Description : An enterprise solution withdata storage, a client interface and a security system isa(n) __________ system. A) 2-tier B) 3-tier C) 4-tier D) n-tier
Last Answer : 3-tier
Description : The __________ performs document tracking. A) distributed application B) enterprisesoftware C) Oracle software D) EDM software
Last Answer : EDM software
Description : A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) – (A) supercomputer (B) minicomputer (C) laptop (D) server (E) None of these
Last Answer : serve
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : The expression “Bottom of the Pyramid” refers to: A. Those buildings in Egypt B. The lowest income earners of the global society C. The foundations of innovation D. The lowest tier of management in an organisation
Last Answer : The lowest income earners of the global society
Description : In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board? a. Motherboard b. Breadboard c. Daughter board d. Grandmother board
Last Answer : Motherboard
Description : Mobile Commerce is best described as– (A) The useof Kiosks in marketing (B) Transporting products (C) Buyingand selling goods/services through wirelesshandhelddevices (D) Using notebook PC's in marketing (E) None of the above
Last Answer : Buyingand selling goods/services through wirelesshandhelddevices
Description : Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets
Last Answer : Intranets
Description : Personal computers can be connectedtogether to form a– (A) server (B) supercomputer (C) network (D) enterprise (E) None of these
Last Answer : network
Description : Business enterprise is separate from its owner according to _____ concept. a) Money measurement concept b) Matching concept c) Entity concept d) Dual aspect concept
Last Answer : c) Entity concept
Description : Kind of organization which have integrated worldwide corporate units in different countries is classified as A. alliance enterprise B. global enterprise C. interdependence enterprise D. multinational enterprise
Last Answer : global enterprise
Description : Type of organization which has operating units in some foreign countries is classified as A. alliance enterprise B. global enterprise C. interdependence enterprise D. multinational enterprise
Last Answer : multinational enterprise
Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet
Last Answer : A. DNS
Description : Explain the three services model commonly know as a three-tier application.
Last Answer : Presentation (UI), Business (logic and underlying code) and Data (from storage or other sources).
Description : In the third generation of computers: a. Distributed data processing first became popular b. An operating system was first developed c. High-level prcedu7ral languages were firs used d. On-line, real time systems first became popular
Last Answer : On-line, real time systems first became popular
Description : Terminals are required for a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching
Last Answer : real-time, time sharing & message switching
Description : A devicethat connects toa network without the useof cables is said to be– (A) distributed (B) free (C) centralized (D) open source (E) None of these
Last Answer : free
Description : A DBMS that runs on many different operating systems is said to be__________. A) scalable B) robust C) platform independent D) distributed
Last Answer : platform independent
Description : A distributed network configurationin which all data/information pass througha central computer is A. bus network B. star network C. ring network D. Point-to-point network E. None of the above
Last Answer : star network
Description : FDDI stands for A) Fiber Distributed Data Interface B) Fiber Data Distributed Interface C) Fiber Dual Distributed Interface D) Fiber Distributed Data Interface
Last Answer : A) Fiber Distributed Data Interface
Description : Which of the following routing technique / techniques is / are used in distributed systems ? A. Fixed Routing B. Virtual Routing C. Dynamic Routing a. A Only b. A and B only c. C only d. All A,B,C
Last Answer : a. A Only
Description : Find the best suitable topology for large businesses which must capable to control and coordinate the operation of distributed branch outlets? a. Ring b. Local area c. Hierarchical d. Star
Last Answer : d. Star
Description : With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. A. distributed clock B. synchronized clock C. centralized clock D. Digital clock
Last Answer : C. centralized clock
Description : Briefly explain FDDI(Fiber Distributed Data Interface)
Last Answer : Dual ring—two independent rings that transmit data in opposite directions. The second ring is not used during normal operation, comes into play only if the primary ring fails. single attachment stations (SAS) dual attachment stations (DAS)
Description : In areas where light rains are uniformly distributed throughout the year, the type of sewerage system to be adopted is A. Separate system B. Combined system C. Partially combined system D. None of these
Last Answer : ANS: B
Description : Configuration Management can be administered in several ways. These include a) A single configuration management team for the whole organization b) A separate configuration management team for ... c) Configuration Management distributed among the project members d) All of the mentioned
Last Answer : a) A single configuration management team for the whole organization
Description : Delimiting and synchronization of data exchange is provided by __________ a. Application layer b. Session layer c. Transport layer d. Link layer
Last Answer : b. Session layer
Description : ARQ stands for __________ a. Automatic Repeat Request b. Automatic Request Repeat c. Application Repeat Request d. Application Request Repeat
Last Answer : a. Automatic Repeat Request
Description : Delimiting and synchronization of data exchange is provided by __________ a) Application layer b) Session layer c) Transport layer d) Link layer
Last Answer : b) Session layer
Description : TASM use the Enterprise Monitoring and Management of accounts application to create and manage TA accounts?
Last Answer : A chart of accounts provides a listing of all financial accounts used by particular business, organization, or government agency. The system of recording, verifying, and reporting such information is called accounting
Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these
Last Answer : b) Extensible Business Reporting Language
Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned
Last Answer : Vendor lock-in
Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above
Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.
Description : What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? a. 4 b. 2 c. 6 d. 3 3. none of the above
Last Answer : 3
Description : ________ is a collection of many separate networks. A) A WAN B) An internet C) a LAN D) None of the above
Last Answer : An internet
Description : What is the purpose of using a Bridge in computer network? A. to connect LANs B. to separate LANs C. to control Network Speed D. All of the above
Last Answer : A. to connect LANs
Description : Any recommendations for a wireless router (most likely N) that works well with Macs (10.6) and PCs?
Last Answer : answer:I’ve got a generic Linksis that gets the job done. Nothing fancy, but it works. Was about 50$.
Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above
Last Answer : virtual-circuit
Description : Nuhitzu believes it has the technological expertise to produce communication systems that will be the leaders around the globe. Boston Electronics is widely regarded as having excellent management ... trading company C)a joint agreement D)a strategic alliance E)a multinational enterprise
Last Answer : D)a strategic alliance
Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from ... the country which contributed the video display? a. India b. China c. Germany d. Taiwan
Last Answer : Taiwan
Description : The language that the computer can understand and execute is called a. Machine language b. Application software c. System program d. All of above
Last Answer : Machine language
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : What are called routers? a. The devices that operates at session layer b. The devices that operates at data layer c. The devices that operates at application layer d. The devices that operates at network
Last Answer : d. The devices that operates at network
Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : A simply supported rolled steel joist 8 m long carries a uniformly distributed load over it span so that the maximum bending stress is 75 N/mm². If the slope at the ends is 0.005 radian and the value of E = 0.2 ... joist, is (A) 200 mm (B) 250 mm (C) 300 mm (D) 400 mm
Last Answer : (D) 400 mm
Description : A cantilever of length 3m carries a uniformly distributed load of 15KN/m over a length of 2m from the free end.If I= 108 mm4 and E= 2×105 N/mm2,find the slope at the free end? a.0.00326 rad b.0.00578 rad c.0.00677 rad d.0.00786 rad
Last Answer : a.0.00326 rad
Description : A beam of uniform rectangular section 200 mm wide and 300mm deep is simply supported at its ends.It carries a uniformly distributed load of 9KN/m run over the entire span of 5m.If E=1×104 N/mm2, what is the maximum deflection? a.14.26 mm b.17.28 mm c.18.53 mm d.16.27 mm.
Last Answer : d.16.27 mm.