Server farms & virtualization

Server farms & virtualization

You will complete the following content for this lesson topic:

Read chapter 6 Using MIS
Review the publisher PowerPoint for Using MIS Chapter 6

Individually describe the value of server farms and virtualization to any large organization. Use your textbook and cite three other sources (not Wikipedia).

Be careful not to plagiarize, but to paraphrase and properly cite the reference.
Your answer should be the minimum of three paragraphs double spaced. Include a title page.

TEXTBOOKS AND OTHER MATERIALS: Title: The bundle consists of Using MIS 9/e, Microsoft Access Comprehensive 2016. ISBN number for textbook: ISBN-13: 9781323466230

1 Copyright © 2017 Pearson Education, Inc.
Using MIS, 9e (Kroenke) Chapter 6   The Cloud
1) The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just

the resources that they use. A) portable B) pooled C) programmatic D) elastic Answer:  D AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and

contrast different ways of connecting to the Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
2) Cloud resources are ________ because many different organizations use the same physical hardware. A) elastic B) pooled C) programmatic D) portable Answer:  B AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.1: Why is the cloud the future for

most organizations? Classification:  Concept
3) Which of the following is a characteristic of cloud-based hosting? A) unknown cost structure B) full control of data location C) no obsolescence D) in-depth

visibility of security Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet

LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept

2 Copyright © 2017 Pearson Education, Inc.
4) Which of the following is a characteristic of in-house hosting? A) in-depth visibility of disaster preparedness B) small capital requirements C) industry-wide

economies of scale D) known cost structure Answer:  A AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of

connecting to the Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
5) Identify a characteristic of in-house hosting. A) speedy development B) superior adaptability to fluctuating demand C) control of data location D) possibly the best

disaster preparedness Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet

LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
6) Which of the following characteristics is a disadvantage of cloud-based hosting? A) It involves high dependency on vendor. B) It involves significant requirement of

capital. C) It involves high annual maintenance costs. D) It involves high ongoing support costs. Answer:  A AACSB:  Information Technology Difficulty:  2: Moderate

Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
7) Which of the following characteristics is a disadvantage of in-house hosting? A) dependency on vendor B) loss of control over data location C) cost uncertainties D)

lack of visibility into security details Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of

connecting to the Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept

3 Copyright © 2017 Pearson Education, Inc.
8) Identify a characteristic that is a disadvantage of cloud-based hosting. A) loss of control over data location B) ongoing support costs C) increased management

requirements D) significant development effort Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of

connecting to the Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
9) Which of the following factors makes cloud-based hosting advantageous today? A) expensive processors B) expensive data storage C) advent of virtualization D) advent

of private IP addressing Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the

Internet LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
10) Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? A) broadband B) wiki C) the cloud D) Bluetooth Answer:  C

AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.1: Why is the cloud the future

for most organizations? Classification:  Concept

4 Copyright © 2017 Pearson Education, Inc.
11) In cloud computing, resources are said to be “pooled” because organizations ________. A) use the public Internet to create the appearance of a private connection

B) use open source standards that enable users to modify a program’s source code C) offer their services to each other free of charge, in a give-and-take arrangement

D) share the same physical hardware through virtualization Answer:  D AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues

involved in managing the components of IT infrastructure LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
12) Compared to in-house hosting, cloud-based hosting ________. A) provides better visibility of security and disaster preparedness capabilities B) minimizes the risk

of investing in technology that will soon become obsolete C) provides greater control over the location of data D) requires a significant amount of capital Answer:  B

AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.1: Why is

the cloud the future for most organizations? Classification:  Concept
13) Which of the following is a benefit of in-house hosting? A) superior flexibility and adaptability to growing or fluctuating demand B) lower capital requirements C)

in-depth visibility of security and disaster preparedness D) fewer training requirements Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:

Discuss the key issues involved in managing the components of IT infrastructure LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
14) Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data. Answer:  FALSE AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.1: Why is the cloud the future for most

organizations? Classification:  Concept

5 Copyright © 2017 Pearson Education, Inc.
15) The cloud is defined as the elastic leasing of pooled computer resources over the Internet. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy

Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.1: Why is the cloud the future for most organizations?

Classification:  Concept
16) Define the cloud, and discuss its attributes. Answer:  The cloud is defined as the elastic leasing of pooled computer resources over the Internet. The term cloud

is used because most early diagrams of three-tier and other Internet- based systems used a cloud symbol to represent the Internet, and organizations came to view their

infrastructure as being “somewhere in the cloud.” The term elastic means that the computing resources leased can be increased or decreased dynamically,

programmatically, in a short span of time and that organizations pay for just the resources that they use. Cloud resources are pooled because many different

organizations use the same physical hardware; they share that hardware through virtualization. The cloud resources are accessed over the Internet, which refers to a

set of standard ways of requesting and receiving services over the Internet. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues

involved in managing the components of IT infrastructure LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept
17) Explain the relevance of cloud-based hosting today. Answer:  Three factors have made cloud-based hosting advantageous today. First, processors, data communication,

and data storage are so cheap that they are nearly free. Because data communication is so cheap, getting the data to and from that processor is also nearly free.

Second, virtualization technology enables the near instantaneous creation of a new virtual machine. The customer provides (or creates in the cloud) a disk image of the

data and programs of the machine it wants to provision. Virtualization software takes it from there. Finally, as stated, Internet-based standards enable cloud-hosting

vendors to provide processing capabilities in flexible yet standardized ways. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key

issues involved in managing the components of IT infrastructure LO:  6.1: Why is the cloud the future for most organizations? Classification:  Concept

6 Copyright © 2017 Pearson Education, Inc.
18) When does it not make sense to use cloud-based hosting infrastructure? Answer:  Cloud-based hosting makes sense for most organizations. The only organizations for

which it may not make sense are those that are required by law or by industry standard practice to have physical control over their data. Such organizations might be

forced to create and maintain their own hosting infrastructure. A financial institution, for example, might be legally required to maintain physical control over its

data. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.1: Why

is the cloud the future for most organizations? Classification:  Concept
19) A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A) database B) application C) network D)

server Answer:  C AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What

network technology supports the cloud? Classification:  Concept
20) Which of the following features distinguishes a LAN from a WAN? A) A LAN connects computers in a single location. B) A WAN has a limit on the number of users. C) A

WAN has low bandwidth. D) A LAN has stringent hardware requirements. Answer:  A AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and

contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept

7 Copyright © 2017 Pearson Education, Inc.
21) Tristom Technologies, based in New York, opens branches in Chicago and Detroit. Which of the following networks will the company use to connect computers in the

three offices? A) WAN B) LAN C) URL D) XML Answer:  A AACSB:  Reflective Thinking Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of

connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Application
22) Zapstreet is a stock broking firm. Its employees use a private network within the organization to communicate with each other regarding stock prices and trading

accounts. Zapstreet’s network is an example of a(n) ________. A) Ethernet B) intranet C) cloud D) server Answer:  B AACSB:  Reflective Thinking Difficulty:  2:

Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:

Application
23) A ________ is a set of rules that programs on two communicating devices follow. A) codec B) cloud C) packet D) protocol Answer:  D AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept

8 Copyright © 2017 Pearson Education, Inc.
24) To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used. A) layered protocol B) virtual

private network C) three-tier system D) remote access system Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different

ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
25) A ________ detects the speed that a given device can handle and communicates with it at that speed. A) codec B) modem C) switch D) port Answer:  C AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports

the cloud? Classification:  Concept
26) The ________ protocol standard is also known as Ethernet. A) Bluetooth B) IEEE 802.11 C) IEEE 802.3 D) DSL Answer:  C AACSB:  Information Technology Difficulty:

1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept

9 Copyright © 2017 Pearson Education, Inc.
27) Which of the following statements is true about IEEE 802.3? A) It is the protocol for wireless LAN connections. B) It is the protocol for Bluetooth. C) It is the

protocol for wired LAN connections. D) It is the universal standard protocol for all WAN connections. Answer:  C AACSB:  Information Technology Difficulty:  2:

Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
28) For communications equipment, k stands for ________. A) 1000 B) 1024 C) 100 D) 1042 Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
29) Maxwell Insurance recently got its communication network updated to the IEEE 802.11ac protocol. Which of the following is true of this protocol? A) It is also

known as Ethernet. B) It is used for wired LAN connections. C) It cannot be processed by access points. D) It allows speeds of up to 1.3 Gbps. Answer:  D AACSB:

Reflective Thinking Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports

the cloud? Classification:  Application

10 Copyright © 2017 Pearson Education, Inc.
30) ________ is a wireless protocol designed for transmitting data over short distances, replacing cables. A) IPv6 B) PaaS C) Bluetooth D) IPv4 Answer:  C AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports

the cloud? Classification:  Concept
31) Which of the following is a function of an Internet service provider? A) It transmits data over short distances, replacing cables. B) It serves as a user’s gateway

to the Internet. C) It describes how messages must be processed for wired transmission. D) It connects computers within a LAN. Answer:  B AACSB:  Information

Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept
32) Which of the following statements is true of digital subscriber line signals? A) Digital subscriber line signals do not interfere with telephone signals. B)

Digital subscriber line signals use the same protocols as cable modems for data transmission. C) Digital subscriber line signals replace phone signals and are sent to

the ISP. D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously. Answer:  A AACSB:  Information Technology

Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept

11 Copyright © 2017 Pearson Education, Inc.
33) Carol uses a high speed internet connection at home. Her connection is supported by the television line, but it does not interfere with the television signal.

Carol uses a(n) ________ connection. A) DSL B) dial-up C) cable D) ADSL Answer:  C AACSB:  Reflective Thinking Difficulty:  2: Moderate Course LO:  Compare and

contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Application
34) Which of the following statements is true about cable lines? A) They provide high-speed data transmission using telephone cables. B) They offer consistent

performance irrespective of the number of users sending and receiving data. C) They rely on high-capacity optical fiber cables and use their own protocols for data

transmission. D) They provide faster download speeds than DSL modems. Answer:  C AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and

contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
35) A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second. A) megabytes B) megabits C) kilobytes D) kilobits Answer:  B AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports

the cloud? Classification:  Concept

12 Copyright © 2017 Pearson Education, Inc.
36) For communications equipment, M stands for ________. A) 1000 B) 1024 C) 1000000 D) 500 Answer:  C AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
37) Mary’s organization recently switched to a faster internet connection, which has a speed of up to 600 Mbps. Her organization uses a ________. A) Wireless WAN B)

DSL modem to ISP C) Cable modem to ISP D) Wireless LAN Answer:  D AACSB:  Reflective Thinking Difficulty:  2: Moderate Course LO:  Compare and contrast different ways

of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Application
38) Which of the following uses sophisticated protocols that enable several devices to use the same frequency? A) Wireless WAN B) DSL modem to ISP C) Cable modem to

ISP D) Wireless LAN Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:

6.2: What network technology supports the cloud? Classification:  Concept
39) A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly. Answer:  TRUE AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept

13 Copyright © 2017 Pearson Education, Inc.
40) With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises. Answer:  FALSE AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept
41) An Internet is a network of networks that connects LANs, WANs, and other internets. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
42) An intranet is a private internet that is used exclusively within an organization. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
43) Bluetooth is a common wired protocol designed to transmit data over long distances. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
44) The World Wide Web sponsors committees that create and publish protocols and other standards. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy

Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept

14 Copyright © 2017 Pearson Education, Inc.
45) Wired LAN connections use a protocol standard called Ethernet to communicate. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare

and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
46) The committee that addresses LAN standards is called ICANN. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast

different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
47) When a person connects to the Internet, he or she is actually connecting to an Internet service provider. Answer:  TRUE AACSB:  Information Technology Difficulty:

1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
48) Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously. Answer:  FALSE AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports

the cloud? Classification:  Concept

15 Copyright © 2017 Pearson Education, Inc.
49) What is a computer network? What are the various types of networks? Answer:  A computer network is a collection of computers that communicate with one another over

transmission lines or wirelessly. A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that

operates the LAN. The number of connected computers can range from two to several hundred. The distinguishing characteristic of a LAN is a single location. A wide area

network (WAN) connects computers at different geographic locations. The computers in two separated company sites must be connected using a WAN. An internet is a

network of networks. Internets connect LANs, WANs, and other internets. The most famous internet is “the Internet.” In addition to the Internet, private networks of

networks, called internets, also exist. A private internet that is used exclusively within an organization is sometimes called an intranet. AACSB:  Information

Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.2: What network technology supports the cloud?

Classification:  Concept
50) Discuss wireless LAN and PAN connections. Answer:  Wireless LAN connections use the IEEE 802.11 protocol. Several versions of 802.11 exist, and as of 2015, the

most current one is IEEE 802.11ac. The current standard, 802.11ac, allows speeds of up to 1.3 Gbps, though few users have an Internet connection fast enough to take

full advantage of that speed. Bluetooth is another common wireless protocol used to make PAN connections. It is designed for transmitting data over short distances,

replacing cables. Devices, such as wireless mice, keyboards, printers, and headphones, use Bluetooth to connect to desktop computers. AACSB:  Information Technology

Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.2: What network technology supports the

cloud? Classification:  Concept
51) List the functions of an Internet service provider (ISP). Answer:  An ISP has three important functions. First, it provides the user with a legitimate Internet

address. Second, it serves as the user’s gateway to the Internet. The ISP receives the communications from the user’s computer and passes them on to the Internet, and

it receives communications from the Internet and passes them on to the user. Finally, ISPs pay for the Internet. They collect money from their customers and pay access

fees and other charges on the user’s behalf. AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the

Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept

16 Copyright © 2017 Pearson Education, Inc.
52) What is a digital subscriber line (DSL)? Answer:  Digital subscriber lines (DSLs) operate on the same lines as voice telephones, but they operate so that their

signals do not interfere with voice telephone service. Because DSL signals do not interfere with telephone signals, DSL data transmission and telephone conversations

can occur simultaneously. A device at the telephone company separates the phone signals from the computer signals and sends the latter signal to the ISP. Digital

subscriber lines use their own protocols for data transmission. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways

of connecting to the Internet LO:  6.2: What network technology supports the cloud? Classification:  Concept
53) The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) ftp B) smtp C) http D) TCP/IP Answer:  D

AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work?

Classification:  Concept
54) Which of the following protocols guarantees secure data transmission? A) http B) ftp C) https D) smtp Answer:  C AACSB:  Information Technology Difficulty:  1:

Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept

17 Copyright © 2017 Pearson Education, Inc.
55) Which of the following TCP/IP application-layer protocols is used for email transmissions? A) ftp B) https C) smtp D) IP Answer:  C AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
56) Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites? A) ftp B) smtp C) https D) http Answer:

A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work?

Classification:  Concept
57) A(n) ________ is a number that identifies a particular device. A) domain B) IP address C) hyperlink D) WSDL Answer:  B AACSB:  Information Technology Difficulty:

1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept

18 Copyright © 2017 Pearson Education, Inc.
58) The organization responsible for assigning public IP addresses is called ________. A) CERN B) IEEE C) ICANN D) ISO Answer:  C AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
59) Which of the following is the most common format for IP addresses? A) IPv4 B) TCP C) IPv6 D) http Answer:  A AACSB:  Information Technology Difficulty:  1: Easy

Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
60) A ________ is a worldwide-unique term that is affiliated with a public IP address. A) URL B) domain name C) packet D) hyperlink Answer:  B AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:

Concept

19 Copyright © 2017 Pearson Education, Inc.
61) Vivian wants to book a suite at Baron & Olufsen, a luxury hotel chain in Europe, for her brief stay in Austria. When she visits the Web page, the address bar reads

http://www.baron- olufsen.com/. This information is the ________ of the Web page. A) URL B) IP address C) protocol D) email ID Answer:  A AACSB:  Reflective Thinking

Difficulty:  3: Challenging Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:

Application
62) Which of the following refers to the three tiers in the three-tier architecture? A) TCP, IP, and http B) html, XML, and JSON C) user, server, and database D)

tunnel, switch, and access point Answer:  C AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the

Internet LO:  6.3: How does the cloud work? Classification:  Concept
63) The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. A)

user B) server C) database D) data link Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to

the Internet LO:  6.3: How does the cloud work? Classification:  Concept

20 Copyright © 2017 Pearson Education, Inc.
64) ________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A) Web servers B) Web browsers

C) Server farms D) Server racks Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the

Internet LO:  6.3: How does the cloud work? Classification:  Concept
65) ________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead. A) WSDL B) SOAP C)

JSON D) XML Answer:  D AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How

does the cloud work? Classification:  Concept
66) ________ is a standard for describing the services, inputs and outputs, and other data supported by a Web service. A) WSDL B) SOAP C) JSON D) XML Answer:  A AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work?

Classification:  Concept

21 Copyright © 2017 Pearson Education, Inc.
67) Derek, a Web designer, works for a pharmaceutical company. He uploads information about the company’s products on to its official Web site. Which of the following

will Derek use to transmit data from the company’s server to its Web site? A) WSDL B) SOAP C) JSON D) XML Answer:  C AACSB:  Reflective Thinking Difficulty:  3:

Challenging Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Application
68) TCP/IP protocol architecture is a scheme of protocol types arranged in four layers. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
69) https is the secure version of http. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of

connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
70) smtp is the protocol used between browsers and Web servers. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast

different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
71) ftp is the protocol used mainly for email transmissions. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast

different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept

22 Copyright © 2017 Pearson Education, Inc.
72) Unlike ftp, http does not have a secure version. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways

of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
73) Assignment of both public and private IP addresses is controlled by ICANN. Answer:  FALSE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare

and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
74) The owner of a domain name can change the affiliated IP addresses at its discretion. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
75) A URL consists of a protocol followed by a domain name or public IP address. Answer:  TRUE AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare

and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
76) Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. Answer:  TRUE AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept

23 Copyright © 2017 Pearson Education, Inc.
77) Discuss packets, carriers, peering, and net neutrality. Answer:  When a packet, or message, moves across the Internet, it passes through networks owned by large

telecommunication providers known as carriers. These large carriers exchange traffic freely without charging each other access fees via peering agreements. Carriers

make revenue by collecting subscription fees from end users, but not from peers. The problem with peering is that some people use more bandwidth than others. Net

neutrality is the principle that all data is treated equally. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in

managing the components of IT infrastructure LO:  6.3: How does the cloud work? Classification:  Concept
78) What is an IP address? Describe the advantages of private and public IP addresses. Answer:  An IP address is a number that identifies a particular device. Public

IP addresses identify a particular device on the public Internet. Because public IP addresses must be unique, worldwide, their assignment is controlled by a public

agency known as ICANN (Internet Corporation for Assigned Names and Numbers). Private IP addresses identify a particular device on a private network, usually on a LAN.

Their assignment is controlled within the LAN. The private/public IP address scheme has two major benefits. First, public IP addresses are conserved. All of the

computers on the LAN use only one public IP address. Second, by using private IP addresses, one is protected from attackers directly attacking him or her because

attackers cannot send attack packs to private IP addresses. They can only send attacks to devices with public IP addresses. AACSB:  Information Technology Difficulty:

2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept
79) Describe the three-tier architecture for Web applications such as e-commerce. Answer:  The three-tier architecture is an arrangement of user computers and servers

into three categories, or tiers. The user tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. The

server tier consists of computers that run Web servers and process application programs. The database tier consists of computers that run a DBMS that processes

requests to retrieve and store data. Web servers are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from

clients. A commerce server is an application program that runs on a server-tier computer. Typical commerce server functions are to obtain product data from a database,

manage the items in a shopping cart, and coordinate the checkout process. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast

different ways of connecting to the Internet LO:  6.3: How does the cloud work? Classification:  Concept

24 Copyright © 2017 Pearson Education, Inc.
80) Discuss TCP/IP Protocol Architecture, and define Internet protocols. Answer:  The basic plumbing of the Internet is governed by protocols that are defined

according to an arrangement called the TCP/IP protocol architecture. This architecture has five layers; one or more protocols are defined at each layer. Data

communications and software vendors write computer programs that implement the rules of a particular protocol. The Internet protocols that a business professional is

likely to encounter are as follows: Hypertext Transfer Protocol (http) is the protocol used between browsers and Web servers. Whenever a browser such as Microsoft

Edge, Safari, or Chrome is used, a program that implements the http protocol is being used. A secure version of http is called https. Simple Mail Transfer Protocol, or

smtp, is used for email transmissions (along with other protocols). File Transfer Protocol, or ftp, is used to move files over the Internet. AACSB:  Information

Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.3: How does the cloud work?

Classification:  Concept
81) Which of the following is an example of PaaS, a category of cloud hosting? A) Microsoft Office 365 B) Microsoft Windows Azure C) iCloud D) Amazon S3 Answer:  B

AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.4: How do organizations use

the cloud? Classification:  Concept
82) Which of the following is an example of SaaS? A) iCloud B) Microsoft Windows Azure C) Oracle On Demand D) Amazon S3 Answer:  A AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.4: How do organizations use the cloud? Classification:

Concept

25 Copyright © 2017 Pearson Education, Inc.
83) Which of the following is the most basic cloud offering? A) SaaS B) CDN C) IaaS D) VPN Answer:  C AACSB:  Information Technology Difficulty:  1: Easy Course LO:

Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud? Classification:  Concept
84) Olivia’s food packaging startup employs thirty people. Running low on capital, Olivia contacted Sean, a cloud vendor, to provide her company with an operating

system and a database management system. In this scenario, which of the following services will Sean be providing Olivia? A) CDN B) PaaS C) IaaS D) VPN Answer:  B

AACSB:  Reflective Thinking Difficulty:  3: Challenging Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do

organizations use the cloud? Classification:  Application
85) Which of the following is an example of PaaS? A) Apple iCloud B) Amazon S3 C) Oracle On Demand D) Office 365 Answer:  C AACSB:  Information Technology Difficulty:

2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud? Classification:

Concept

26 Copyright © 2017 Pearson Education, Inc.
86) Which of the following is an example of IaaS? A) Apple iCloud B) Microsoft Azure C) Office 365 D) Amazon S3 Answer:  D AACSB:  Information Technology Difficulty:

2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud? Classification:

Concept
87) Amazon S3 is an example of ________. A) CDN B) PaaS C) IaaS D) VPN Answer:  C AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Discuss the key

issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud? Classification:  Concept
88) An organization that provides software as a service provides only operating systems and application programs. Answer:  FALSE AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud?

Classification:  Concept
89) The most basic cloud offering is platform as a service (PaaS) that is the cloud hosting of a bare server computer or data storage. Answer:  FALSE AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations

use the cloud? Classification:  Concept

27 Copyright © 2017 Pearson Education, Inc.
90) Define SaaS, PaaS, and IaaS. Provide an example of each. Answer:  An organization that provides software as a service (SaaS) provides not only hardware

infrastructure, but also an operating system and application programs as well. For example, Salesforce.com provides programs for customer and sales tracking as a

service. The second category of cloud hosting is platform as a service (PaaS), whereby vendors provide hosted computers, an operating system, and possibly a DBMS.

Microsoft Windows Azure, for example, provides servers installed with Windows Server. Customers of Windows Azure then add their own applications on top of the hosted

platform. The third category of cloud hosting is infrastructure as a service (IaaS) that is the cloud hosting of a bare server computer or disk drive. Amazon EC2

provides bare servers, and its Simple Storage Server provides, in essence, an unlimited, reliable disk drive in the cloud. AACSB:  Information Technology Difficulty:

2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud? Classification:

Concept
91) What are content delivery networks? Discuss some of its uses. Answer:  A content delivery network (CDN) is a system of hardware and software that stores user data

in many different geographical locations and makes those data available on demand. A CDN provides a specialized type of PaaS but is usually considered in its own

category. A news organization could use a CDN to store copies of its news articles. The CDN vendor replicates articles on servers, possibly worldwide, so as to speed

response time. In addition to news articles, CDNs are often used to store and deliver content that seldom changes. For example, the company banner on an organization’s

Web page might be stored on many CDN servers. Various pieces of the Web page could be obtained from different servers on the CDN. AACSB:  Information Technology

Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT infrastructure LO:  6.4: How do organizations use the cloud?

Classification:  Concept
92) Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud. Answer:  TRUE AACSB:

Information Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.5: How can Falcon Security use the

cloud? Classification:  Concept

28 Copyright © 2017 Pearson Education, Inc.
93) The connection between a VPN client and a VPN server is called a(n) ________. A) data highway B) hyperlink C) tunnel D) access point Answer:  C AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.6: How can organizations use cloud services

securely? Classification:  Concept
94) Which of the following statements is true about a VPN? A) A VPN client software encrypts messages to ensure secure transmissions. B) A VPN network does not provide

users with remote access. C) A VPN connection utilizes private networks instead of the public network. D) A VPN connection appears as a secure connection, though it is

not. Answer:  A AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.6: How can

organizations use cloud services securely? Classification:  Concept
95) A(n) ________ uses the Internet to create the appearance of private, secure connections. A) VPN B) ISP C) URL D) DSL Answer:  A AACSB:  Information Technology

Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.6: How can organizations use cloud services securely?

Classification:  Concept
96) A ________ is a cloud that is owned and operated by an organization for its own benefit. A) private cloud B) virtual private network C) wide area network D)

service as a cloud Answer:  A AACSB:  Information Technology Difficulty:  1: Easy Course LO:  Discuss the key issues involved in managing the components of IT

infrastructure LO:  6.6: How can organizations use cloud services securely? Classification:  Concept

29 Copyright © 2017 Pearson Education, Inc.
97) To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping. Answer:  FALSE AACSB:  Information

Technology Difficulty:  1: Easy Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.6: How can organizations use cloud services

securely? Classification:  Concept
98) What is a virtual private network (VPN)? Explain how VPNs ensure the security of transmissions. Answer:  A virtual private network (VPN) uses the Internet to

create the appearance of private, secure connections. In the IT world, the term “virtual” means something that appears to exist but in fact does not. A VPN uses the

public Internet to create the appearance of a private connection on a secure network. The remote user is the VPN client. When the client connects to the Internet, the

VPN software on the remote user’s computer establishes a connection with the VPN server. The VPN client and VPN server then have a secure connection. That connection,

called a tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. To ensure security, VPN client software encrypts,

or codes, messages so their contents are protected from snooping. Then the VPN client appends the Internet address of the VPN server to the message and sends that

package over the Internet to the VPN server. When the VPN server receives the message, it strips its address off the front of the message, decrypts the coded message,

and sends the plain text message to the original address inside the LAN. In this way, secure private messages are delivered over the public Internet. AACSB:

Information Technology Difficulty:  2: Moderate Course LO:  Compare and contrast different ways of connecting to the Internet LO:  6.6: How can organizations use cloud

services securely? Classification:  Concept
99) Which of the following would be a consequence of teleaction, a form of remote action systems? A) The need for local support staff would decrease. B) The value of

local mediocrity would decrease. C) The requirement for highly skilled employees would decrease. D) The industries producing high value products would be unable to

properly utilize teleaction. Answer:  B AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components

of IT infrastructure LO:  6.7: 2026? Classification:  Concept

30 Copyright © 2017 Pearson Education, Inc.
100) What are remote action systems? Explain with the help of examples. Answer:  Remote action systems provide computer-based activity or action at a distance. By

enabling action at a distance, remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is

not physically located. They also enable experts to scale their expertise. Remote action systems include telediagnosis, telesurgery, and telelaw enforcement.

Telediagnosis is a remote action system that health care professionals use to diagnose illness for rural or remote areas. Telesurgery uses telecommunications to link

surgeons to robotic equipment at distant locations. Telelaw enforcement, such as the RedFlex system, uses cameras and motion-sensing equipment to issue tickets for

red-light and speeding violations. AACSB:  Information Technology Difficulty:  2: Moderate Course LO:  Discuss the key issues involved in managing the components of IT

infrastructure LO:  6.7: 2026? Classification:  Concept

Order from us and get better grades. We are the service you have been looking for.