Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
IBM WebSpheresoftware components includecatalog management toolsfor both B2B and B2C operations.
a. True
b. False
Q:
Commerce service providers (CSPs) offer free or low-cost electronic commerce software for building online businesssites hosted on the CSP's server.
a. True
b. False
Q:
Commerce sites with minimal needs can use externally hosted stores that provide software tools to build an online store on a host's site.
a. True
b. False
Q:
Midrange software traditionally does not offer connectivity to database systems that store inventory information.
a. True
b. False
Q:
Mall-style commerce service providers charge a high monthly fee.
a. True
b. False
Q:
Yahoo! offers its commerce services, which include sitedesign, an online payment function, order processing and shipping, and marketingprograms, which are described on its Yahoo! Small Business Ecommerce Web page.
a. True
b. False
Q:
Page-based application systems are easily revised and updated.
a. True
b. False
Q:
The entire cost of a middleware implementation is the cost of the software itself.
a. True
b. False
Q:
MySQL, which is maintained by a community of programmers on the Web, is closed-source software.
a. True
b. False
Q:
Shopping cart software at some Web sites allows the customer to fill a shopping cart with purchases, put the cart in virtual storage, and come back days later to confirm and pay for the purchases.
a. True
b. False
Q:
Large sites with many products can provide a search engine that allows customers to enter descriptive search terms so that they can quickly find the Web page containing what they want to purchase.
a. True
b. False
Q:
As in a physical store, merchandise in an online store can be grouped within logical departments to make locating an item simpler.
a. True
b. False
Q:
Web stores never use the same department names as their physical counterparts.
a. True
b. False
Q:
The key functions of a basic electronic commerce Web site are catalog display, shopping cart capabilities, and transaction processing.
a. True
b. False
Q:
In a co-location service, the client installs its own software and maintains the server.
a. True
b. False
Q:
Electronic commerce sites vary greatly in terms of size, purpose, audience,and other factors.
a. True
b. False
Q:
With dedicated hosting, the client shares the server with other clients of the service provider.
a. True
b. False
Q:
In the context of doing business online, midsize and smaller companies religiously use self-hosting services.
a. True
b. False
Q:
Explain the factors required to measure a server's Web page delivery capability.
Q:
Explain the roles of indexing and searching utility programs.
Q:
Describe some of the drawbacks of e-mail.
Q:
Describe the major components of a typical request message from a client to a server.
Q:
Explain the difference between a dynamic Web page and a static Web page.
Q:
A(n) _____ is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming Web traffic to the server that has the most available capacity at that instant in time.
Q:
The various ways that servers can beconnected to each other and to related hardware, such as routers and switches, are called _____.
Q:
A large collection of servers is called a(n) _____.
Q:
A(n) _____ returns information describing a server's attributes.
Q:
The ability of a network to connect devices that use different operating systems is called _____.
Q:
_____ is the amount of time a serverrequires to process one HTTP request.
Q:
In the context of designing a large Website's operations, in a(n) _____ , a few very large and fast computers are used.
Q:
A popular serverconfiguration which involves putting small server computers on a single computer board andthen installing many of those boards into a rack-mounted frame. These servers-on-a-card are called _____.
Q:
A(n) _____ utility program examines each page on a Web site and reports any URLs that no longer exist.
Q:
Visitor information captured by Web servers are placed into a Web _____ for data analysis.
Q:
_____ is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Q:
_____ are messages rejected by a white list spam filter that should not have been rejected.
Q:
_____ comes bundled with current versions of Microsoft Windows Server operating systems and is used on many corporate intranets because many companies have adopted Microsoft products as their standard products.
Q:
_____ is the UNIX-based operating system of Oracle.
Q:
_____ tasks include running programs and allocating computer resources such as memory and disk space to programs.
Q:
The message that a Web client sends to request a file or files from a Web server is called a(n) _____.
Q:
The Web client/server model in which messages are created and read only by the client and theserver computers is called a(n) _____.
Q:
A(n) _____ is any computer used to provide files or make programs available to other computers connected to it through a network.
Q:
The computer on which a company runs its accounting and inventorymanagement software is sometimes called a(n) _____.
Q:
In the context of multiple meanings of the term server, the server computer that handles incoming and outgoing e-mail is usually called a(n) _____.
Q:
_____ is a development frameworkused to create interactive Web sites that look like applications running in a Webbrowser.
Q:
The server computer on which database management software runs is often called a(n) _____.
Q:
The practice of launching a return attack by sending e-mail messages back to a computer that originated a suspected spam is referred to as _____.
Q:
_____ in the form of programs called Java servlets, is a technology which is used to create dynamic Web pages.
Q:
_____ architectures are used in LANs, WANs, and the Web.
Q:
_____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.a. Protocol b. Throughputc. Filter capacity d. Tracert capacity
Q:
In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.a. response timing b. monitoringc. benchmarking d. filtering
Q:
Efforts to reduce the environmental impact of large computing installations are called _____ computing.a. efficient b. greenc. e-conserve d. e-wise
Q:
A(n) _____ file is a file on a Web server that is not linked to any page.a. lost b. indexc. orphan d. independent
Q:
A _____, when clicked, displays an error message rather than a Web page.a. link checker b. computer virusc. filter d. dead link
Q:
The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.a. black list spam filter b. white list spam filterc. File Transfer Protocol d. Microsoft Internet Information Server
Q:
_____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.a. Telnet b. Pingc. Finger d. Tracert
Q:
_____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.a. Route-tracing b. Indexingc. Benchmarking d. Link checker
Q:
A _____ program sends data packets to every computer on the path between one computer and another and clocks the packets' round-trip times.a. Telnet b. Tracertc. Ping d. Finger
Q:
A content-filtering technique where the softwarethatperforms the filtering task is placed on individual users' computers is called _____.a. server-side scripting b. client-side scriptingc. client-level filtering d. server-level filtering
Q:
A _____ spam filter examines From addresses and compares them to a list of known good sender addresses.a. black list b. full-privilegec. tracert d. white list
Q:
A _____ is an unsolicited commercial e-mail.a. spam b. programc. virus d. filter
Q:
A(n) _____ is a program that attaches itself to another program and can cause damage when the host program is activated.a. e-mail filter b. debugging codec. computer virus d. dead link
Q:
_____ Server has dominated the Web since 1996 because it is free and performs very efficiently.a. Apache HTTP b. Microsoft IISc. UNIX d. Linux
Q:
_____ continually conducts surveys to tally the number of Web sites in existence and track which Web server software each uses.a. BBC b. Microsoftc. Netcraft d. CNN
Q:
FreeBSD is a(n) _____-based operating system.a. Apple b. UNIXc. Linux d. Windows 2000 Server
Q:
A(n) _____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.a. response header field b. request header messagec. optional entity body d. response header line
Q:
In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server.a. request line b. request messagec. entity body d. request header
Q:
In a client/server architecture, the _____ contains a command, the name of the target resource, and the protocol name and version number.a. request header b. request linec. entity body d. response header
Q:
In _____, a program running on a Webserver creates a Web page in response to a request for specific information from a Web client.a. client-side scripting b. server-level filteringc. server-side scripting d. client-level filtering
Q:
_____ is a standard way of interfacing externalapplications with Web servers.a. Common Gateway Interface b. Graphical User Interfacec. Server-side scripting d. Client-side scripting
Q:
A _____ page is an unchanging page retrieved from a file on a Web server.a. static b. customizedc. personalized d. dynamic
Q:
_____ lets programmers create Web pages that will update asynchronously while the rest of the Web page continues to be displayed in the browser.a. ASP b. CGIc. AJAX d. C++
Q:
Customized pages provided by Web servers in response to specific queries from site visitors are called _____.a. dynamic content b. Active Server Pagesc. static pages d. unchanged content
Q:
In _____, software operates on the browser to change what is displayed on the Web page in response to a user's actions.a. client-side scripting b. server-side scriptingc. basic content filtering d. static content generation
Q:
Few large centralized sites use load-balancing systems, at an additional expense, to assign the workload efficiently.
a. True
b. False
Q:
A centralized architecture spreads failure risk over a large number of servers.
a. True
b. False
Q:
The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
a. True
b. False
Q:
A drawback of decentralized architecture is that if one of the few servers becomes inoperable, a large portion of the site's capacity is lost.
a. True
b. False
Q:
One element that affects overall server performance is the server hardware.
a. True
b. False
Q:
Very small companies can run Web sites on desktop PCs.
a. True
b. False
Q:
With remote server administration software, a Web site administrator can control a Web site from any Internet-connected computer.
a. True
b. False