What is Relaxed Layered Style?
a) Each layer can be constrained to use only
the layer directly below it
b) Sometimes this constraint is relaxed
slightly to allow each layer to use all the
layers below it
c) All of the mentioned
d) None of the mentioned

1 Answer

Answer :

Sometimes this constraint is relaxed
slightly to allow each layer to use all the
layers below it

Related questions

Description : Which of the following is correct? a) Layers are not strongly coupled to the layers above them b) Each layer is strongly coupled only to the layer immediately below it c) Overall Layered-style architectures are loosely coupled d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following IM client allow their users to connect to the different major IM services? a) Pidgin b) Miranda IM c) Trillian d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : full virtualization

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of service c) ... come replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : .Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : The network that involves backward links from output to the input and hidden layers is called _________ a) Self organizing maps b) Perceptrons c) Recurrent neural network d) Multi layered perceptron

Last Answer : c) Recurrent neural network

Description : The network that involves backward links from output to the input and hidden layers is called as ____. a) Self organizing maps b) Perceptrons c) Recurrent neural network d) Multi layered perceptron

Last Answer : c) Recurrent neural network

Description : Fill in the blank. Work breakdown structure (WBS) is a ______________ of the work  with increasing detail in each layer. Select one: a. layered description b. step change c. ballpark estimate d. project execution plan e. project logic diagram

Last Answer : a. layered description

Description : Which of the following content is allowed as per virtual appliance block diagram shown below? a) Table b) Image c) Documents d) All of the mentioned

Last Answer : All of the mentioned

Description : A basic philosophy of security is to have layers of defense, a concept known as __________ a) security defense b) layers defence c) defense in securityd) defense in depth

Last Answer : defense in depth

Description : Which kind of agent architecture should an agent an use? a) Relaxed b) Logic c) Relational d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Read the following (A-D) statements. A. It is made of more than one layer (multi-layered) of cells. B. It has a limited role in secretion and absorpti

Last Answer : Read the following (A-D) statements. A. It is made of more than one layer (multi-layered) of cells. B. ... cavity. A. Four B. Three C. Two D. One

Description : Which statement is true about a bare metal hypervisor? A. It can only be hosted on an existing operating system. B. It requires a separate license for the native operating system. C ... system. D. It runs directly on server hardware to provide virtual machines with timesharing resources.

Last Answer : It runs directly on server hardware to provide virtual machines with timesharing resources.

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is specified parameter of SLA? a) Response times b) Responsibilities of each party c) Warranties d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : The Hadoop MapReduce framework spawns one map task for each __________ generated by the InputFormat for the job. a) OutputSplit b) InputSplit c) InputSplitStream d) All of the mentioned

Last Answer : ) InputSplit

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : A hypervisor is sometimes also called a? A. VMA B. VMS C. VMM D. VMR

Last Answer : VMM

Description : Sapwood consists of (A) Innermost annular rings around the pith (B) Portion of timber between heartwood and cambium layer (C) Thin layers below the bark (D) Thin fibre which extends from the pith outwards and holds the annular rings together

Last Answer : Answer: Option B

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : ___________is an open protocol, initiated by Blaine Cook and Chris Messina, to allow secure API authorization in a simple, standardized method for various types of web applications. a) OAuth b) OpenID c) SAMIL d) LID

Last Answer : OAuth

Description : Which component of web 2.0 allow reloading a part of webpage without reloading the whole page a)Folksonomy b) Ajax c)Mash up d) RSS generated Syndication

Last Answer : Ajax

Description : _______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand. a) Leading b) Pooling c) Virtualization d) All of the mentioned

Last Answer : Pooling

Description : Hypervisor runs directly on underlying host system.It is also known as? A. Bare metal hypervisor B. Native Hypervisor C. Hosted Hypervisor D. Both A and B

Last Answer : Both A and B

Description : Which will solve the conjuncts of the rule so that the total cost is minimized? a) Constraint variable b) Conjunct ordering c) Data complexity d) All of the mentioned

Last Answer : b) Conjunct ordering