Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application
Last Answer : 4 Server application
Description : A(n) ______ is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices. a) application suite b) compiler c) input/output system d) operating system e) None of these
Last Answer : d) operating system
Description : It is the set of programs that enables your computers hardware device and application software to work together. A. Operating system B. Helper software C. System software D. Application software
Last Answer : C. System software
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003
Last Answer : 4) Windows 2003
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003
Last Answer : 4 Windows 2003
Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server
Last Answer : 4) Proxy server
Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server
Last Answer : 4 Proxy server
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : C) cookie
Description : Which of the following is not done during the client selection and retention phase of planning? a. Obtain and review financial information b. Consider the need for special skills c. Ensure ... resources to complete the engagement in a timely manner. d. Obtain an understanding of internal controls
Last Answer : Obtain an understanding of internal controls
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Last Answer : All of the mentioned
Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS
Last Answer : Server virtualization
Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. False, 3. true
Description : Which software model is best suitable for client server application? -Technology
Last Answer : Concurrent Process model is best suitable for client server application.
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer
Last Answer : c. Session layer
Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.
Last Answer : Single instance of software running on a server and serves multiple clients.
Description : Who provide GUI (Graphical User Interface) to interact with the cloud? A. Client B. Application C. Client Infrastructure D. Server
Last Answer : Client Infrastructure
Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned
Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service
Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False
Last Answer : B) i-True, ii-True
Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping
Last Answer : (B) Web browser
Description : Which of the following is considered a primary reason for creating an internal audit department? a. To safeguard resources entrusted to the organization. b. To evaluate and improve the ... 's decision making. d. To relieve management of the responsibility for establishing effective controls
Last Answer : To evaluate and improve the effectiveness of control processes.
Description : A set of microinstructions for a single machine instruction is called ___________ a) Program b) Command c) Micro program d) Micro command
Last Answer : Answer: c Explanation: For every micro-operation, a set of microinstructions are written which indicate the control signals to be activated. A set of microinstructions is a micro program. The address of the next microinstruction is given by a Microprogram counter
Description : Computer programs are written in a high level programming language, however, the human readable version of a program is called a) cache b) instruction set c) source code d) word size
Last Answer : c) source code
Description : Which statement is true about a bare metal hypervisor? A. It can only be hosted on an existing operating system. B. It requires a separate license for the native operating system. C ... system. D. It runs directly on server hardware to provide virtual machines with timesharing resources.
Last Answer : It runs directly on server hardware to provide virtual machines with timesharing resources.
Description : The _____ tells the computer how to use its components. 1) Utility 7 2) Network 3) Operating system 4) Application program 5) None of these
Last Answer : Answer :3
Description : A(n) _______ is a program that makes the computer easier to use a) utility b) application c) operating system d) network e) None of these
Last Answer : c) operating system
Description : The.... tells the computer how to use its components. 1) Utility 2) Network 3) Operating System 4) Application Program
Last Answer : 3) Operating System
Description : “Booting the System” means (1) loading the operating system (2) dismissing the computer (3) running an application program called “Booting”. (4) physically kicking the computer
Last Answer : loading the operating system
Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : D) transkie
Description : In the preparation of an audit program, which of the following items is not essential? a. Assessment of inherent risk b. The preparation of a budget identifying the costs of resources needed c. A review of material from prior audits d. An understanding of controls established by management
Last Answer : The preparation of a budget identifying the costs of resources needed
Description : The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these
Description : The most important or powerful device in computer in a typical network is: a) desktop b) network client c) network server d) network station e) None of The Above
Last Answer : c) network server
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : _____ is the most important/powerful computer in a typical network a) Desktop b) Network client c) Network server d) Network station e) None of these
Last Answer : c) Network server
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : XMPP uses ________ architecture. A. Decentralized client-server B. Centralized client-server C. Message D. Public/subscriber
Last Answer : A. Decentralized client-server
Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above
Last Answer : B. Based on publish-subscribe architecture
Description : Which of the following controls the manner of interaction between the user and the operating system: a) User interface b) Language translator c) Platform d) Screen saver e) None of these
Last Answer : a) User interface
Description : What is the name of the latest Server Operating System developed by Microsoft? 1) Windows NT 2) Windows 2008 3) Windows XP 4) Windows 2003
Last Answer : 2) Windows 2008
Description : What is the name of the latest Server Operating System developed by Microsoft? 1 Windows NT 2 Windows 2008 3 Windows XP 4 Windows 2003
Last Answer : 2 Windows 2008
Description : Application Specific Instruction Set Processor (ASIP)
Last Answer : An application specific instruction set processor (ASIP) can serve as a compromise between the general purpose processor and single-purpose processors. An ASIP is a Programmable processor ... fetch sequential data memory locations in parallel with other operations to further speed execution.
Description : In program control the instruction is set for the statement in a: a. Parallel b. Sequence c. Both d. None
Last Answer : b. Sequence
Description : A set of instruction compiled into a program that perform a particular task is known as: A. Hardware. B.CPU C. Motherboard D. Software
Last Answer : D. Software
Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned
Last Answer : None of the mentioned