Lernkarten

Karten 112 Karten
Lernende 2 Lernende
Sprache English
Stufe Mittelschule
Erstellt / Aktualisiert 20.09.2020 / 22.09.2020
Lizenzierung Namensnennung - Nicht-kommerziell - Keine Bearbeitung (CC BY-NC-ND)     (LC)
Weblink
Einbinden
0 Exakte Antworten 0 Text Antworten 112 Multiple Choice Antworten
Fenster schliessen

What does the integrity of information mean?

It means that the access to the information is limited.

. It means that the information can be accessed by those users who are allowed to access it.

It means that the information is accurate

It means that the information is protected.

Fenster schliessen

What is a main challenge for enterprises in using cell phones for collaboration?

Applications for collaboration are limited

Collaborative applications are complicated

Employees want to use their private cell phones.

Separating business data from personal data

Fenster schliessen

What is the principal function of the Hypervisor?

identity management

responding to client requests

scheduling the sharing of resources

virus protection

Fenster schliessen

How can a protocol analyzer be used?

to analyze errors in the protocol syntax used in a failed message

to distribute messages according to the addressing protocol they use

. to measure the bandwidth required for different types of transactions

to prevent virus infections in the network software

Fenster schliessen

What is specific for public cloud?

It is a client computer connected to a network

It uses both local and remote services in its implementation

It uses services provided by an external service provider.

The services are shared in the organization.

Fenster schliessen

Why is a thin client called 'thin'?

because it has a thin monitor

because it has limited functionality

. because it has no memory

because it has no processor

Fenster schliessen

Providing a user access to an application in the Cloud requires several steps. In which step are the user's permissions determined?

during the auditing phase

during the authentication phase

during the authorization phase

during the verification phase

Fenster schliessen

What was a serious drawback in the early development of networks?

A. computers being dedicated to one function

computers were too complicated to be connected

the low speed of the network

vendors developing their own network communication protocols