Which of the following is property of
ACID principle?
a) Atomicity
b) Consistency
c) Isolation
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained? a) Atomicity b) Consistency c) Isolation d) Durability

Last Answer : Consistency

Description : Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit? a) Atomicity b) Consistency c) Isolation d) Durability

Last Answer : Atomicity

Description : The __________ property states that the system must have a mechanism to recover from committed transactions should that be necessary. a) Atomicity CSE-R17.BLOGSPOT.COM b) Consistencyc) Isolation d) Durability

Last Answer : Durability

Description : Which of the following was one of the weaker aspects of early cloud computing service offerings? a) Logging b) Integrity checking c) Consistency checking d) None of the mentioned

Last Answer : Logging

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : The program which provide partitioning, isolation or abstraction is called? A. virtualization hypervisor B. software hypervisor C. hardware hypervisor D. system hypervisor

Last Answer : virtualization hypervisor

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : What are the advantages of HDFS federation in Hadoop? a) Isolation b) Namespace scalability c) Improves throughput d) All of the above

Last Answer : All of the above

Description : Which of the following is the property of the composable component? a) stateful b) stateless c) symmetric d) all of the mentioned

Last Answer : stateless

Description : Which of the following is the property of the composable component? a) stateful b) stateless c) symmetric d) all of the mentioned

Last Answer : stateless

Description : Which of the following is the property of the composable component? a) stateful b) stateless c) symmetric d) all of the mentioned

Last Answer : stateless

Description : The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _____________ a) BASE b) ACID c) ATOM d) All of the mentioned

Last Answer : ACID

Description : The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _____________ a) BASE b) ACID c) ATOM d) All of the mentioned

Last Answer : ACID

Description : Recording of capital contributed by the owner as liability ensures the adherence of principle of– (A) Consistency (B) Going concern (C) Separate entity (D) Materiality

Last Answer : Answer: Separate entity

Description : In the case of classesToBeBound, the classes assigned to this property, indicate the class (i.e., object) structure that is to be transformed into XML. a) True b) False

Last Answer : True

Description : What is atomicity? What is the atomicity of phosphorus and nitrogen? -Chemistry 9th

Last Answer : Atomicity is the total number of atoms present in 1 molecule of a substance. The atomicity of nitrogen is 2 as N2 molecule contains 2 atoms. The atomicity of phosphorus is 4 as P4 molecule contains 4 atoms. ... exists as P4 & that of nitrogen is 2 as it is N2. Please like answer hope this helps u

Description : What is the atomicity of the element ?

Last Answer : The number of atoms in a molecule of an element is called the atomicity of that element.

Description : The atomicity of neon gas is

Last Answer : The atomicity of neon gas is A. Two B. One C. Four D. Three

Description : The atomicity of noble gases is

Last Answer : The atomicity of noble gases is A. Two B. One C. Six D. Four

Description : Which of the following non-metal possess highest atomicity.

Last Answer : Which of the following non-metal possess highest atomicity. A. Oxygen B. Sulphur C. Phosphorus D. Nitrogen

Description : What is the number of atoms constituting a molecule known as - (1) Atomic number (2) Isotopes (3) Atomic mass (4) Atomicity

Last Answer : (4) Atomicity Explanation: Atomicity is the total number of atoms present in one molecule of an element.

Description : What do you mean by atomicity and aggregation?

Last Answer : Either all actions are carried out or none are. Users should not have to worry about the effect of incomplete transactions. DBMS ensures this by undoing the actions of incomplete transactions. ... not really exist. Such situations are called phantom deadlocks and they lead to unnecessary aborts.

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned

Last Answer : bankserve

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned

Last Answer : CaaS

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following should come in place of question mark for the following figure? a) Policy Enforcement Point b) Policy Decision Pointc) Policy Insertion Point d) All of the mentioned

Last Answer : Policy Decision Point

Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned

Last Answer : eXtensible Access Control Markup Language

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned

Last Answer : IGF

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection