Which of the following is correct?
a) Module A uses Module B if a correct
version of B must be present for A to execute
correctly
b) Module A calls (or invokes ) module B if
B triggers execution of A
c) All of the mentioned
d) None of the mentioned

1 Answer

Answer :

Module A uses Module B if a correct
version of B must be present for A to execute
correctly

Related questions

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Which of the following version of office suite is shown in the figure? a) Offline b) Online c) Online and Offline d) None of the mentioned

Last Answer : Online

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : How can you execute the user defined triggers in forms 3.0 ?

Last Answer : Execute Trigger (trigger-name)

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... uses a cloud service, the developercannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c)d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following figure correctly describes products by CA technologies? a) b) c)d) None of the mentioned

Last Answer : b)

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : b) c) CSE-R17.BLO

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : a)

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c) d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : External Link to PHP module execute twice?

Last Answer : answer:I'm not sure I understand the question correctly, but if I do: it sounds like whatever program you're embedding your link in ( email or word document ) is loading the URL more than once. It' ... has been moved, and only raises an error if the appropriate row can't be found in either table.

Description : Which of the following module is not related to horizontal decomposition? A : Perception B : Planning C : Execute D : Building Map

Last Answer : D : Building Map

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : . A service provider reselling a _______ may have the option to offer one module to customize the information. a) CaaS b) AaaS c) PaaS d) SaaS

Last Answer : SaaS

Description : A service provider reselling a _______ may have the option to offer one module to customize the information. a) CaaS b) AaaS c) PaaS d) SaaS

Last Answer : SaaS

Description : Which of the following module of SOA is shown in the following figure? a) Description b) Messaging c) Business Process d) QOS

Last Answer : QOS

Description : A service provider reselling a _______ may have the option to offer one module to customize the information. a) CaaS b) AaaS c) PaaS d) SaaS

Last Answer : SaaS

Description : Which of the following module of SOA is shown in the following figure? a) Description b) Messaging c) Business Process d) QOS

Last Answer : QOS

Description : Give the sequence of execution of the various report triggers?

Last Answer : Before form , After form , Before report, Between page, After report.

Description : A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts. a) reliable b) scalable c) composable d) none of the mentioned

Last Answer : composable

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Fill in the blank. During the _________ of a project, the project manager focuses on  developing the project infrastructure needed to execute the project and developing  clarity around the project charter and scope. ... one: a. completion b. start-up c. execution d. evaluation e. selection

Last Answer : b. start-up

Description : Fill in the blank. During the _________ of a project, the project manager  focuses on developing the project infrastructure needed to execute the  project and developing clarity around the project charter and scope. ... one: a. completion b. start-up c. execution d. evaluation e. selection

Last Answer : b. start-up

Description : Which is the main function of the computer. a. Execute of programs b. Execution of programs c. Both d. None of these

Last Answer : b. Execution of programs

Description : Assembler works to convert assembly language program into machine language : a. Before the computer can execute it b. After the computer can execute it c. In between execution d. All of these

Last Answer : a. Before the computer can execute it

Description : Which of the following 2 task are performed to execute an instruction by MCU: a. Microinstruction execution b. Microinstruction sequencing c. Botha&b d. None of these

Last Answer : c. Botha&b

Description : Assembler is: a) a program that places programs into memory and prepares them for execution b) a program that automate the translation of assembly language into machine language c) is a program that appears to execute a source program as if it were machine language d) None of The Above

Last Answer : b) a program that automate the translation of assembly language into machine language

Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above

Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register

Description : The process of the JobTracker creates one map task for each computed input split by the user node and assigns the map tasks to the execution slots of the TaskTrackers is called as a) Task Execution b) Task Running Check c) Job Submission d) Task Assignment

Last Answer : Task Assignment

Description : Point out the wrong statement. a) TCO must account for the real costs of items, but frequently they do not b) A system consumes resources such as space in a datacenter or portion of ... management c) Microsoft maintains an economics page for its Windows Azure Platform d) None of the mentioned

Last Answer : None of the mentioned

Description : Network bottlenecks occur when ______ data sets must be transferred. a) large b) small c) big d) all of the mentioned

Last Answer : large

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modularc) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : .Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modular c) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : Simple Storage Service use for? A. It allows the users to store and retrieve various types of data using API calls. B. It does contain computing element. C. Both A and B D. None of the above

Last Answer : It allows the users to store and retrieve various types of data using API calls.

Description : ________ is a framework for performing remote procedure calls and data serialization. a) Drill b) BigTop c) Avro d) Chukwa

Last Answer : Avro