CH7 Flashcards
______________ manages shared resources and enables users and other computers access to these resources.
Server
A ___________ has very large databases and very high use.
Server Farm
A _____________ is composed of hardware, software, transmission media.
Computer Network
An _____________ has high-capacity with high-bandwidth trunk lines and large high-speed computers.
Internet Backbone
T/F: An internet backbone is owned by goverments and telecom companies.
True.
A ___________ is a small network for a single site.
Local area network (LAN)
The ________________ is all the interconnected resources accessed through the Internet.
World Wide Web (WWW)
A _________ is the identifier for the Web to locate a particular resource
Uniform Resource Locator (URL)
A ________ is the URL of a resource embedded within another resource.
Hyperlink
Which part of the following url is the server name or address?
https://www.amazon.com/gp/cart/view.html/ref=nav_cart
www.amazon.com
Which part of the following url is the resource name?
https://www.amazon.com/gp/cart/view.html/ref=nav_cart
/gp/cart/view.html/ref=nav_cart
Which part of the following url is the protocol header?
https://www.amazon.com/gp/cart/view.html/ref=nav_cart
https://
_______________ are programs that perform work for users.
Application Software
T/F: A system software can either be a custom app or a web-based application.
F, An application software not a system software.
An _______ is a custom program usually for a laptop or smartphone.
App
_____________ is the behind the scene software, works as glue to hold everything together.
System Software
T/F: Embedded Softwares use a web browser.
F, Web-based Applications use a web browser
T/F: Embedded Softwares can be accessed through a URL.
F, Web-based Applications can be accessed through a URL.
T/F: A web-based application resides on a web server.
True.
T/F: An Embedded Software uses standard IP protocols.
F, Web-based applications use standard IP protocols
_____________ are Software apps or functions embedded within another app, such as within a browser or O/S.
Embedded Softwares
T/F: Examples of Embedded Software include Toolbars, Plug-ins, Widgets.
True.
_______ is a set of languages and rules to ensure communication and data exchange between hardware and software.
Protocol
A ___________ creates a private network but on the Internet by using secure technologies and encryption.
Virtual Private Network (VPN)
T/F: Virtual Private Network (VPN) is an example of network protocols.
True
________ is a protocol for the structure and content of a Web page.
HTML (hypertext markup language)
_________ is an extension of HTML that enables defining semantics of tags.
XML (extensible markup language)
__________ defines format and content for transfer of Web documents.
HTTP (hypertext transfer protocol)
_________ is the encrypted and secure http transfers.
HTTPS (hypertext transfer protocol secure)
HTML, XML, HTTP, and HTTPS are all ___________.
Web Protocols
_____________ is computers, network computers and hardware, and system software.
Technology Architecture
__________ is the software programs and their configuration.
Application Architecture
T/F: For Software as a Service (SaaS) a software is installed on the user’s device.
F, no software is installed.
T/F: For Software as a Service (SaaS), application Services is accessed remotely.
True
T/F: For Software as a Service (SaaS), User data is isolated and stored on common servers.
True.
A ________ is a software function that is executed with Web standards.
Web Service
T/F: A web service cannot be accessed via a URL.
F, it can be accessed using a URL.
T/F: In web services, inputs are sent via URL.
True.
T/F: A web service executes remotely.
True.
In a web service, Data is returned within a __________.
web page
A _________________ is a software design with part of the application on a server and part on the client.
Client/Server architecture
_____________ is the Client/server architecture with application divided into view layer, logic layer, and data layer.
Three-Layer architecture
The ______ layer is the user interface in the Three-Layer Architecture.
View
The ______ layer is the program logic to implement the functions in the Three-Layer Architecture.
logic
At the ______ layer are the functions to access the data in the Three-Layer Architecture.
data
____________ is the ability of an application to interact with other software.
Interoperability
____________ identify geographical
placement of hardware, software, and users.
Location Diagrams
__________ show how the application software is deployed across the hardware and system software.
Network Diagrams
A ___________ describes how software components are distributed across hardware and system software components.
Deployment Diagram
T/F: Network Diagrams and Deployment Diagrams are examples of diagrams for System Architecture.
True.
Name the four important characteristic in current development projects.
- Understand the environment
- Reuse software existing components (purchased or
in-house) - Build components considering interoperability
- Combine all components into a solution system
____________ is a system or application component that maintains the current and correct master copy of one or more data items.
System of record
_________ show which components perform which functions.
Application Component Boundaries
T/F: Application Component Boundaries involves grouping functions to build components, into actors, shared data, and events.
True, where…
For Actors, what functions do particular actors use
For Shared data, what functions use the same data.
For Events, what functions occur in common business events.