Data centers and centralized computing covers many and
a) Microcomputers
b) Minicomputers
c) Mainframe computers
d) Supercomputers

1 Answer

Answer :

Supercomputers

Related questions

Description : Which type of computers uses the 8-bit code called EBCDIC? A) Minicomputers B) Microcomputers C) Mainframe computers D) Super computer

Last Answer : Answer : C

Description : Which type of computers uses the 8-bit code called EBCDIC? a. Minicomputers b. Microcomputers c. Mainframe computers d. Super computer

Last Answer : c. Mainframe computers

Description : Which type of computers uses the 8-bit code called EBCDIC? a. Minicomputers b. Microcomputers c. Mainframe computer

Last Answer : c. Mainframe computer

Description : What is the most popular hardware for multimedia creations? a) PCs b) Minicomputers c) Mainframe Computers d) WANs e) Super Computers

Last Answer : a) PCs

Description : What is the main difference between a mainframe and a super computer? A) Super computer is much larger than mainframe computers B) Super computers are much smaller than mainframe computers C) ... programs as possible while mainframe uses its power to execute few programs as fast as possible.

Last Answer : Answer : C

Description : How Cloud Federation provides benefits to Cloud providers? a) allows providers to earn revenue from computing resources that would otherwise be idle or underutilized b) enables cloud providers to expand their ... -level agreements (SLAs) into their partner provider's data centers. d) All the above

Last Answer : All the above

Description : What is cloud computing replacing? a) Corporate data centers b) Expensive personal computer hardware c) Expensive software upgrades d) All of the above

Last Answer : All of the above

Description : Which of the following are issues associated with SaaS? A. Modest software tools B. Network dependence C. Centralized management and data D. Multitenant solutions

Last Answer : Network dependence

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned

Last Answer : Data centers have been sited to optimize the overall system latency

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : Which of the following is not a storage of storage area network? A. Direct attach storage. B. Centralized but still Direct attach storage. C. Shared Storage. D. Distributed Storage

Last Answer : Distributed Storage.

Description : . ____________ refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective. A. Virtualization B. SOA C. Grid Computing D. Utility Computing Ans : C

Last Answer : . Grid Computing

Description : .In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. a) Virtual machine b) Virtual computing c) Virtual cloud d) Load balancer

Last Answer : Load balancer

Description : What exactly is cloud computing? a) A way to organize desktop computers b) Lightweight software that takes up little space on a hardware c) Computing resources that can be accessed on demand, like electricity from a utility d) The World Wide Web

Last Answer : Computing resources that can be accessed on demand, like electricity from a utility

Description : Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex interconnections existing among the human brain's nerve cells. What name ... ? a) Intelligent computers b) Supercomputers c) Neural network computers d) Smart computers

Last Answer : c) Neural network computers

Description : The operating system called UNIX is typically used for - 1) Desktop computers 2) Laptop computers 3) Supercomputers 4) All of these

Last Answer : 4) All of these

Description : The operating system called UNIX is typically used for - 1 Desktop computers 2 Laptop computers 3 Supercomputers 4 All of these

Last Answer : 4 All of these

Description : ART (Automatic Reasoning Tool) is designed to be used on __________ a) LISP machines b) Personal computers c) Microcomputers d) All of the mentioned

Last Answer : a) LISP machines

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which of the following is true of cloud computing? A. It's always going to be less expensive and more secure than local computing. B. You can access your data from any computer in the world, ... connection. C. Only a few small companies are investing in the technology, making it a risky venture.

Last Answer : You can access your data from any computer in the world, as long as you have an Internet connection.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Simple Storage Service use for? A. It allows the users to store and retrieve various types of data using API calls. B. It does contain computing element. C. Both A and B D. None of the above

Last Answer : It allows the users to store and retrieve various types of data using API calls.

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above

Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.

Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : Which are microcomputers commonly used for commercial data processing, desktop publishing and engineering application. a. Digital computer b. Personal computer c. Both d. None of these

Last Answer : b. Personal computer

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following is the most complete cloud computing service model? a) PaaS b) IaaS c) CaaS d) SaaS

Last Answer : SaaS

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following is the highest degree of integration in cloud computing? a) CaaS b) AaaS c) PaaS d) SaaS

Last Answer : SaaS

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform