. The performance of the data store can be enhanced by in-memory caching
usingthe____________, which can also be used independently of the data store.
a) Blobstore
b) Data store
c) URL fetch
d) memcache

1 Answer

Answer :

memcache

Related questions

Description : The performance of the data store can be enhanced by in-memory caching usingthe____________, which can also be used independently of the data store. a) Blobstore b) Data store c) URL fetch d) memcache

Last Answer : memcache

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : REST service end point comprises an address. a) starts with http:// and ends with ? b) starts with http:// and ends with & c) no certain URL is specified d) depends upon the platform used

Last Answer : starts with http:// and ends with ?

Description : The secondary storage devices can only store data but they cannot perform A) Arithmetic Operation B) Logic operation C) Fetch operations D) Either of the above

Last Answer : Answer : D

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : Either of the above

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : d. Either of the above

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : d. Either of the above

Description : The instruction fetch operation is initiated by loading the contents of program counter into the and sends _ request to memory: a. Memory register and read b. Memory register and write c. Data register and read d. Address register and read

Last Answer : d. Address register and read

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Which of these terms is a type of data compression? A. resolution B. zipping C. Inputting D. caching

Last Answer : B. zipping

Description : Simple Storage Service use for? A. It allows the users to store and retrieve various types of data using API calls. B. It does contain computing element. C. Both A and B D. None of the above

Last Answer : It allows the users to store and retrieve various types of data using API calls.

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3? a) CloudWatch b) Amazon SimpleDB c) Amazon Cloudfront d) All of the mentioned

Last Answer : Amazon SimpleDB

Description : Marshalling is the process of transforming an in-memory representation of an object into a data format.a a) True b) False

Last Answer : True

Description : Which one of the following statements is false regarding the Distributed Cache? a) The Hadoop framework will ensure that any files in the Distributed Cache are distributed to all map and reduce tasks. b) ... Cache on to the slave node before any tasks for the job are executed on that node.

Last Answer : MapReduce tries to place the data and the compute as close as possible

Description : Where did all the facts are stored to implement store and fetch function? a) Database b) Knowledge base c) Datamart d) All of the mentioned

Last Answer : b) Knowledge base

Description : A computer executes programs in the sequence of : (1) Execute, Fetch, Decode (2) Store, Fetch, Execute (3) Fetch, Decode, Execute (4) Decode, Fetch, Execute

Last Answer : Fetch, Decode, Execute

Description : _is the step during which a new instruction is read from the memory: a Decode b. Fetch c. Execute d. None of these

Last Answer : b. Fetch

Description : The necessary steps carried out to perform the operation of accessing either memory or I/O Device, constitute a ___________________ a) fetch operation b) execute operation c) machine cycle

Last Answer : c) machine cycle

Description : The ……………. Determines when a page should be brought into main memory. A) Fetch policy B) Placement policy C) Replacement policy D) Resident set management

Last Answer : A) Fetch policy

Description : A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. a) Service b) Application c) Deployment d) All of the mentioned

Last Answer : Service

Description : Which of the following acts as a lever to progress for the business?A. Diversity. B. Investment cost. C. Software application. D. System Performance

Last Answer : System Performance.

Description : Which of the following does not belong to type of competency area in cloud business analytics? A. Business intelligence and performance management. B. Analytics and optimization. C. Content management system . D. Information Hierarchy.

Last Answer : Information Hierarchy.

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : Which of the following is used for Web performance management and load testing? a) VMware Hyperic b) Webmetrics c) Univa UD d) Tapinsystems

Last Answer : Webmetrics

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : For whom Cloud Infrastructure performance is the primary concern a) Software Vendors b) IT Administrator c) Cloud Providers d) Cloud Users

Last Answer : Cloud Providers

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : Abbreviation of HPC a) High-peak computing b) High-peripheral computing c) High-performance computing d) Highly-parallel computing

Last Answer : High-performance computing

Description : How do I stop my dog from caching food when we go backpacking?

Last Answer : I hand feed, one kibble at a time, in this case.

Description : Stylesheet_link_tag, javascript_include_tag, caching problems?

Last Answer : answer:First, I should say that I am not familiar with Rails, so take this as generic advice: Without that unless, the file would get recreated every time. This would be a very bad idea, as you ... but inefficient way is to compare timestamps of your source files with the all.cs and all.js files.

Description : Define what are the different types of Caching?

Last Answer : There are three types of Caching: 1. Output Caching: stores the responses from an asp.net page. 2. Fragment Caching: Only caches/stores the portion of the page (User Control) 3. Data Caching: is Programmatic way to Cache objects for performance.

Description : What caching options do you have for reports on report server?

Last Answer : Do no cache, expiry cache after x minute, on schedule

Description : To locate a data item for storage is A) Field B) Feed C) Database D) Fetch

Last Answer : Answer : D

Description : To locate a data item for storage is a. Field b. Feed c. Database d. Fetch

Last Answer : Fetch

Description : To locate a data item for storage is a. Field b. Feed c. Database d. Fetch

Last Answer : Fetch

Description : To locate a data item for storage is a. Field b. Feed c. Database d. Fetch

Last Answer : d. Fetch

Description : To locate a data item for storage is a. Field b. Feed c. Database d. Fetch

Last Answer : d. Fetch

Description : Which of the following is not a function hypervisor management software? A. Create VM. B. Store VM. C. Delete VM. D. Move VM.

Last Answer : Store VM.

Description : Which of the following metrics are used to support Elastic Load Balancing? a) CloudWatch b) Amazon Elastic Block Store c) AWS Import/Export d) All of the mentioned

Last Answer : CloudWatch

Description : Does the Python runtime environment include a Python Interpreter? a) Yes, but it needs to be enabled in the .conf file b) No, it has to be purchased from the python store c) No, but it can be added later d) Yes

Last Answer : Yes

Description : What is used to logically assign and separate physical resources such as memory and CPU in a cloud computing model? A. bios B. a hypervisor C. a load balancer D. a blade chassis

Last Answer : a hypervisor

Description : Which of the following is a web service that manages the memory cache in the cloud? A. Amazon Elastic Cache B. Amazon RDS C. RDMS on EC2 D. Auto Scaling

Last Answer : Amazon Elastic Cache