Which of the following is correct?
a) Layers are not strongly coupled to the
layers above them
b) Each layer is strongly coupled only to the
layer immediately below it
c) Overall Layered-style architectures are
loosely coupled
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : What is Relaxed Layered Style? a) Each layer can be constrained to use only the layer directly below it b) Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it c) All of the mentioned d) None of the mentioned

Last Answer : Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Most of the cloud architectures are built on this type of architecture. a) skeleton b) grid c) linear d) template

Last Answer : grid

Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned

Last Answer : Data centers have been sited to optimize the overall system latency

Description : A coil is said to be loosely coupled with which of the following conditions? a) K>1 b) K0.5 d) K

Last Answer : d) K

Description : What problem is caused in an rf amplifier by a loosely coupled transformer?

Last Answer : A too-narrow bandpass.

Description : Why is the tunnel diode loosely coupled to the cavity in a tunnel-diode oscillator?

Last Answer : To increase the stability.

Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively. 

Description : Distributed operating systems consist of: (1) Loosely coupled O.S. software on a loosely coupled hardware (2) Loosely coupled O.S. software on a tightly coupled hardware (3) Tightly coupled O.S. software on a loosely coupled hardware (4) Tightly coupled O.S. software on a tightly coupled hardware

Last Answer : Answer: 3

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : Free electrons are: (a) Fixed (b) Loosely bounded (c) Strongly fixed (d) Tightly bound

Last Answer : (b) Loosely bounded

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of service c) ... come replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : .Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : The network that involves backward links from output to the input and hidden layers is called _________ a) Self organizing maps b) Perceptrons c) Recurrent neural network d) Multi layered perceptron

Last Answer : c) Recurrent neural network

Description : The network that involves backward links from output to the input and hidden layers is called as ____. a) Self organizing maps b) Perceptrons c) Recurrent neural network d) Multi layered perceptron

Last Answer : c) Recurrent neural network

Description : Fill in the blank. Work breakdown structure (WBS) is a ______________ of the work  with increasing detail in each layer. Select one: a. layered description b. step change c. ballpark estimate d. project execution plan e. project logic diagram

Last Answer : a. layered description

Description : Which of the following content is allowed as per virtual appliance block diagram shown below? a) Table b) Image c) Documents d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : A basic philosophy of security is to have layers of defense, a concept known as __________ a) security defense b) layers defence c) defense in securityd) defense in depth

Last Answer : defense in depth

Description : Read the following (A-D) statements. A. It is made of more than one layer (multi-layered) of cells. B. It has a limited role in secretion and absorpti

Last Answer : Read the following (A-D) statements. A. It is made of more than one layer (multi-layered) of cells. B. ... cavity. A. Four B. Three C. Two D. One

Description : Which of the following is specified parameter of SLA? a) Response times b) Responsibilities of each party c) Warranties d) All of the mentioned

Last Answer : All of the mentioned

Description : The Hadoop MapReduce framework spawns one map task for each __________ generated by the InputFormat for the job. a) OutputSplit b) InputSplit c) InputSplitStream d) All of the mentioned

Last Answer : ) InputSplit

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned