The __________ property states that the
system must have a mechanism to recover
from committed transactions should that be
necessary.
a) Atomicity
CSE-R17.BLOGSPOT.COM
b) Consistencyc) Isolation
d) Durability

1 Answer

Answer :

Durability

Related questions

Description : Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained? a) Atomicity b) Consistency c) Isolation d) Durability

Last Answer : Consistency

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Every call to publish() will return a class that conforms to the __________ interface. a) Batch b) Client c) Server CSE-R17.BLOGSPOT.COM d) Future

Last Answer : Future

Description : Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit? a) Atomicity b) Consistency c) Isolation d) Durability

Last Answer : Atomicity

Description : The number of reduces for the job is set by the user via _________ CSE-R17.BLOGSPOT.COM a) JobConf.setNumTasks(int)b) JobConf.setNumReduceTasks(int) c) JobConf.setNumMapTasks(int) d) All of the mentioned

Last Answer : JobConf.setNumReduceTasks(int)

Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer

Last Answer : map

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : Shadow

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Tomcat doesn’t support JAX-WS by itself. a) True CSE-R17.BLOGSPOT.COM b) False

Last Answer : True

Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.

Last Answer : False

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Which of the following file transfer utility creates a shared folder metaphor using a Web CSE-R17.BLOGSPOT.COM service?a) Dropbox b) Skype c) Drive d) All of the mentioned

Last Answer : Dropbox

Description : Which of the following is property of ACID principle? a) Atomicity b) Consistency c) Isolation d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Taken as a unit, Request => Process => Response is not an atomic transaction b) A coherent transaction either succeeds and is enacted, or ... transaction commitment in a multiuser application, durability requires correcting the condition d) None of the mentioned

Last Answer : Taken as a unit, “Request => Process => Response” is not an atomic transaction

Description : The program which provide partitioning, isolation or abstraction is called? A. virtualization hypervisor B. software hypervisor C. hardware hypervisor D. system hypervisor

Last Answer : virtualization hypervisor

Description : How do I recover access to my blogspot blog when it seems I have forgotten how to log in to the account?

Last Answer : Sounds like you missed the date.

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : Utility computing is based on? A. Grid Computing Model B. Pay-per-Use model C. virtual isolation Model D. SOA Model

Last Answer : Pay-per-Use model

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : What are the advantages of HDFS federation in Hadoop? a) Isolation b) Namespace scalability c) Improves throughput d) All of the above

Last Answer : All of the above

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Point out the correct statement. a) PaaS supplies the infrastructure b) IaaS adds application development frameworks, transactions, and control structures c) SaaS is an operating environment with applications, management, and the user interface d) All of the mentioned

Last Answer : SaaS is an operating environment with applications, management, and the user interface

Description : I want a blog as a part of my website and not a link to another website like example.blogspot.com?

Last Answer : Wordpress will work for this. I host a Wordpress blog on a domain. like http://wwww.whatever.com/blog using Wordpress without any problems.

Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com

Last Answer : Microsoft

Description : How does an adult who lives in isolation or near isolation recover and rejoin society?

Last Answer : answer:We don’t… We are happy here. Shhhhhh don’t tell… They like to believe it makes us sad…. Because It makes them feel less envious.

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : Which of the following is a push mechanism for publishing Web site data that is device- specific? A. WAP B. GPRS C. Bluetooth D. GAP

Last Answer : WAP

Description : Which of the following is a key mechanism for protecting data? a) Access control b) Auditing c) Authentication d) All of the mentioned

Last Answer : All of the mentioned

Description : What are three mechanisms for reproductive isolation Which mechanism isolates two populations of similar frogs with different mating calls?

Last Answer : Need answer

Description : Mechanism preventing interbreeding is called – (1) Adaptation (2) Isolation (3) Reproduction (4) Recombination

Last Answer : (2) Isolation Explanation: Because interbreeding can destroy the genetic integrity of a species, causing it to become progressively infertile or extinct, evolutionary changes in anatomy ... reproduction from occurring. Reproductive Isolation is very important in keeping animal species separated.

Description : The 1992 Nobel Prize for medicine was awarded to Edmond H. Fischer and Edwin J. Krebs for their work concerning (a) reversible protein phosphorylation as a biological regulation mechanism (b) ... (c) human genome project (d) drug designing involving inhibition of DNA synthesis of the pathogen.

Last Answer : (a) reversible protein phosphorylation as a biological regulation mechanism

Description : Mechanism preventing interbreeding is called : (1) Adaptation (2) Isolation (3) Reproduction (4) Recombination

Last Answer : Isolation

Description : Salesforce.com is the largest ______ provider of CRM software. a) PaaS b) IaaS c) CaaS d) SaaS

Last Answer : SaaS

Description : Which of the following SaaS platform is with an exposed API? a) salesforce.com b) amazon.com c) flipkart.com d) all of the mentioned

Last Answer : salesforce.com

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : Which of these companies specializes in cloud computing management tools and services?A. RightScale B. Google C. Salesforce.com D. Savis

Last Answer : RightScale