SAN refers to:
a)Storage Area Network
b) Sample Annual Numbers
c) Search Access Network
d) None of These

1 Answer

Answer :

a)Storage Area Network

Related questions

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Random-access storage media refers to what types of storage

Last Answer : Magnetic core, semiconductor, thin film, and bubble.

Description : SAN stands for: a) Specific Area Network b) System Area Network c) Standard Area Network d) None of These

Last Answer : b) System Area Network

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : NAP stands for: a) Network Access Point b) Naptive Area Protocol c) Node for Assessing Patteern d) None of These

Last Answer : b) Network Access Point

Description : PAN stands for: a) Permanent Area Network b) Personal Access Network c) Personal Area Network d) None of These

Last Answer : c) Personal Area Network

Description : MAN stands for: a) Metropolitan Arranged Network b) Metropolitan Area Network c) Metropolitan Access Network d) Modem and Nexus e) None of These

Last Answer : b) Metropolitan Area Network

Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These

Last Answer : c) Wide Area Network

Description : LAN stands for (1) Land Area Network (2) Local Area Network (3) Local Access Network (4) Local Area Netware

Last Answer : Local Area Network

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : SPIDER refers to: a) Search Engine b) An application for viewing web sites c) A program that catalogs web sites d) None of These

Last Answer : c) A program that catalogs web sites

Description : The term ________ refers to data storage systems that make it possible for a computer or electronic device to store and retrieve data. A. input technology B. output technology C. storage technology D. None of the Above

Last Answer : C. storage technology

Description : USB refers to a ______ A. storage device B. processor C. port type D. None of the Above

Last Answer : C. port type

Description : One of a class of storage device devices that can access storage locations in any order is A) DTE B) DASD C) DDE D) DDE

Last Answer : Answer : B

Description : Offline device is A) A device which is not connected to CPU B) A device which is connected to CPU C) A direct access storage device D) An I/O device

Last Answer : Answer : A

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory

Last Answer : Answer : D

Description : A storage device or medium where the access time is dependent upon the location of the data is called ________ A. Parallel access B. Serial access C. Both (A) and (B) D. None of the above

Last Answer : B. Serial access

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory

Last Answer : D. Magnetic bubble memory

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : _________ is the time from the start of one storage device access to the time when the next access can be started. A. Mode B. Access time C. capacity D. None of the Above

Last Answer : B. Access time

Description : The average time required to reach a storage location in memory and obtain its contents is called_____. A. Latency time. B. Access time. C. Turnaround time. D. Response time.

Last Answer : B. Access time.

Description : Which is not true for primary storage: a) Information must be transferred to primary storage b) It is relatively more expensive c) It allows very fast access to data d) It is part of processor e) None of The Above

Last Answer : d) It is part of processor

Description : Hard Disks and Diskettes are: a) Direct Access Storage Devices b) Sequential Access Storage Devices c) Rarely used Microcomputers d) None of The Above

Last Answer : a) Direct Access Storage Devices

Description : Offline device is: a) A device which is not connected to CPU b) A device which is connected to CPU c) A direct access storage device d) None of The Above

Last Answer : a) A device which is not connected to CPU

Description : This refers to an area in the memory used for temporary storage of information on the basis of “Last in First out”. A. Core B. Register C. Flag D. Stack

Last Answer : D. Stack

Description : (2) amount of oxygen used for biochemical oxidation Explanation: Biochemical oxygen demand or B.O.D. is the amount of dissolved oxygen needed by aerobic biological organisms in a body of water to ... quantitative test, although it is widely used as an indication of the organic quality of water.

Last Answer : The addition of gypsum to port-land cement helps in : (1) increasing the strength of cement (2) rapid setting of cement (3) preventing rapid setting of cement (4) reduction in the cost of cement

Description : When examining a completed bend test, the angle of the bend was found to be 185°. The testing specification calls for the sample to have been formed through 180°? a) They should be acceptable as ... then re-examined d) They should be rejected as the angle is not close enough to be acceptable

Last Answer : c) New bends should be produced and bent to 180° then re-examined

Description : Which one is refers to how well the particular sample of behaviors used to measure a characteristic reflects the entire domain of behaviors that constitutes that characteristic. a. Construct validity ... b. Criterion-related validity evidence c. Content validity evidence d. Face validity evidence

Last Answer : c. Content validity evidence

Description : Serial access memories are useful in applications where A) Data consists of numbers B) Short access time is required C) Each stored word is processed differently D) Data naturally needs to flow in and out in serial form

Last Answer : Answer : D

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : As Bob and Sarah Wallace meet with the account representative at Midland Bank, they are shown a sample of what their monthly statement will look like. Providing such sample documents allows Midland ... to which one of the following qualities? A) experience B)credence C)search D)perishability

Last Answer : C)search

Description : Which algorithm is used in layered Feed forward Neural Network? (A) Back propagation algorithm (B) Binary Search (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Back propagation algorithm

Description : Which of the following can be used for storage of fresh sample of an oil for a long time? (a) CO 2 and O 2 (b) N 2 and Cl 2 (c) CO 2 and He (d) He and N 2

Last Answer : (d) He and N 2

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : NAT stands for: a) Network Address Translator b) Network Access Translator c) Network Acquired Translator d) None of These

Last Answer : a) Network Address Translator

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : NAT stands for: a) Network Address Translation (Translation or translator same meaning) b) Network Address Transformation c) Network Access Translation d) None of These

Last Answer : a) Network Address Translation (Translation or translator same meaning)

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which layer has access to particular network services, billing functions etc: a) Session Layer b) Presentation Layer c) Transport Layer d) None of These

Last Answer : a) Session Layer

Description : Which among the following is used to access the network: a) Application Layer b) Presentation Layer c) Session Layer d) None of These

Last Answer : a) Application Layer