48 a client server application that requires nothing more than a browser is called a 4313177

48 a client server application that requires nothing more than a browser is called a 4313177

48) A client-server application that requires nothing more than a browser is called a(n) ________.

A) native application

B) adware

C) firmware

D) thin-client application

49) Which of the following statements is true of native applications?

A) They only run on the operating system for which they are programmed.

B) The cost of native applications is low.

C) They can be developed by less skilled, lesser-paid employees.

D) The limits on these applications are usually technological, not budget.

50) Thin-client applications are developed using ________.

A) HTML5

B) Java

C) Objective-C

D) C#

51) Thin-client applications are typically limited by the capabilities of the ________.

A) programming language

B) browser

C) hardware

D) operating system

52) A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.

A) PC

B) mainframe computer

C) server

D) mobile device

53) Which of the following is an example of a mobile device?

A) a smartphone

B) an Xbox

C) a desktop computer

D) a mainframe

54) ________ refers to data delivered to the user at the precise moment it is needed.

A) Asynchronous data

B) Just-in-time data

C) Source code

D) Payload

55) Which of the following is the presentation format of an application?

A) cookie

B) process blueprints

C) botnet

D) user interface

56) ________ is a term that refers to the visual overhead in a computer display.

A) Chrome

B) Charms

C) Botnet

D) Cookie

57) ________ occurs when users move their activities, especially long-running transactions, across devices.

A) Cloud computing

B) Key logging

C) Pharming

D) Roaming

58) Which of the following is an advantage to an organization if its BYOD policy offers wireless network to mobile devices?

A) The organization can sniff employees' mobile traffic.

B) Employees gain public access from any device, not just mobile devices.

C) The policy appears to be permissive without actually being so.

D) Employees resist turning over the management of their own hardware to the organization.

59) Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?

A) The organization can sniff employees' mobile traffic.

B) Employees can gain public access from any device, not just mobile devices.

C) The policy appears to be permissive without actually being so.

D) Employees will buy the hardware.

60) ________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.

A) MDM software

B) A key logger

C) BYOD manager

D) A UX application

.

Looking for a similar assignment? Get help from our qualified experts!

Order Now

Related Posts