___________ is a function of the particular enterprise and application in an on-premises
deployment.
 a) Vendor lock
 b) Vendor lock-in
 c) Vendor lock-ins
 d) None of the mentioned

1 Answer

Answer :

Vendor lock-in

Related questions

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : _________ model consists of the particular types of services that you can access on a cloud computing platform. A. Service B. Planning C. Deployment D. Application

Last Answer : A. Service

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. a) Service b) Application c) Deployment d) All of the mentioned

Last Answer : Service

Description : An application that needed _______ storage alone might not benefit from a cloud deployment at all. a) online b) offline c) virtual d) all of the mentioned

Last Answer : offline

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of service c) ... come replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : An application that needed _______ storage alone might not benefit from a cloud deployment at all. a) online b) offlinec) virtual d) all of the mentioned

Last Answer : offline

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Which of the following is associated with considerable vendor lock-in? a) PaaS b) IaaS c) CaaS d) SaaS

Last Answer : PaaS

Description : Which of the following is associated with considerable vendor lock-in? A. PaaS B. SaaS C. IaaS D. DaaS

Last Answer : PaaS

Description : Which is not a disadvantage of Cloud Computing? a) Downtime b) Limited control of infrastructurec) Onetime costs d) Vendor Lock-in

Last Answer : Onetime costs

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a cloud deployment on Windows Azure in an attractive report format. a) AWS b) EC2 c) Azure d) All of the mentioned

Last Answer : Azure

Description : _______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand. a) Leading b) Pooling c) Virtualization d) All of the mentioned

Last Answer : Pooling

Description : Point out the wrong statement. a) All applications benefit from deployment in the cloud b) With cloud computing, you can start very small and become big very fast c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary d) None of the mentioned View

Last Answer : All applications benefit from deployment in the cloud

Description : Which of the following is the fundamental unit of virtualized client in an IaaS deployment? a) Workunit b) Workspace c) Workload d) All of The Mentioned

Last Answer : Workload

Description : Which of the following is the deployment model? a) public b) private c) hybrid d) all of the mentioned

Last Answer : all of the mentioned

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on-premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on- premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet ... The software and the service are monitored and maintained by the vendor d) All of the mentioned

Last Answer : All of the mentioned

Description : _________ serves as a PaaS vendor within Google App Engine system. a) Google b) Amazon c) Microsoft d) All of the mentioned

Last Answer : Google

Description : The _____ is something that you can obtain under contract from your vendor. a) PoS b) QoS c) SoS d) All of the mentioned

Last Answer : QoS

Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Hybrid

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet globally ... The software and the service are monitored and maintained by the vendor d) All of the mentioned

Last Answer : All of the mentioned

Description : The _____ is something that you can obtain under contract from your vendor. a) PoS b) QoS c) SoS d) All of the mentioned

Last Answer : QoS

Description : _________ serves as a PaaS vendor within Google App Engine system. a) Google b) Amazon c) Microsoft d) All of the mentioned

Last Answer : Google

Description : The _____ is something that you can obtain under contract from your vendor. a) PoS b) QoS c) SoS d) All of the mentioned

Last Answer : QoS

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned

Last Answer : Open Mashup Alliance

Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above

Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.

Description : Point out the correct statement. a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located b) Service model defines the purpose of the cloud and the nature ... the cloud is located c) Cloud Square Model is meant to show is that the traditional notion of þÿ

Last Answer : A deployment model defines the purpose of the cloud and the nature of how the cloud is located

Description : Challenges of multi-cloud deployment are ………… A. Complexity, Interoperability, Management overhead B. Muti-tenancy, Load Balancing C. High Availabilty, Elastisity D. Easy Management

Last Answer : Complexity, Interoperability, Management overhead

Description : Which of the following statement is true about virtualization technology? A. Allows manual provisioning of environments. B. Administrationsoftware constantly monitors the software. C. Save energy by powering off the servers. D. Allows automatic deployment of applications.

Last Answer : Allows automatic deployment of applications.

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture

Last Answer : Multitenant

Description : . In which phase, IT Architecture Development comes? A. Strategy Phase B. Planning Phase C. Deployment Phase D. Development Phase

Last Answer : B. Planning Phase

Description : Which of the following is a step of Deployment Phase? A. Transformation Plan Development B. IT Architecture Development C. Business Architecture Development D. Selecting Cloud Computing Provider

Last Answer : D. Selecting Cloud Computing Provider

Description : . _______ provides the runtime environment for applications, development and deployment tools, etc. A. IaaS B. PaaS C. SaaS D. XaaS

Last Answer : B. PaaS

Description : 5. How many types of Cloud are there in Deployment Models? A. 2 B. 3 C. 4 D. 5

Last Answer : 4

Description : Which of the following is the working modelsfor cloud computing? A. Deployment Models B. Configuring Model C. Collaborative Model D. All of the above

Last Answer : Deployment Models

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned

Last Answer : scalability