Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Using MIS 7th Edition Kroenke Test Bank

Download full solution manual + test bank at:

https://testbankpack.com/

Using MIS, 7e (Kroenke)


Chapter 6 The Cloud

6.1 True/False Questions

1) The term "pooled" can be used to describe the cloud as different organizations use the cloud to
share hardware through virtualization.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

2) Cloud-based hosting is the ideal choice for organizations that are required by law to have
physical control over their data.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

3) The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the
Internet.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

4) One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is


the best-of-breed security and disaster recovery.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1
1
Copyright © 2015 Pearson Education, Inc.
5) A computer network is a collection of computers that communicate with one another over
transmission lines or wirelessly.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

2
Copyright © 2015 Pearson Education, Inc.
6) A computer network between Seattle and Philadelphia is made possible through a LAN.
Answer: FALSE
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

7) A university would use a WAN to connect its campuses in two cities.


Answer: TRUE
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

8) With a WAN, an organization is allowed to place communications lines wherever it wants,


because all lines reside on its premises.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

9) An Internet is a network of networks that connects LANs, WANs, and other internets.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

10) An intranet is a private internet that is used exclusively within an organization.


Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

11) A switch detects the speed that a given device can handle and communicates with it at that
speed.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

3
Copyright © 2015 Pearson Education, Inc.
12) Bluetooth is a common wired protocol designed to transmit data over long distances.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

13) IEEE LAN protocols always start with the numbers 802.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

14) The World Wide Web sponsors committees that create and publish protocols and other
standards.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

15) Wired LAN connections use a protocol standard called Ethernet to communicate.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

16) Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections
use the IEEE 802.11 protocol.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

17) The abbreviations k, M, and G have the same meaning for computer memory as they have
for communication speeds.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

4
Copyright © 2015 Pearson Education, Inc.
18) Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

19) The committee that addresses LAN standards is called the ICANN.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

20) When a person connects to the Internet, he or she is actually connecting to an Internet
Service Provider.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

21) An ISP provides a customer with a legitimate Internet address.


Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

22) As DSL signals interfere with telephone signals, DSL data transmission and telephone
conversations cannot occur simultaneously.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

23) Digital subscriber lines use their own protocols for data transmission.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

5
Copyright © 2015 Pearson Education, Inc.
24) Cable modems modulate in such a way that their signals interfere with TV signals.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

25) A cable line is the second type of LAN connection.


Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

26) TCP/IP Protocol Architecture is a scheme of protocol types arranged in four layers.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

27) "https" is the secure version of "http."


Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

28) "smtp" is the protocol used between browsers and Web servers.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

29) FTP is the protocol used mainly for email transmissions.


Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

6
Copyright © 2015 Pearson Education, Inc.
30) Unlike FTP, HTTP does not have a secure version.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

31) SOAP is a protocol for requesting web services and for sending responses to web service
requests.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

32) Both WSDLs and SOAP messages are coded in XML.


Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

33) ICANN controls the assignment of both public and private IP addresses.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

34) If one had a private IP address for one's computer, every time one moved it, the Internet
would have to update its addressing mechanisms to route traffic to one's new location.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

35) A domain name is a worldwide-unique name that is affiliated with a public IP address.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

7
Copyright © 2015 Pearson Education, Inc.
36) The owner of a domain name can change the affiliated IP addresses at its discretion.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

37) A URL consists of a protocol followed by a domain name or public IP address.


Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

38) In three-tier architecture, the user tier consists of computers that run Web servers and process
application programs.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

39) Web servers run on a server-tier computer and manage traffic by sending and receiving Web
pages to and from clients.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

40) A content delivery network (CDN) is a system of both hardware and software that stores user
data in many different geographical locations and makes that data available on demand.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 4

41) An organization that provides software as a service provides only operating systems and
application programs.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

8
Copyright © 2015 Pearson Education, Inc.
42) The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a
bare server computer or data storage.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

43) Salesforce.com provides hardware and programs for customer and sales tracking. This is an
example of a cloud vendor who provides software as a service.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

44) Amazon EC2 and Amazon S3 are both examples of platform as a service.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

45) Small companies usually lack the technical expertise and management to venture into
loading operating systems onto servers acquired via the cloud.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 5

46) Google Drive can be classified as a PaaS.


Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 5

47) To ensure security, VPN client software decrypts the original message so that its contents are
protected from snooping.
Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 6

9
Copyright © 2015 Pearson Education, Inc.
48) Remote action systems save time and travel expense and make the skills and abilities of an
expert available in places where he or she is not physically located.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 7

49) Teleaction increases the value of local mediocrity.


Answer: FALSE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 7

50) Telesurgery increases the value of robotics in the field of medical science.
Answer: TRUE
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 7

6.2 Multiple-Choice Questions

1) The term ________, used to describe the cloud, means that the computing resources leased
can be increased or decreased dynamically and that organizations only pay for the resources they
use.
A) portable
B) pooled
C) programmatic
D) elastic
Answer: D
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

10
Copyright © 2015 Pearson Education, Inc.
2) Cloud resources are ________ because many different organizations use the same physical
hardware.
A) elastic
B) pooled
C) programmatic
D) portable
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

3) Which of the following is a characteristic of cloud-based hosting?


A) unknown cost structure
B) full control of data location
C) no obsolesce
D) in-depth visibility of security
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

4) Which of the following is a characteristic of in-house hosting?


A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

5) Which of the following is a characteristic of in-house hosting?


A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

11
Copyright © 2015 Pearson Education, Inc.
6) Which of the following characteristics is a disadvantage of cloud-based hosting?
A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

7) Which of the following characteristics is a disadvantage of in-house hosting?


A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

8) Which of the following characteristics is a disadvantage of cloud-based hosting?


A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

9) Which of the following factors makes cloud-based hosting advantageous today?


A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

12
Copyright © 2015 Pearson Education, Inc.
10) Which of the following is defined as the elastic leasing of pooled computer resources over
the Internet?
A) broadband
B) wiki
C) the cloud
D) Bluetooth
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 1

11) In cloud computing, resources are said to be "pooled" because organizations ________.
A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
Answer: D
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

12) Compared to in-house hosting, cloud-based hosting ________.


A) provides better vision of disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
Answer: B
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

13) Which of the following is a benefit of in-house hosting?


A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in depth visibility of security and disaster preparedness
D) fewer training requirements
Answer: C
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

13
Copyright © 2015 Pearson Education, Inc.
14) A computer ________ is a collection of computers that communicate with one another over
transmission lines or wirelessly.
A) database
B) application
C) network
D) server
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

15) Which of the following features distinguishes a LAN from a WAN?


A) LAN connects computers in a single location.
B) WAN has a limit on the number of users
C) WAN has relatively lower bandwidth
D) LAN has stringent hardware requirements
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

16) Computers that reside in different geographic locations are connected using a(n) ________.
A) WAN
B) LAN
C) URL
D) XML
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

17) A private internet that is used exclusively within an organization is called a(n) ________.
A) Ethernet
B) intranet
C) cloud
D) server
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

14
Copyright © 2015 Pearson Education, Inc.
18) A ________ is a set of rules that programs on two communicating devices follow.
A) codec
B) cloud
C) packet
D) protocol
Answer: D
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

19) To enable a seamless flow of data across the networks that comprise an internet, an elaborate
scheme called a ________ is used.
A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

20) A ________ detects the speed that a given device can handle and communicates with it at
that speed.
A) codec
B) modem
C) switch
D) port
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

21) The IEEE 802.3 protocol standard is also known as ________.


A) Bluetooth
B) Ethernet
C) intranet
D) Internet
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

15
Copyright © 2015 Pearson Education, Inc.
22) Which of the following statements is true about IEEE 802.3?
A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

23) Communications speeds are expressed in ________.


A) bits
B) bytes
C) hertz
D) packets
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

24) Which of the following statements is true about the IEEE 802.11ac protocol?
A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
Answer: D
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

25) ________ is a wireless protocol designed for transmitting data over short distances, replacing
cables.
A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

16
Copyright © 2015 Pearson Education, Inc.
26) Which of the following is a function of an ISP?
A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Answer: B
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

27) Which of the following is true of digital subscriber line signals?


A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems do for data
transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur
simultaneously.
Answer: A
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

28) ________ signals do not interfere with TV signals, even though they use the same lines.
A) DSL
B) Dial-up
C) Cable
D) ADSL
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

29) Which of the following is true about cable lines?


A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving
data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data
transmission.
D) They provide faster download speeds than DSL modems.
Answer: C
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2
17
Copyright © 2015 Pearson Education, Inc.
30) A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per
second.
A) megabytes
B) megabits
C) kilobytes
D) kilobits
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

31) For communications equipment, k stands for ________.


A) 1000
B) 1024
C) 512
D) 500
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

32) ________ has speeds that range between 500 Kbps and 1.7 Mbps.
A) Wireless WAN
B) DSL modem to ISP
C) Cable modem to ISP
D) Wireless LAN
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

33) Which of the following is a sophisticated protocol that enables several devices to use the
same frequency?
A) Wireless WAN
B) DSL modem to ISP
C) Cable modem to ISP
D) Wireless LAN
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

18
Copyright © 2015 Pearson Education, Inc.
34) The protocols used on the Internet are arranged according to a structure known as the
________ protocol architecture.
A) FTP
B) SMTP
C) HTTP
D) TCP/IP
Answer: D
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

35) Which of the following protocols guarantees secure data transmission?


A) http
B) ftp
C) https
D) smtp
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

36) Which of the following TCP/IP application-layer protocols is used for email transmissions?
A) ftp
B) https
C) smtp
D) IP
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

37) Which of the following TCP/IP application-layer protocols is used to move files over the
Internet and to maintain Web sites?
A) ftp
B) smtp
C) https
D) http
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

19
Copyright © 2015 Pearson Education, Inc.
38) A(n) ________ is a number that identifies a particular device.
A) domain
B) IP address
C) hyperlink
D) href
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

39) The organization responsible for assigning public IP addresses is called ________.
A) CERN
B) IEEE
C) ICANN
D) ISO
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

40) Which of the following is the most common format for IP addresses?
A) IPv4
B) TCP
C) IPv6
D) HTTP
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

41) A ________ is a worldwide-unique term that is affiliated with a public IP address.


A) URL
B) domain name
C) packet
D) hyperlink
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

20
Copyright © 2015 Pearson Education, Inc.
42) The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the
luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web
page.
A) URL
B) IP address
C) protocol
D) email ID
Answer: A
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

43) Which of the following refers to the three tiers in the three-tier architecture?
A) TCP, IP, and HTTP
B) HTML, XML, and JSON
C) user, server, and database
D) tunnel, switch, and access point
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

44) The ________ tier of three-tier architecture consists of computers, phones, and other mobile
devices that have browsers that request and process Web pages.
A) user
B) server
C) database
D) data link
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

45) ________ are programs that run on a server-tier computer and manage traffic by sending and
receiving Web pages to and from clients.
A) Web servers
B) Web browsers
C) Server farms
D) Server racks
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3
21
Copyright © 2015 Pearson Education, Inc.
46) ________ contains much metadata that can be used to validate the format and completeness
of the document, but includes considerable overhead.
A) WSDL
B) SOAP
C) JSON
D) XML
Answer: D
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

47) ________ is a standard for describing the services, inputs and outputs, and other data
supported by a web service.
A) WSDL
B) SOAP
C) JSON
D) XML
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

48) ________ contains little metadata and is preferred for transmitting volumes of data between
servers and browsers.
A) WSDL
B) SOAP
C) JSON
D) XML
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

49) Which of the following is an example of PaaS, a category of cloud hosting?


A) Microsoft Office 365
B) Microsoft Windows Azure
C) iCloud
D) Amazon S3
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 4
22
Copyright © 2015 Pearson Education, Inc.
50) Which of the following is an example of SaaS?
A) iCloud
B) Microsoft Windows Azure
C) Oracle on Demand
D) Amazon S3
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 4

51) Which of the following is the most basic cloud offering?


A) SaaS
B) PaaS
C) IaaS
D) VPN
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

52) Which of the following services is being offered by a cloud vendor who provides hosted
computers, an operating system, and a DBMS?
A) SaaS
B) PaaS
C) IaaS
D) VPN
Answer: B
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

53) Which of the following is an example of PaaS?


A) Apple iCloud
B) Amazon S3
C) Oracle on Demand
D) Office 365
Answer: C
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

23
Copyright © 2015 Pearson Education, Inc.
54) Which of the following is an example of IaaS?
A) Apple iCloud
B) Microsoft Azure
C) Office 365
D) Amazon S3
Answer: D
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

55) Rackspace is an example of ________.


A) SaaS
B) PaaS
C) IaaS
D) VPN
Answer: C
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

56) The connection between a VPN client and a VPN server is called a(n) ________.
A) data highway
B) hyperlink
C) tunnel
D) access point
Answer: C
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 6

57) Which of the following is true about a VPN?


A) A VPN client software encrypts messages to ensure secure transmissions.
B) A VPN network does not provide users with remote access.
C) A VPN connection utilizes private networks instead of the public network.
D) A VPN connection appears as a secure connection, though it is not.
Answer: A
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 6

24
Copyright © 2015 Pearson Education, Inc.
58) A(n) ________ uses the Internet to create the appearance of private, secure connections.
A) VPN
B) ISP
C) URL
D) DSL
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 6

59) A ________ is a cloud that is owned and operated by an organization for its own benefit.
A) private cloud
B) virtual private network
C) wide area network
D) Service as a cloud
Answer: A
AACSB: Information Technology
Difficulty: Easy
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 6

60) Which of the following would be a consequence of teleaction, a form of remote action
system?
A) The need for local support staff would decrease.
B) The value of local mediocrity would decrease.
C) The requirement for highly skilled employees would decrease.
D) The industries producing high-value product would be unable to properly utilize teleaction.
Answer: B
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 7

25
Copyright © 2015 Pearson Education, Inc.
6.3 Essay Questions

1) What is a computer network? What are the various types of networks?


Answer: A computer network is a collection of computers that communicate with one another
over transmission lines or wireless. A local area network (LAN) connects computers that reside
in a single geographic location on the premises of the company that operates the LAN. The
number of connected computers can range from two to several hundred. The distinguishing
characteristic of a LAN is a single location. Wide area networks (WANs) connect computers at
different geographic locations. The computers in two separated company sites must be connected
using a WAN. An internet is a network of networks. Internets connect LANs, WANs, and other
internets. The most famous internet is "the Internet." In addition to the Internet, private networks
of networks, called internets, also exist. A private internet that is used exclusively within an
organization is sometimes called an intranet.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

2) List the functions of an Internet Service Provider (ISP).


Answer: An ISP has three important functions. First, it provides the user with a legitimate
Internet address. Second, it serves as the user's gateway to the Internet. The ISP receives the
communications from the user's computer and passes them on to the Internet, and it receives
communications from the Internet and passes them on to the user. Finally, ISPs pay for the
Internet. They collect money from their customers and pay access fees and other charges on the
user's behalf.
AACSB: Information Technology
Difficulty: Easy
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

3) What is a digital subscriber line (DSL)?


Answer: Digital subscriber lines (DSL) operate on the same lines as voice telephones, but they
operate so that their signals do not interfere with voice telephone service. Because DSL signals
do not interfere with telephone signals, DSL data transmission and telephone conversations can
occur simultaneously. A device at the telephone company separates the phone signals from the
computer signals and sends the latter signal to the ISP. Digital subscriber lines use their own
protocols for data transmission.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 2

26
Copyright © 2015 Pearson Education, Inc.
4) What is an IP address? Describe the advantages of private and public IP addresses.
Answer: An IP address is a number that identifies a particular device. Public IP addresses
identify a particular device on the public Internet. Because public IP addresses must be unique,
worldwide, their assignment is controlled by a public agency known as ICANN (Internet
Corporation for Assigned Names and Numbers). Private IP addresses identify a particular device
on a private network, usually on a LAN. Their assignment is controlled within the LAN.
The private/public IP address scheme has two major benefits. First, public IP addresses are
conserved. All of the computers on the LAN use only one public IP address. Second, by using
private IP addresses, you need not register a public IP address for your computer with ICANN-
approved agencies. Furthermore, if you had a public IP address for your computer, every time
you moved it the Internet would have to update its addressing mechanisms to route traffic to your
new location. Such updating would be a massive burden.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

5) What is a virtual private network (VPN)? Explain how VPNs ensure the security of
transmissions.
Answer: A virtual private network (VPN) uses the Internet to create the appearance of private,
secure connections. In the IT world, the term "virtual" means something that appears to exist but
in fact does not. A VPN uses the public Internet to create the appearance of a private connection
on secure network. The remote user is the VPN client. When the client connects to the Internet,
the VPN software on the remote user's computer then establishes a connection with the VPN
server. The VPN client and VPN server then have a secure connection. That connection, called a
tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the
VPN server.
To ensure security, VPN client software encrypts, or codes messages so their contents are
protected from snooping. Then the VPN client appends the Internet address of the VPN server to
the message and sends that package over the Internet to the VPN server. When the VPN server
receives the message, it strips its address off the front of the message, decrypts the coded
message, and sends the plain text message to the original address inside the LAN. In this way,
secure private messages are delivered over the public Internet.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 6

27
Copyright © 2015 Pearson Education, Inc.
6) Describe the three-tier architecture for Web applications such as e-commerce.
Answer: The three-tier architecture is an arrangement of user computers and servers into three
categories, or tiers. The user tier consists of computers, phones, and other mobile devices that
have browsers that request and process Web pages. The server tier consists of computers that run
Web servers and process application programs. The database tier consists of computers that run a
DBMS that processes requests to retrieve and store data. Web servers are programs that run on a
server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
A commerce server is an application program that runs on a server-tier computer. Typical
commerce server functions are to obtain product data from a database, manage the items in a
shopping cart, and coordinate the checkout process.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Compare and contrast different ways of connecting to the Internet
Chapter LO: 3

7) Explain the three factors that have made cloud computing advantageous today.
Answer: Three factors have made cloud-based hosting advantageous today:
1. Processors, data communication, and data storage are so cheap as to be nearly free. Because
data communication is so cheap, getting the data to and from that processor is also nearly free.
2. Virtualization technology enables the near instantaneous creation of a new virtual machine.
The customer provides (or creates in the cloud) a disk image of the data and programs of the
machine it wants to provision. Virtualization software takes it from there.
3. Internet-based standards enable cloud-hosting vendors to provide processing capabilities in
flexible, yet standardized, ways.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

8) When does it not make sense to use cloud-based infrastructure?


Answer: Cloud-based hosting makes sense for most organizations. The only organizations for
which it may not make sense are those that are required by law or by industry standard practice
to have physical control over their data. Such organizations might be forced to create and
maintain their own hosting infrastructure. A financial institution, for example, might be legally
required to maintain physical control over its data.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 1

28
Copyright © 2015 Pearson Education, Inc.
9) Define SaaS, PaaS, and IaaS. Provide an example of each.
Answer: An organization that provides software as a service (SaaS) provides not only hardware
infrastructure, but also an operating system and application programs as well. For example,
Salesforce.com provides programs for customer and sales tracking as a service. The second
category of cloud hosting is platform as a service (Paas), whereby vendors provide hosted
computers, an operating system, and possibly a DBMS. Microsoft Windows Azure, for example,
provides servers installed with Windows Server. Customers of Windows Azure then add their
own applications on top of the hosted platform. The third category of cloud hosting is
infrastructure as a service (IaaS), which is the cloud hosting of a bare server computer or disk
drive. The Amazon EC2 provides bare servers, and its Simple Storage Server provides, in
essence, an unlimited, reliable disk drive in the cloud.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 4

10) What are remote action systems? Explain with the help of three examples.
Answer: Remote action systems provide computer-based activity or action at a distance. By
enabling action at a distance, remote action systems save time and travel expense and make the
skills and abilities of an expert available in places where he or she is not physically located. They
also enable experts to scale their expertise.
Remote action systems include telediagnosis, which health care professionals can use to provide
diagnosis for illness for rural or remote areas. Telesurgery uses telecommunications to link
surgeons to robotic equipment at distant locations. Telelaw enforcement, such as the RedFlex
system, uses cameras and motion-sensing equipment to issue tickets for red-light and speeding
violations.
AACSB: Information Technology
Difficulty: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure
Chapter LO: 7

29
Copyright © 2015 Pearson Education, Inc.

You might also like