1. A key measurement for Web server performance is throughput, which is the A. rate of transfer when downloading a 1-megabyte file. B. number of HTTP requests processed in a given amount of time. C. number of concurrent users on the Web site during a given time period. D. amount of time it takes to access the home page during peak transaction periods. 2. When Web server hardware and software combination are _______, they can be adapted to meet changing requirements when their clients grow. A. scalable C. robust B. optimized D. modular 3. Server-side scripting is used to provide A. storage requests. C. dynamic Web site content. B. static Web site content. D. SQL tables. 4. Code Red and Nimda are examples of A. antivirus software. C. worm busters. B. multivector viruses. D. SatanBug virus/worms. 5. The main disadvantage to a decentralized Web server architecture is that A. load balancing is not possible. B. operating systems become inefficient. C. several switches and hubs are required. D. peripherals can’t be attached to the system. 6. A hosting service that provides the physical space to the client for the client’s own Web server is called a _______ service. A. time-sharing C. dedicated B. distributed D. co-location 7. Shopping cart software keeps track of the items chosen during a Web shopping visit by A. having the user fill out forms. B. storing purchase information in Web files. C. using text box controls on the Web page. D. storing screens on a disk. 8. A _______ catalog stores the information about items in a database, usually on a separate computer that’s accessible to the server that’s running the Web site itself. A. analogue C. dynamic B. static D. digital 9. In a denial-of-service attack, normal processing can be disrupted when A. service providers lose their credit cards. B. someone warchalks a building. C. wireless access points are stolen. D. an excessive number of requests overwhelms a Web server. 10. Cybervandalism is an example of A. active wiretapping. C. warchalking. B. an integrity violation. D. a wireless network. 11. The rules used in the business that cause an application server to perform a certain action based on input are called A. data directives. C. step-by-step procedures. B. e-commerce commands. D. business logic. 12. Commerce service providers usually provide A. Web server management software and applications. B. unlimited software licenses to clients. C. customer service support for site customers. D. in-person desk side support for the company. 13. _______ provides search and catalog capabilities, electronic shopping carts, online credit card transaction processing, and the ability to connect to existing back-end business systems and databases. A. Yahoo! Store C. WebSphere Commerce Suite B. Intershop Enfinity MultiSite D. Bigstep Turtle Servers 14. An important goal of companies when they install middleware is A. co-location. C. open sourcing. B. shared hosting. D. interoperability. 15. Large electronic commerce sites usually keep _______ combinations in a separate database with built-in security features. A. virus scan C. firewall B. username/password XXXXX log file directory 16. A macro virus attack is most often launched through A. attachments to e-mail messages. C. sound and video files. B. infected floppy disks. D. corrupt Web sites. 17. If properly configured, your Internet browser can detect that a Web site is attempting to load active content to your computer and A. prompt you for your username and password. B. shift to text-only display mode. C. terminate the session. D. display a security warning message. 18. In a _______, the contents of an e-mail are often changed in a way that negates the message’s original meaning. A. man-in-the-middle exploit C. router jacknife B. encryption end run D. TCP/IP protocol 19. _______ is a programming language developed by Sun Microsystems that’s used widely in Web pages to provide active content. A. ActiveX C. Java B. Klez D. Mocha 20. The Code Red worm-virus combination is an example of a A. macro virus. C. multivector virus. B. untrusted applet. D. plug-in.
Victor was robbed and beaten by a man wearing a rubber