____ is an internet based computing solution where shared resources are provided. 

a) Cloud Computing b) Networking c) LAN d) None of the above

2 Answers

Answer :

Cloud Computing is an internet based computing solution where shared resources are provided. 

Answer :

lan

Related questions

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : B. Cloud Computing 

Description : Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned

Last Answer : virtual

Description : Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned

Last Answer : virtual

Description : Which scheduling policy is most suitable for a time-shared operating system?  A) Shortest job first B) Round robin C) First come first serve D) Elevator

Last Answer : Which scheduling policy is most suitable for a time-shared operating system?  Round robin

Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned

Last Answer : tenants

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : Point out the wrong statement. a) Internet consumes roughly 1 percent of the world's total power b) The cost advantages of cloud computing have enabled new software vendors to create ... resources without the need for interaction with cloud service provider personnel d) None of the mentioned

Last Answer : Internet consumes roughly 1 percent of the world’s total power

Description : Hydrogen bonds are formed when a hydrogen atom is shared between two ____. a. molecules c. elements b. atoms d. neutrons

Last Answer : a. molecules

Description : )Resource leveling attempts to : 1. Reduce resource requirements by smoothing out period-to period resource assignments.  2. Ensure that the budget abnormalities are overcome. 3. Reduce the ... Increase the amount of the project manager's authority so that budget dollars can be  appropriated.

Last Answer : 1. Reduce resource requirements by smoothing out period-to period resource assignments.

Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above

Last Answer : a) a set of instructions that access common shared resources which exclude one another in time

Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport

Last Answer : B) Mac sub layer

Description : The ……………… layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transpor

Last Answer : B) Mac sub layer

Description : The component of marketing implementation that refers to work processes, procedures, and the way that information is structured is A)marketing structure. B)marketing strategy. C)organisational resources. D)shared goals. E)systems.

Last Answer : E)systems.

Description : Consider a system having ‘m’ resources of the same type. These resources are shared by three processes P1, P2 and P3 which have peak demands of 2, 5 and 7 resources respectively. For what value of ‘m’ deadlock will not occur? (A) 70 (B) 14 (C) 13 (D) 7

Last Answer : (B) 14

Description :  ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that ... server.  a) Client-Server network b) Extranet c) Internet d) None of the above.

Last Answer :  Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server. 

Description : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system.  a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Last Answer : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Description : Nano Second is the ____.  a) Millionths of a second b) Billionths of a second c) Trillionth of a second d) Thousands of a second

Last Answer : Nano Second is the Billionths of a second

Description : The device that is used to read bar codes is ____.  a) OMR b) Barcode c) MICR d) OCR

Last Answer : The device that is used to read bar codes is Barcode 

Description :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Last Answer :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Description :  ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Hacking is known as unauthorized access to the system. 

Description : ____ is known as allowing the authorized access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer : Decryption is known as allowing the authorized access to information. 

Description :  ____ is known as restricting the access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Encryption is known as restricting the access to information.

Description : A collection of related records in a database ____.  a) Field b) File c) Both (a) and (b) d) None of the above

Last Answer : A collection of related records in a database File

Description : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC

Last Answer : Of the following, ____ is not a computer language.  a) MS-Word b) C++ c) COBOL d) BASIC

Description : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Last Answer : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Description : The computer code for interchange of information between terminals is ____.  a) ASCII b) ACSII c) ASICI d) ASIIC

Last Answer : The computer code for interchange of information between terminals is ASCII.

Description : Web address is a unique address to identify ____ on web.  a) Browser b) Website c) Link d) All of the above

Last Answer : Web address is a unique address to identify Website on web. 

Description : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Last Answer : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Description : Without the symbol '=' excel will treat the data as ____.  a) Number b) Formula c) Text d) None of the above

Last Answer : Without the symbol '=' excel will treat the data as Text.

Description : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Last Answer : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Description : Of the following is correct syntax in excel ____?  a) REPLACE (old-text, num-chars, Start-num, New-text) b) REPLACE (old-text, Start-num, num-chars, New-text) c) REPLACE (old-text, New-text, num-chars, Start-num) d) REPLACE (num-chars, Start-num, old-text, New-text)

Last Answer : Of the following is correct syntax in excel REPLACE (old-text, Start-num, num-chars, New-text)

Description : Among the following ____ is a logical function.  a) Average b) Count c) ABS d) AND

Last Answer : Among the following AND is a logical function.

Description : What is the shortcut key to display the 'save as' dialog box ____.  a) F8 b) F12 c) F11 d) F9

Last Answer : What is the shortcut key to display the 'save as' dialog box F12.

Description : To find text, formatting and special items ____ is the keyboard short key.  a) Ctrl+g b) Ctrl+h c) Ctrl+f d) Ctrl+a

Last Answer : To find text, formatting and special items Ctrl+f is the keyboard short key.

Description :  In a table to move to the first cell in a row, ____ is the keyboard shortcut key.  a) Alt+Tab b) Alt+Shift c) Alt+Ctrl d) Alt+Home

Last Answer :  In a table to move to the first cell in a row, Alt+Home is the keyboard shortcut key.

Description : What is the keyboard shortcut key to merge a document ____.  a) Alt+Shift+N b) Alt+Shift+O c) Alt+Shift+P d) Alt+Shift+Q

Last Answer : What is the keyboard shortcut key to merge a document Alt+Shift+N.

Description : After copying the content, how many times can you paste ____.  a) Only one time b) Two times c) Three times d) Many times

Last Answer : After copying the content, how many times can you paste Many times.

Description : The smallest unit of computerized data is referred as ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The smallest unit of computerized data is referred as Bit.

Description : Information that a computer produces and delivers back to the user is known as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that a computer produces and delivers back to the user is known as Output.

Description : Information that is entered into a computer is called as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that is entered into a computer is called as Input.