Processes on the remote systems are
identified by ___________
a) host ID
b) host name and identifier
c) identifier
d) process ID

1 Answer

Answer :

host name and identifier

Related questions

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger

Last Answer : C. different

Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above

Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Open-system ___________ tends to evolve more quickly than proprietary systems. A. hardware B. software C. hardware and software D. None of the above

Last Answer : hardware and software

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Each item of the Work Breakdown Structure is assigned a unique identifier. What is the name  of this identifier? 1. Product ID number  2. Code of accounts  3. Quality inspection identifier  4. Project activity code

Last Answer : 2. Code of accounts

Description : The process wherein the processor constantly checks the status flags is called as ___________ a) Polling b) Inspection c) Reviewing d) Echoing

Last Answer : Polling

Description : Which of the following can be identified as cloud? a) Web Applicationsb) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : While assessing your project processes, you have identified some  uncontrolled process variations. Which of the following would be the  appropriate chart you may use for this purpose? Select one: a. Pareto diagram b. PERT chart c. Control chart d. HR personnel chart e. Critical path

Last Answer : c. Control chart

Description : The process of assessing the probability and consequences of identified risks to the project objectives, assigning a risk score to each risk, and creating a list of prioritized risks describes ... Risk Analysis B. Risk Identification C. Qualitative Risk Analysis D. Risk Management Planning

Last Answer : C. Qualitative Risk Analysis

Description : According to the PMBOK Guide, the project manager is identified and assigned  during which process?  A. Prior to beginning the Develop Project Charter process B. At the conclusion of the ... . Prior to beginning the Planning processes D. Prior to beginning the Preliminary Scope Statement process

Last Answer : C. Prior to beginning the Planning processes

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service

Last Answer : Identity-as-a-Service

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Service exporters that can export a bean as a remote service based on the :- a) RMI b) Hessian c) Burlap d) All of the mentioned

Last Answer : All of the mentioned

Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc

Last Answer : telnet

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : ________ is a framework for performing remote procedure calls and data serialization. a) Drill b) BigTop c) Avro d) Chukwa

Last Answer : Avro

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer

Last Answer : map

Description : Which is not a benefit of cloud computing? a) Streamline business processes b) Pervasive accessibility c) Economic of scale d) Program debugging

Last Answer : Program debugging

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : Hypervisor runs directly on underlying host system.It is also known as? A. Bare metal hypervisor B. Native Hypervisor C. Hosted Hypervisor D. Both A and B

Last Answer : Both A and B

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which of the following will be the host operating system for Windows Server? a) VirtualLogix VLX b) Microsoft Hyper-V c) Xen d) All of the mentioned

Last Answer : ) Microsoft Hyper-V

Description : A ____________ can run a completely isolated guest operating system installation within a normal host operating system. a) Virtual Monitor b) Virtual Machine Managerc) Virtual Box d) Virtual Machine

Last Answer : Virtual Machine

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned

Last Answer : Vendor lock-in

Description : Balancing the workload by transferring the under performing servers is a feature of ___________. A. High availability. B. Operational automation. C. Dynamic resource. D. Live Migration

Last Answer : Live Migration

Description : Content can be ___________ in virtual appliance A. structured B. unstructured C. Both A and B D. None of the above

Last Answer : Both A and B

Description : The method which offers higher speeds of I/O transfers is ___________ a) Interrupts b) Memory mapping c) Program-controlled I/O d) DMA

Last Answer : DMA

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : To overcome the lag in the operating speeds of the I/O device and the processor we use ___________ a) BUffer spaces b) Status flags c) Interrupt signals d) Exceptions

Last Answer : Status flags

Description : The system is notified of a read or write operation by ___________ a) Appending an extra bit of the address b) Enabling the read or write bits of the devices c) Raising an appropriate interrupt signal d) Sending a special signal along the BUS

Last Answer : Sending a special signal along the BUS

Description : The advantage of I/O mapped devices to memory mapped is ___________ a) The former offers faster transfer of datab) The devices connected using I/O mapping have a bigger buffer space c) The devices have to deal with fewer address lines d) No advantage as such

Last Answer : The devices have to deal with fewer address lines

Description : The usual BUS structure used to connect the I/O devices is ___________ a) Star BUS structure b) Multiple BUS structure c) Single BUS structure d) Node to Node BUS structure

Last Answer : Single BUS structure

Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned

Last Answer : scalability

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : . ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE

Last Answer : 200 TB

Description : ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE

Last Answer : GFS