The capability of a system to adapt the
increased service load is called ___________
a) scalability
b) tolerance
c) capacity
d) none of the mentioned

1 Answer

Answer :

scalability

Related questions

Description : What is the need for load balancing in cloud computing? a) Increased scalability b) Ability to handle sudden traffic spikes c) A and B both d) None of these

Last Answer : A and B both

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned

Last Answer : composability

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is the operational domain of CSA? a) Scalability b) Portability and interoperability c) Flexibility d) None of the mentioned

Last Answer : Portability and interoperability

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity available ... , the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : In unmanaged storage, the storage service provider makes storage capacity available to users

Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity ... storage, the storage service provider makes storage capacity available to usersd) All of the mentioned

Last Answer : In unmanaged storage, the storage service provider makes storage capacity available to users

Description : What is the reason for using virtual machine templates? A. Efficiency. B. Scalability. C. Storage. D. Dynamic Allocation.

Last Answer : Efficiency.

Description : _______ enables batch processing, which greatly speeds up high-processing applications. A. Scalability B. Reliability C. Elasticity D. Utility

Last Answer : Scalability

Description : . _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : Which statement is true about NameNode High Availability a) Solve Single point of failure b) For high scalability c) Reduce storage overhead to 50% d) None of the above

Last Answer : Solve Single point of failure

Description : What are the advantages of HDFS federation in Hadoop? a) Isolation b) Namespace scalability c) Improves throughput d) All of the above

Last Answer : All of the above

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentione

Last Answer : all of the mentione

Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability

Last Answer : Privacy

Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability

Last Answer : Work Without Internet

Description : _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned

Last Answer : Vendor lock-in

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the capability of running multiple machine instances,

Last Answer : ) All of the mentioned

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : ______ sizing is possible when the system load is cyclical or in some cases when there are predictable bursts or spikes in the load. a) Left b) Right c) Top d) All of the mentioned

Last Answer : Right

Description : . ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE

Last Answer : 200 TB

Description : ___________ was built primarily as the fundamental storage service for Google’s search engine. a) BFS b) HDFS c) GFS d) GAE

Last Answer : GFS

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Which of the following dynamically grow and shrink the load-balancing capacity to adjust to traffic demands? A. Amazon Cloud-front B. Elastic Caches C. Amazon RDS D. Elastic Load Balancing

Last Answer : Elastic Load Balancing

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned

Last Answer : ADC

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following software can be used to implement load balancing? a) Apache mod_balancer b) Apache mod_proxy_balancer c) F6’s BigIP d) All of the mentioned

Last Answer : Apache mod_proxy_balancer

Description : A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned

Last Answer : ADC

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers