<< Chapter < Page Chapter >> Page >

Question 24

True or False?

Although the distinction between client and server is becoming less clear each day, there is one fundamental distinction that is inherent in the Javaprogramming language.

The server initiates conversations with clients, while clients block and wait for a server to initiate a conversation.

Go to answer 24

What is the meaning of the following two images?

These images were inserted here simply to insert some space between the questions and the answers to keep them from being visible on the screen at thesame time.

Spacer image of a rabbit and a penguin.

This image was also inserted for the purpose of inserting space between the questions and the answers.

Spacer image of a penguin and some houses.

Answers

Answer 24

False.

Although the distinction between client and server is becoming less clear each day, there is one fundamental distinction that is inherent in the Javaprogramming language.

The client initiates conversations with servers, while servers block and wait for a client to initiate a conversation.

Go back to Question 24

Answer 23

True.

Go back to Question 23

Answer 22

True.

Go back to Question 22

Answer 21

False.

Java provides at least two different approaches for doing network programming (and possibly more) , insofar as the web is concerned. The two approaches are associated with

  • The Socket , DatagramSocket , and ServerSocket classes
  • The URL, URLEncoder, and URLConnection classes.

Go back to Question 21

Answer 20

True.

Go back to Question 20

Answer 19

True.

Go back to Question 19

Answer 18

False. A proxy server is often used to improve the communication speed of computers inside of a company with the Internet at largeoutside the company. For example, if ten people inside the company attempt to connect to the same Internet server and download the same web page within a (hopefully) short period of time, that page may be saved on the proxy server on the first attempt and then delivered to the next nine people withoutre-acquiring it from the outside web server. This can significantly improve delivery time and reduce network traffic into and out of the company.

Go back to Question 18

Answer 17

False. A firewall is the common name given to the equipment and associated software that is used to insulate the network inside of a company from theInternet at large outside the company. Typically, the firewall will restrict the degree to which computers inside the company can communicate with the Internetfor security and other reasons.

Go back to Question 17

Answer 16

True.

Go back to Question 16

Answer 15

True.

Go back to Question 15

Answer 14

False. The Domain Name System (DNS) was developed to translate between IP addresses and domain names. Whenever you log your browser onto the internet and attempt to connect to a server using its domainname, the browser first communicates with a DNS server to learn the corresponding numeric IP address. The numeric IP address (and not the domain name) is encapsulated into the data packets and used by the internet protocol to route those packets from thesource to the destination.

Go back to Question 14

Answer 13

True.

Go back to Question 13

Answer 12

True.

Go back to Question 12

Answer 11

True.

Go back to Question 11

Answer 10

False. The User Datagram Protocol ( UDP) is often referred to as an unreliable protocol because there is no guarantee that a series of packets will arrive in the right order, or that they willarrive at all.

Go back to Question 10

Answer 9

True.

Go back to Question 9

Answer 8

True.

Go back to Question 8

Answer 7

True.

Go back to Question 7

Answer 6

False. IP is an acronym that stands for Internet Protocol.

Go back to Question 6

Answer 5

True.

Go back to Question 5

Answer 4

False. In order for two or more computers connected to a network to be able to exchange data in an orderly manner, they must adhere to a mutually acceptablecommunication protocol. The protocol defines the rules by which they communicate.

Go back to Question 4

Answer 3

True.

Go back to Question 3

Answer 2

False. Each of the devices on the network can be thought of as a node , and each node has a unique address.

Go back to Question 2

Answer 1

True.

Go back to Question 1

Miscellaneous

This section contains a variety of miscellaneous information.

Housekeeping material
  • Module name: Java4620r-Review
  • File: Java4620r.htm
  • Published: 03/08/14
  • Revised 12/26/14
Disclaimers:

Financial : Although the Connexions site makes it possible for you to download aPDF file for this module at no charge, and also makes it possible for you to purchase a pre-printed version of the PDF file, youshould be aware that some of the HTML elements in this module may not translate well into PDF.

I also want you to know that, I receive no financial compensation from the Connexions website even if you purchase the PDF version ofthe module.

In the past, unknown individuals have copied my modules from cnx.org, converted them to Kindle books, and placed them for sale onAmazon.com showing me as the author. I neither receive compensation for those sales nor do I know who does receive compensation. If youpurchase such a book, please be aware that it is a copy of a module that is freely available on cnx.org and that it was made andpublished without my prior knowledge.

Affiliation : I am a professor of Computer Information Technology at Austin Community College in Austin, TX.

-end-

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Object-oriented programming (oop) with java. OpenStax CNX. Jun 29, 2016 Download for free at https://legacy.cnx.org/content/col11441/1.201
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Object-oriented programming (oop) with java' conversation and receive update notifications?

Ask