Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above
Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned
Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger
Last Answer : C. different
Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above
Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.
Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.
Last Answer : It enables users to access systems regardless of their location.
Description : Open-system ___________ tends to evolve more quickly than proprietary systems. A. hardware B. software C. hardware and software D. None of the above
Last Answer : hardware and software
Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned
Last Answer : handshaking
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : Each item of the Work Breakdown Structure is assigned a unique identifier. What is the name of this identifier? 1. Product ID number 2. Code of accounts 3. Quality inspection identifier 4. Project activity code
Last Answer : 2. Code of accounts
Description : The process wherein the processor constantly checks the status flags is called as ___________ a) Polling b) Inspection c) Reviewing d) Echoing
Last Answer : Polling
Description : Which of the following can be identified as cloud? a) Web Applicationsb) Intranet c) Hadoop d) All of the mentioned
Last Answer : Hadoop
Description : Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned
Description : While assessing your project processes, you have identified some uncontrolled process variations. Which of the following would be the appropriate chart you may use for this purpose? Select one: a. Pareto diagram b. PERT chart c. Control chart d. HR personnel chart e. Critical path
Last Answer : c. Control chart
Description : The process of assessing the probability and consequences of identified risks to the project objectives, assigning a risk score to each risk, and creating a list of prioritized risks describes ... Risk Analysis B. Risk Identification C. Qualitative Risk Analysis D. Risk Management Planning
Last Answer : C. Qualitative Risk Analysis
Description : According to the PMBOK Guide, the project manager is identified and assigned during which process? A. Prior to beginning the Develop Project Charter process B. At the conclusion of the ... . Prior to beginning the Planning processes D. Prior to beginning the Preliminary Scope Statement process
Last Answer : C. Prior to beginning the Planning processes
Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML
Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism
Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service
Last Answer : Identity-as-a-Service
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : Service exporters that can export a bean as a remote service based on the :- a) RMI b) Hessian c) Burlap d) All of the mentioned
Last Answer : All of the mentioned
Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc
Last Answer : telnet
Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing
Last Answer : Cloud Computing
Description : ________ is a framework for performing remote procedure calls and data serialization. a) Drill b) BigTop c) Avro d) Chukwa
Last Answer : Avro
Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization
Last Answer : Application virtualization
Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system
Last Answer : Run on single operating system
Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing
Last Answer : Mobile computing
Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer
Last Answer : map
Description : Which is not a benefit of cloud computing? a) Streamline business processes b) Pervasive accessibility c) Economic of scale d) Program debugging
Last Answer : Program debugging
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : Hypervisor runs directly on underlying host system.It is also known as? A. Bare metal hypervisor B. Native Hypervisor C. Hosted Hypervisor D. Both A and B
Last Answer : Both A and B
Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned
Last Answer : Host Operating System
Description : Which of the following will be the host operating system for Windows Server? a) VirtualLogix VLX b) Microsoft Hyper-V c) Xen d) All of the mentioned
Last Answer : ) Microsoft Hyper-V
Description : A ____________ can run a completely isolated guest operating system installation within a normal host operating system. a) Virtual Monitor b) Virtual Machine Managerc) Virtual Box d) Virtual Machine
Last Answer : Virtual Machine
Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned
Last Answer : Vendor lock-in
Description : Balancing the workload by transferring the under performing servers is a feature of ___________. A. High availability. B. Operational automation. C. Dynamic resource. D. Live Migration
Last Answer : Live Migration
Description : Content can be ___________ in virtual appliance A. structured B. unstructured C. Both A and B D. None of the above
Description : The method which offers higher speeds of I/O transfers is ___________ a) Interrupts b) Memory mapping c) Program-controlled I/O d) DMA
Last Answer : DMA
Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned
Last Answer : Program-controlled I/O
Description : To overcome the lag in the operating speeds of the I/O device and the processor we use ___________ a) BUffer spaces b) Status flags c) Interrupt signals d) Exceptions
Last Answer : Status flags
Description : The system is notified of a read or write operation by ___________ a) Appending an extra bit of the address b) Enabling the read or write bits of the devices c) Raising an appropriate interrupt signal d) Sending a special signal along the BUS
Last Answer : Sending a special signal along the BUS
Description : The advantage of I/O mapped devices to memory mapped is ___________ a) The former offers faster transfer of datab) The devices connected using I/O mapping have a bigger buffer space c) The devices have to deal with fewer address lines d) No advantage as such
Last Answer : The devices have to deal with fewer address lines
Description : The usual BUS structure used to connect the I/O devices is ___________ a) Star BUS structure b) Multiple BUS structure c) Single BUS structure d) Node to Node BUS structure
Last Answer : Single BUS structure
Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned
Last Answer : scalability
Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned
Last Answer : both local memory and clock
Description : . ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE
Last Answer : 200 TB
Description : ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE
Last Answer : GFS