service (PaaS)
C) infrastructure as a service (IaaS)
D) software as a service (SaaS)

D

10) The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________.
A) application virtualization
B) platform as a service (PaaS)
C) infrastructure as a service (IaaS)
D) network functions virtualization (NFV)

C

11) A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that data available on demand.
A) virtual private network
B) content delivery network
C) mobile virtual network
D) local area network

B

12) Which of the following is a disadvantage of a content delivery network?
A) It increases the load time of web pages for users.
B) Its vulnerability to denial-of-service (DOS) attacks is high.
C) Its reliability is decreased as data is stored on many servers.
D) It is better suited to store and deliver content that seldom changes.

D

13) Which of the following statements is true of content delivery networks (CDNs)?
A) They reduce users' access costs by delivering data faster.
B) They distribute data on different servers without any data replication.
C) Users receive content from the CDN server that is geographically closest.
D) A routing server decides which server should deliver content on an hourly basis.

A

14) An internal information system built using Web services ________.
A) is called a virtual private network
B) is a cloud-based technology if it offers elasticity
C) is a subset of a virtual private cloud
D) is an example of platform as a service (PaaS)

B

15) Which of the following is a reason why an internal information system (private internet) that uses Web services is not considered a cloud?
A) The number of servers is fixed in a private internet and is not made elastic.
B) Idle servers in a private internet are dynamically re-allocated.
C) It is generally not accessible outside the organization.
D) An organization maintains a private internet using its own resources.

A

16) Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based offering?
A) network as a service (NaaS)
B) infrastructure as a service (IaaS)
C) software as a service (SaaS)
D) platform as a service (PaaS)

D

17) Sireus Corp. is availing a cloud-based service. It plans to install a software package that will offer cloud services to its users. If it would like to avoid installing an operating system on the server, which of the following services should it choose?
A) network as a service (NaaS)
B) infrastructure as a service (IaaS)
C) platform as a service (PaaS)
D) software as a service (SaaS)

C

18) If an organization opts for software as a service (SaaS), it will have to ________.
A) install an operating system on the server
B) purchase licenses for software replication
C) transfer data and develop procedures
D) install a DBMS

C

19) Which of the following statements is true of private clouds?
A) Private clouds are easy to build and operate.
B) Several organizations pool their resources to form a private cloud.
C) Private clouds provide access from outside an organization without connecting to a VPN (virtual private network).
D) Idle servers in a private cloud cannot re-allocated to other organizations.

D

20) Which of the following is a characteristic of a private cloud?
A) Organizations define their own set of standards for interactions between programs.
B) Idle servers on a private cloud can be allocated to other organizations.
C) A private cloud is most likely to be built by a small organization.
D) Most organizations avoid having multiple database servers in a private cloud.

D

21) Which of the following statements is true of a virtual private cloud (VPC)?
A) A VPC does not make use of a VPN (virtual private network).
B) An organization generally stores its most sensitive data on a VPC.
C) A VPC can be accessed only from within an organization.
D) A VPC can be built on public cloud infrastructure.

D

22) Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)?
A) Unlike a VPN, a VPC uses encrypted connections between the users and the server.
B) A VPN can be accessed over the Internet, but a VPC cannot be accessed over the Internet.
C) Unlike a VPC, a VPN connects users to an organization's internal IS.
D) A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.

D

23) Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)?
A) Unlike a VPC, the infrastructure required for a private cloud can be built and operated easily.
B) A VPC gains significantly by using an elastic load balancer, whereas a private cloud does not use an elastic load balancer.
C) A VPC cannot be accessed from outside the organization, but a private cloud can be accessed from outside the organization.
D) Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data.

D

24) What is a VPN (virtual private network)?
A) It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
B) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
C) It is the most common language for defining the structure and layout of web pages.
D) It uses the Internet to create secure point-to-point connections.

D

25) Which of the following is true of a VPN (virtual private network)?
A) A VPN communication is secure even though it is transmitted over the public Internet.
B) One disadvantage of a VPN is that it does not encrypt messages.
C) Remote access is difficult in case of a VPN.
D) It is a physical, private pathway over a public or shared network from the client to the server.

A

26) Which of the following is a characteristic of a virtual private network (VPN)?
A) It establishes a physical connection between the client and the server, called tunnel.
B) It sends encrypted messages over the public Internet.
C) A VPN can be accessed from only one geographical location.
D) VPNs cannot be accessed over the Internet.

B

27) Which of the following is likely to be a consequence of cloud computing in the future?
A) Organizations will prefer to setup their own computing infrastructure.
B) The cost of obtaining elastic resources will decrease.
C) Jobs related to server operations at small organizations will increase.
D) The number of technology-based startups will stagnate.

B

28) A system uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________.
A) videotelephony
B) telesurgery
C) telelaw enforcement
D) GPS augmentation

C

29) Using https instead of http ________.
A) shows the other users on that network who are accessing the same site
B) allows a packet sniffer to see only the site visited and nothing further
C) connects a user to the version of the site hosted on a private cloud
D) detects the presence of packet sniffers in the vicinity

B

Chapter 6 Review MIS - Subjecto.com

Chapter 6 Review MIS

Your page rank:

Total word count: 1746
Pages: 6

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

1) Which of the following statements is true about cloud computing?
A) The elastic leasing of pooled computer resources over the Internet is called the cloud.
B) A cloud is a peer-to-peer network used to share data between users.
C) Cloud-based hosting does not operate over the Internet.
D) Any network of servers hosted in-house by an organization for its own requirements is regarded as a cloud.

A

2) Which of the following is a reason for the term elastic being used to define the cloud?
A) Computing resources can be increased or decreased dynamically in cloud-based hosting.
B) Operations staff manually allots fresh resources when the traffic increases.
C) Customers are provided a consistent bandwidth on the cloud.
D) Resources available for cloud-hosting are shared among customers.

A

3) An organization that hires cloud services ________.
A) can accommodate increase in traffic from only one city
B) is continually provided with the maximum possible bandwidth
C) can limit the response time of its web pages
D) hires a fixed number of servers

C

4) Which of the following is true of Web services?
A) They are SOA-designed programs that comply with Web service standards.
B) They are programs that comply with IEEE 802.3 protocol standard and cannot be used for cloud processing.
C) They are programs that comply with Web service standards and can only run as an independent program.
D) They can be used only with other programs from the same vendor.

A

5) Which of the following statements is true about cloud services?
A) Cloud service vendors tend to avoid virtualization.
B) In-house hosting is generally preferable to cloud hosting.
C) Cloud services always allow customers to maintain physical control over its data.
D) Financial institutions are not likely to hire cloud services from a vendor.

D

6) Which of the following statements is true of cloud-based and in-house hosting?
A) In-house hosting makes scaling up to meet the demands of increased traffic easier.
B) Cloud-based hosting involves the risk of investing in technology that may soon become obsolete.
C) In-house hosting leads to loss of physical control of data.
D) Cloud-based hosting reduces the visibility of the security being used to protect data.

D

7) Which of the following statements is true about the increase in popularity of cloud hosting?
A) Data communication is more expensive now than earlier.
B) Virtualization allows instantaneous creation of new virtual machines.
C) Internet-based standards have led to loss of flexibility in processing capabilities.
D) The technology prevalent in the 1960s was more favorable for the construction of enormous data centers.

B

8) Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers?
A) virtual private cloud
B) platform as a service (PaaS)
C) software as a service (SaaS)
D) infrastructure as a service (IaaS)

C

9) An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The phonebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users?
A) network as a service (NaaS)
B) platform as a service (PaaS)
C) infrastructure as a service (IaaS)
D) software as a service (SaaS)

D

10) The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________.
A) application virtualization
B) platform as a service (PaaS)
C) infrastructure as a service (IaaS)
D) network functions virtualization (NFV)

C

11) A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that data available on demand.
A) virtual private network
B) content delivery network
C) mobile virtual network
D) local area network

B

12) Which of the following is a disadvantage of a content delivery network?
A) It increases the load time of web pages for users.
B) Its vulnerability to denial-of-service (DOS) attacks is high.
C) Its reliability is decreased as data is stored on many servers.
D) It is better suited to store and deliver content that seldom changes.

D

13) Which of the following statements is true of content delivery networks (CDNs)?
A) They reduce users’ access costs by delivering data faster.
B) They distribute data on different servers without any data replication.
C) Users receive content from the CDN server that is geographically closest.
D) A routing server decides which server should deliver content on an hourly basis.

A

14) An internal information system built using Web services ________.
A) is called a virtual private network
B) is a cloud-based technology if it offers elasticity
C) is a subset of a virtual private cloud
D) is an example of platform as a service (PaaS)

B

15) Which of the following is a reason why an internal information system (private internet) that uses Web services is not considered a cloud?
A) The number of servers is fixed in a private internet and is not made elastic.
B) Idle servers in a private internet are dynamically re-allocated.
C) It is generally not accessible outside the organization.
D) An organization maintains a private internet using its own resources.

A

16) Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based offering?
A) network as a service (NaaS)
B) infrastructure as a service (IaaS)
C) software as a service (SaaS)
D) platform as a service (PaaS)

D

17) Sireus Corp. is availing a cloud-based service. It plans to install a software package that will offer cloud services to its users. If it would like to avoid installing an operating system on the server, which of the following services should it choose?
A) network as a service (NaaS)
B) infrastructure as a service (IaaS)
C) platform as a service (PaaS)
D) software as a service (SaaS)

C

18) If an organization opts for software as a service (SaaS), it will have to ________.
A) install an operating system on the server
B) purchase licenses for software replication
C) transfer data and develop procedures
D) install a DBMS

C

19) Which of the following statements is true of private clouds?
A) Private clouds are easy to build and operate.
B) Several organizations pool their resources to form a private cloud.
C) Private clouds provide access from outside an organization without connecting to a VPN (virtual private network).
D) Idle servers in a private cloud cannot re-allocated to other organizations.

D

20) Which of the following is a characteristic of a private cloud?
A) Organizations define their own set of standards for interactions between programs.
B) Idle servers on a private cloud can be allocated to other organizations.
C) A private cloud is most likely to be built by a small organization.
D) Most organizations avoid having multiple database servers in a private cloud.

D

21) Which of the following statements is true of a virtual private cloud (VPC)?
A) A VPC does not make use of a VPN (virtual private network).
B) An organization generally stores its most sensitive data on a VPC.
C) A VPC can be accessed only from within an organization.
D) A VPC can be built on public cloud infrastructure.

D

22) Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)?
A) Unlike a VPN, a VPC uses encrypted connections between the users and the server.
B) A VPN can be accessed over the Internet, but a VPC cannot be accessed over the Internet.
C) Unlike a VPC, a VPN connects users to an organization’s internal IS.
D) A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.

D

23) Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)?
A) Unlike a VPC, the infrastructure required for a private cloud can be built and operated easily.
B) A VPC gains significantly by using an elastic load balancer, whereas a private cloud does not use an elastic load balancer.
C) A VPC cannot be accessed from outside the organization, but a private cloud can be accessed from outside the organization.
D) Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data.

D

24) What is a VPN (virtual private network)?
A) It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
B) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
C) It is the most common language for defining the structure and layout of web pages.
D) It uses the Internet to create secure point-to-point connections.

D

25) Which of the following is true of a VPN (virtual private network)?
A) A VPN communication is secure even though it is transmitted over the public Internet.
B) One disadvantage of a VPN is that it does not encrypt messages.
C) Remote access is difficult in case of a VPN.
D) It is a physical, private pathway over a public or shared network from the client to the server.

A

26) Which of the following is a characteristic of a virtual private network (VPN)?
A) It establishes a physical connection between the client and the server, called tunnel.
B) It sends encrypted messages over the public Internet.
C) A VPN can be accessed from only one geographical location.
D) VPNs cannot be accessed over the Internet.

B

27) Which of the following is likely to be a consequence of cloud computing in the future?
A) Organizations will prefer to setup their own computing infrastructure.
B) The cost of obtaining elastic resources will decrease.
C) Jobs related to server operations at small organizations will increase.
D) The number of technology-based startups will stagnate.

B

28) A system uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________.
A) videotelephony
B) telesurgery
C) telelaw enforcement
D) GPS augmentation

C

29) Using https instead of http ________.
A) shows the other users on that network who are accessing the same site
B) allows a packet sniffer to see only the site visited and nothing further
C) connects a user to the version of the site hosted on a private cloud
D) detects the presence of packet sniffers in the vicinity

B

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending