Apple Developer Academy Exam Prep Flashcards
To limit hops _____ is a mechanism that limits the lifespan or lifetime of data in a computer or network
TTL (Time To Live)
A _____ network is a network topology in which each node relays data and all nodes cooperate in the distribution of data in the network.
Mesh
The File Transfer Protocol (FTP) is a standard network protocol used for the _____ of computer files from a server to a client using the _____ model on a computer network.
Transfer, client-server
_____ is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses.
Reverse Address Resolution Protocol
The IPv4 header _____ is a simple _____ used in version 4 of the Internet Protocol (IPv4) to protect the header of IPv4 data packets against data corruption. This _____ is calculated only for the header bytes (with the checksum bytes set to 0), is 16 bits long and is a part of the IP packet header.
checksum, checksum, checksum
A cloud service provider wants to provide storage as a service to users. The company is based in Italy and operates its data center there. What would the company do in order to ensure <b> high availability </b> for the storage services they provide?
Build a data center in US and backup user data there
What are the components of a cloud computing environment?
Client, application, platform, infrastructure, server
In cloud computing, which term is used to describe the nature of IT infrastructure and allows dynamic scaling depending on the demand for resources?
Elasticity
What is the role of virtualization in cloud computing?
It optimizes the utilization of computing resources
Which term usually presents a single point of failure in regard to cloud computing?
Network connection
The manipulation of people to disclose confidential information defines what type of risk?
Social Engineering
A _____ denial-of-service attack occurs when a denial-of-service attack is orchestrated among multiple remote computers or devices.
Distributed
In computing, the term “spam” refers to _____
Unsolicited bulk e-mail
_____ is a class of malware designed specifically to automate cybercrime.
Crimeware
Firewall is a set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. A firewall examines all traffic routed between the two networks to see if it meets certain criteria.
Packet filter is one fo the categories of firewall.
Packet filtering firewall works at which of these layers of the OSI model?
Network Layer
A UNION query _____
Must include the same number of columns of the two tables.
The SQL ALTER statement can be used to _____
Change the table structure.
You can add a row using SQL in a database with the command _____
INSERT
What SQL statement would correctly insert data into a table called “Projects”?
INSERT INTO Projects (ProjectName, ProjectDescription) VALUES (‘Content Development’, ‘Website content development project’)
What statements defines what SQL’s can be used for?
Only to create database structure.
Only to query database data.
Only to modify database data.
iOS Human Interface Guidelines: Interface Essentials. Most iOS apps are built using components from UIKit, a programming framework that defines common interface elements. Which of the following is not a native component in iOS user interface design?
Hamburger Menus
In UI design the term “white space” is commonly referring to _____
The empty space between the visual elements of a layout