Filters
Question type

Study Flashcards

Scalability refers to the _____.


A) easy increase or decrease of the storage and processing capabilities of the computer
B) fact that there is no central point of failure in the system
C) deployment of middleware in the system
D) support of many different types of clients and servers
E) ease of decreasing the cost of the infrastructure during economic downturn

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.

A) True
B) False

Correct Answer

verifed

verified

In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.


A) Encrypt data, decrypt data
B) Store data, restore data
C) Access data, access information
D) Password-protect data, retrieve password
E) Encrypt login id, encrypt password

F) C) and E)
G) A) and D)

Correct Answer

verifed

verified

In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.

A) True
B) False

Correct Answer

verifed

verified

The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.


A) cloud computing
B) big data
C) machine learning
D) Internet of Things (IoT)
E) e-business

F) All of the above
G) None of the above

Correct Answer

verifed

verified

Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.


A) server-based
B) client-based
C) client-server
D) network-based
E) client-network server

F) C) and D)
G) A) and D)

Correct Answer

verifed

verified

Security concerns are one of the set of obstacles for adopting the cloud.

A) True
B) False

Correct Answer

verifed

verified

Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.

A) True
B) False

Correct Answer

verifed

verified

True

Which one of the following type of operational requirements attempts to anticipate the future requirements?


A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements

F) B) and D)
G) C) and D)

Correct Answer

verifed

verified

Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.

A) True
B) False

Correct Answer

verifed

verified

Cost of cloud is one of the set of obstacles for adopting the cloud.

A) True
B) False

Correct Answer

verifed

verified

The computing architecture in which the server performs practically all of the work is known as _____.


A) client connection based architecture
B) client-based architecture
C) client-server architecture
D) server-based architecture
E) middleware architecture

F) C) and D)
G) D) and E)

Correct Answer

verifed

verified

In the server-based architecture, all data stored on one computer.

A) True
B) False

Correct Answer

verifed

verified

True

The major problem with a server-based architecture is that all data on the server must travel to the client for processing.

A) True
B) False

Correct Answer

verifed

verified

Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.

A) True
B) False

Correct Answer

verifed

verified

The function that provides the logic related to the problem domain layer is called application logic.

A) True
B) False

Correct Answer

verifed

verified

The hardware and software specification is a document that describes what hardware and software are needed to support the application.

A) True
B) False

Correct Answer

verifed

verified

Encryption and authentication requirements address virus control measures.

A) True
B) False

Correct Answer

verifed

verified

False

System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.

A) True
B) False

Correct Answer

verifed

verified

A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 74

Related Exams

Show Answer