________ data represents more than 50
percent of the data created every day.
a) Shadow
b) Light
c) Dark
CSE-R17.BLOGSPOT.COM
d) All of the mentioned

1 Answer

Answer :

Shadow

Related questions

Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark d) All of the mentioned

Last Answer : Shadow

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : The number of reduces for the job is set by the user via _________ CSE-R17.BLOGSPOT.COM a) JobConf.setNumTasks(int)b) JobConf.setNumReduceTasks(int) c) JobConf.setNumMapTasks(int) d) All of the mentioned

Last Answer : JobConf.setNumReduceTasks(int)

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Which of the following file transfer utility creates a shared folder metaphor using a Web CSE-R17.BLOGSPOT.COM service?a) Dropbox b) Skype c) Drive d) All of the mentioned

Last Answer : Dropbox

Description : Every call to publish() will return a class that conforms to the __________ interface. a) Batch b) Client c) Server CSE-R17.BLOGSPOT.COM d) Future

Last Answer : Future

Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer

Last Answer : map

Description : The __________ property states that the system must have a mechanism to recover from committed transactions should that be necessary. a) Atomicity CSE-R17.BLOGSPOT.COM b) Consistencyc) Isolation d) Durability

Last Answer : Durability

Description : Tomcat doesn’t support JAX-WS by itself. a) True CSE-R17.BLOGSPOT.COM b) False

Last Answer : True

Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.

Last Answer : False

Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com

Last Answer : Microsoft

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : ________ Mobile Lite illustrates an important trend in software to extend its products as cloud services for mobile access. A. Google.com B. aol.com C. Salesforce.com D. Oracle.com

Last Answer : Salesforce.com

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : b) c) CSE-R17.BLO

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : a)

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : ________ is a server environment that does not physically exist but is created on another server. A. Physical machine. B. Logical machine. C. Guest machine. D. Virtual machine

Last Answer : Guest machine.

Description : When you publish a message ________ is automatically created? a) Client b) Server c) Batch d) Server

Last Answer : Batch

Description : Which of the following SaaS platform is with an exposed API? a) salesforce.com b) amazon.com c) flipkart.com d) all of the mentioned

Last Answer : salesforce.com

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : Which of the following factors led to the demise of many of the early SSPs and to many hosted file services? a) The Dot.com bust in 2000 b) The inability of file-hosting companies to successfully monetize online storage c) The continued commoditization of large disk drives d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following SaaS platform is with an exposed API? a) Salesforce.com b) amazon.com c) flipkart.com d) all of the mentioned

Last Answer : Salesforce.com

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modularc) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : .Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modular c) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : Point out the wrong statement. a) Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM b) All CPUs support virtual machines c) On a Type 2 VM, ... is created that emulates the devices with which a system would normally interact d) All of the mentioned

Last Answer : All CPUs support virtual machines

Description : The peak of the sum is never ________ than the sum of the peaks. a) smaller b) greater c) equal to d) none of the mentioned

Last Answer : greater

Description : Point out the wrong statement. a) Internet consumes roughly 1 percent of the world's total power b) The cost advantages of cloud computing have enabled new software vendors to create ... resources without the need for interaction with cloud service provider personnel d) None of the mentioned

Last Answer : Internet consumes roughly 1 percent of the world’s total power

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses