Which of the following is incorrect?
a) Layered architectures are highly
changeable, so this pattern can be used when
changeability is an important quality attribute
CSE-R17.BLOGSPOT.COM
b) Layered-style programs are easy to modifybecause changes can be made to a layer
independently of the rest of the program
c) All of the mentioned
d) None of the mentioned

1 Answer

Answer :

None of the mentioned

Related questions

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The number of reduces for the job is set by the user via _________ CSE-R17.BLOGSPOT.COM a) JobConf.setNumTasks(int)b) JobConf.setNumReduceTasks(int) c) JobConf.setNumMapTasks(int) d) All of the mentioned

Last Answer : JobConf.setNumReduceTasks(int)

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : Shadow

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following file transfer utility creates a shared folder metaphor using a Web CSE-R17.BLOGSPOT.COM service?a) Dropbox b) Skype c) Drive d) All of the mentioned

Last Answer : Dropbox

Description : Which of the following is correct? a) Layers are not strongly coupled to the layers above them b) Each layer is strongly coupled only to the layer immediately below it c) Overall Layered-style architectures are loosely coupled d) All of the mentioned

Last Answer : All of the mentioned

Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer

Last Answer : map

Description : The __________ property states that the system must have a mechanism to recover from committed transactions should that be necessary. a) Atomicity CSE-R17.BLOGSPOT.COM b) Consistencyc) Isolation d) Durability

Last Answer : Durability

Description : Every call to publish() will return a class that conforms to the __________ interface. a) Batch b) Client c) Server CSE-R17.BLOGSPOT.COM d) Future

Last Answer : Future

Description : Tomcat doesn’t support JAX-WS by itself. a) True CSE-R17.BLOGSPOT.COM b) False

Last Answer : True

Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.

Last Answer : False

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : What is Relaxed Layered Style? a) Each layer can be constrained to use only the layer directly below it b) Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it c) All of the mentioned d) None of the mentioned

Last Answer : Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Most of the cloud architectures are built on this type of architecture. a) skeleton b) grid c) linear d) template

Last Answer : grid

Description : Point out the wrong statement. a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access to reusable Web services ... widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned

Last Answer : digital identity

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following should be replaced with the question mark in the following figure? a) Abstraction b) Virtualization c) Mobility Pattern d) All of the mentioned

Last Answer : Virtualization

Description : Which of the following should be replaced with the question mark in the following figure? a) Abstraction b) Virtualization c) Mobility Pattern d) All of the mentioned

Last Answer : Virtualization

Description : Which of the following should be replaced with the question mark in the following figure? a) Abstraction b) Virtualization c) Mobility Pattern d) All of the mentioned

Last Answer : Virtualization

Description : . The performance of the data store can be enhanced by in-memory caching usingthe____________, which can also be used independently of the data store. a) Blobstore b) Data store c) URL fetch d) memcache

Last Answer : memcache

Description : The performance of the data store can be enhanced by in-memory caching usingthe____________, which can also be used independently of the data store. a) Blobstore b) Data store c) URL fetch d) memcache

Last Answer : memcache

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Notation for defining REST endpoints. a) { } b) * c) All of the mentioned d) None of the mentioned

Last Answer : All of the mentioned

Description : Publishing an application’s data as a REST service requires. a) @RequestMapping b) @PathVariable c) All of the mentioned d) None of the mentioned

Last Answer : All of the mentioned

Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned

Last Answer : all of the mentioned

Description : .Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) Most APIs are exposed as SOAP c) Few APIs are exposed as REST d) None of the mentioned

Last Answer : None of the mentioned

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Which of the following SaaS platform is with an exposed API? a) salesforce.com b) amazon.com c) flipkart.com d) all of the mentioned

Last Answer : salesforce.com

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering