The _______________ provides static resources and has been used in grid
computing for many years.
a) event driven method
b) popularity-driven method
c) demand-driven method
d) access driven method

1 Answer

Answer :

demand-driven method

Related questions

Description : Cloud computing architecture is a combination of? A. service-oriented architecture and grid computing B. utility computing and event-driven architecture. C. service-oriented architecture and event-driven architecture. D. virtualization and event-driven architecture.

Last Answer : service-oriented architecture and event-driven architecture.

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : How Cloud Federation provides benefits to Cloud providers? a) allows providers to earn revenue from computing resources that would otherwise be idle or underutilized b) enables cloud providers to expand their ... -level agreements (SLAs) into their partner provider's data centers. d) All the above

Last Answer : All the above

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : In Grid Computing, computer resources are? A. heterogeneous dispersed. B. geographically dispersed. C. Both A and B D. None of the above

Last Answer : Both A and B

Description : In Grid Computing, computer resources are? A. heterogeneous dispersed. B. geographically dispersed. C. Both A and B D. None of the above

Last Answer : Both A and B

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Which of the following factor has helped spur the popularity of collaborative software for conferencing and workgroup support? A. emergence of cloud networks B. high cost of computing C. lowered cost of travel D. All of the above

Last Answer : emergence of cloud networks

Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above

Last Answer : All of the above

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : What exactly is cloud computing? a) A way to organize desktop computers b) Lightweight software that takes up little space on a hardware c) Computing resources that can be accessed on demand, like electricity from a utility d) The World Wide Web

Last Answer : Computing resources that can be accessed on demand, like electricity from a utility

Description : What is true about Grid Computing? A. breaks complex task into smaller pieces B. combine smaller task into complex task C. subscription tier play vital role in Grid Computing D. Both A and B

Last Answer : breaks complex task into smaller pieces

Description : . ____________ refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective. A. Virtualization B. SOA C. Grid Computing D. Utility Computing Ans : C

Last Answer : . Grid Computing

Description : Managed IT services are based on the concept of? A. Virtualization B. SOA C. Grid Computing D. Utility Computing

Last Answer : Utility Computing

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing

Last Answer : Virtualization

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : D. All of the above

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : All of the above

Description : .Which technology allows use of read/write web, blogs & interactive web application etc. ? a) Mobile Computing b) Grid Computing c) Cloud Computing d) Web 2.0

Last Answer : Web 2.0

Description : _______ allows servers and storage devices to increasingly share and utilize applications by easy migration from one server to another a) Grid Computing b) Artificial Intelligence c) Virtualization d) Web 3.0

Last Answer : Virtualization

Description : Which of the following are correct technologies working behind the cloud computing platforms? a) Virtualization b) SOA c) Grid Computing d) All of the above

Last Answer : ) All of the above

Description : The cloud platform provides PaaS, which sits on top of the _______________ a) IaaS infrastructure. b) PaaS infrastructure c) SaaS infrastructure d) HaaS infrastructure

Last Answer : IaaS infrastructure.

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following benefit is related to create resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Which of the following is true about cloud computing? A. Cloud computing is platform dependent B. Cloud Computing makes our business applications mobile and collaborative. C. Cloud Computing provides us means of accessing the applications as utilities over computer only. D. All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative.

Description : Which of the following is true about cloud computing? a) Cloud computing is platform dependent b) Cloud Computing makes our business applications mobile and collaborative c) Cloud Computing provides us means of accessing the applications as utilities over computer only d) All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is true of cloud computing? A. It's always going to be less expensive and more secure than local computing. B. You can access your data from any computer in the world, ... connection. C. Only a few small companies are investing in the technology, making it a risky venture.

Last Answer : You can access your data from any computer in the world, as long as you have an Internet connection.

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : _________ model consists of the particular types of services that you can access on a cloud computing platform. A. Service B. Planning C. Deployment D. Application

Last Answer : A. Service

Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned

Last Answer : Virtualization

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Which of the following is considered an essential element in cloud computing? a) Multi-tenancy b) Identity and access management c) Virtualization d) None of the above

Last Answer : Multi-tenancy

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : A good cloud computing network can be adjusted to provide bandwidth on demand. A. True B. False

Last Answer : True

Description : A good cloud computing network can be adjusted to provide bandwidth on demand. A. True B. False

Last Answer : True