Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Random-access storage media refers to what types of storage
Last Answer : Magnetic core, semiconductor, thin film, and bubble.
Description : SAN stands for: a) Specific Area Network b) System Area Network c) Standard Area Network d) None of These
Last Answer : b) System Area Network
Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network
Last Answer : Answer : B
Description : NAP stands for: a) Network Access Point b) Naptive Area Protocol c) Node for Assessing Patteern d) None of These
Last Answer : b) Network Access Point
Description : PAN stands for: a) Permanent Area Network b) Personal Access Network c) Personal Area Network d) None of These
Last Answer : c) Personal Area Network
Description : MAN stands for: a) Metropolitan Arranged Network b) Metropolitan Area Network c) Metropolitan Access Network d) Modem and Nexus e) None of These
Last Answer : b) Metropolitan Area Network
Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These
Last Answer : c) Wide Area Network
Description : LAN stands for (1) Land Area Network (2) Local Area Network (3) Local Access Network (4) Local Area Netware
Last Answer : Local Area Network
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization
Last Answer : Application virtualization
Description : SPIDER refers to: a) Search Engine b) An application for viewing web sites c) A program that catalogs web sites d) None of These
Last Answer : c) A program that catalogs web sites
Description : The term ________ refers to data storage systems that make it possible for a computer or electronic device to store and retrieve data. A. input technology B. output technology C. storage technology D. None of the Above
Last Answer : C. storage technology
Description : USB refers to a ______ A. storage device B. processor C. port type D. None of the Above
Last Answer : C. port type
Description : One of a class of storage device devices that can access storage locations in any order is A) DTE B) DASD C) DDE D) DDE
Description : Offline device is A) A device which is not connected to CPU B) A device which is connected to CPU C) A direct access storage device D) An I/O device
Last Answer : Answer : A
Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory
Last Answer : Answer : D
Description : A storage device or medium where the access time is dependent upon the location of the data is called ________ A. Parallel access B. Serial access C. Both (A) and (B) D. None of the above
Last Answer : B. Serial access
Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above
Last Answer : A. Random Access Memory
Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory
Last Answer : D. Magnetic bubble memory
Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage
Last Answer : B. Random Access Memory
Description : _________ is the time from the start of one storage device access to the time when the next access can be started. A. Mode B. Access time C. capacity D. None of the Above
Last Answer : B. Access time
Description : The average time required to reach a storage location in memory and obtain its contents is called_____. A. Latency time. B. Access time. C. Turnaround time. D. Response time.
Last Answer : B. Access time.
Description : Which is not true for primary storage: a) Information must be transferred to primary storage b) It is relatively more expensive c) It allows very fast access to data d) It is part of processor e) None of The Above
Last Answer : d) It is part of processor
Description : Hard Disks and Diskettes are: a) Direct Access Storage Devices b) Sequential Access Storage Devices c) Rarely used Microcomputers d) None of The Above
Last Answer : a) Direct Access Storage Devices
Description : Offline device is: a) A device which is not connected to CPU b) A device which is connected to CPU c) A direct access storage device d) None of The Above
Last Answer : a) A device which is not connected to CPU
Description : This refers to an area in the memory used for temporary storage of information on the basis of “Last in First out”. A. Core B. Register C. Flag D. Stack
Last Answer : D. Stack
Description : (2) amount of oxygen used for biochemical oxidation Explanation: Biochemical oxygen demand or B.O.D. is the amount of dissolved oxygen needed by aerobic biological organisms in a body of water to ... quantitative test, although it is widely used as an indication of the organic quality of water.
Last Answer : The addition of gypsum to port-land cement helps in : (1) increasing the strength of cement (2) rapid setting of cement (3) preventing rapid setting of cement (4) reduction in the cost of cement
Description : When examining a completed bend test, the angle of the bend was found to be 185°. The testing specification calls for the sample to have been formed through 180°? a) They should be acceptable as ... then re-examined d) They should be rejected as the angle is not close enough to be acceptable
Last Answer : c) New bends should be produced and bent to 180° then re-examined
Description : Which one is refers to how well the particular sample of behaviors used to measure a characteristic reflects the entire domain of behaviors that constitutes that characteristic. a. Construct validity ... b. Criterion-related validity evidence c. Content validity evidence d. Face validity evidence
Last Answer : c. Content validity evidence
Description : Serial access memories are useful in applications where A) Data consists of numbers B) Short access time is required C) Each stored word is processed differently D) Data naturally needs to flow in and out in serial form
Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none
Last Answer : large numbers of users direct access to the computer for problem solving
Last Answer : 1) large numbers of users direct access to the computer for problem solving
Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none
Last Answer : 1 large numbers of users direct access to the computer for problem solving
Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These
Last Answer : a) A large Network of Networks
Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These
Last Answer : c) Wired or Wireless
Description : As Bob and Sarah Wallace meet with the account representative at Midland Bank, they are shown a sample of what their monthly statement will look like. Providing such sample documents allows Midland ... to which one of the following qualities? A) experience B)credence C)search D)perishability
Last Answer : C)search
Description : Which algorithm is used in layered Feed forward Neural Network? (A) Back propagation algorithm (B) Binary Search (C) Both(A) & (B) (D) None of the Above
Last Answer : (A) Back propagation algorithm
Description : Which of the following can be used for storage of fresh sample of an oil for a long time? (a) CO 2 and O 2 (b) N 2 and Cl 2 (c) CO 2 and He (d) He and N 2
Last Answer : (d) He and N 2
Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these
Last Answer : Answer :4
Description : NAT stands for: a) Network Address Translator b) Network Access Translator c) Network Acquired Translator d) None of These
Last Answer : a) Network Address Translator
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : NAT stands for: a) Network Address Translation (Translation or translator same meaning) b) Network Address Transformation c) Network Access Translation d) None of These
Last Answer : a) Network Address Translation (Translation or translator same meaning)
Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these
Last Answer : c) Both of Above
Description : Which layer has access to particular network services, billing functions etc: a) Session Layer b) Presentation Layer c) Transport Layer d) None of These
Last Answer : a) Session Layer
Description : Which among the following is used to access the network: a) Application Layer b) Presentation Layer c) Session Layer d) None of These
Last Answer : a) Application Layer