Description : Which of the following companies developed MS Office 2000? A. Microsoft B. Corel C. Novell D. Lotus
Last Answer : Microsof
Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from ... the country which contributed the video display? a. India b. China c. Germany d. Taiwan
Last Answer : Taiwan
Description : ………………. is not an operation performed on linear list Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html a) Insertion b) Deletion c) Retrieval d) Traversal A) only a,b and c B) only a and b C) All of the above D) None of the above
Last Answer : D) None of the above
Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : Shadow
Description : RAD Model was purposed by ? IBM Motorola Microsoft Lucent Technologies
Last Answer : IBM
Description : Which American computer company is called Big Blue ? IBM Compaq Corp Microsoft Tandy Svenson
Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned
Last Answer : None of the mentioned
Description : RUP stands for created by a division of a) Rational Unified Program, IBM b) Rational Unified Process, Infosys c) Rational Unified Process, Microsoft d) Rational Unified Process, IBM
Last Answer : d) Rational Unified Process, IBM
Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contribute A) India B) China C) Germany D) Taiwan
Last Answer : Answer : D
Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from ... country which contributed the video display? a. India b. China c. Germany d. Taiwan
Last Answer : b. China
Last Answer : d. Taiwan
Description : Which of the following sites, would you prefer to buy books? (a) www.yahoomail.com (b) www.sun.com -Technology
Last Answer : (d) www.amazon.com is the world’s largest online retailer and the best site for buying books.
Description : Which of the following rivers lies in a rift valley? (a) Luni (b) Chambal (c) Son (d) Tapi Fun d amen t al MCQs In d i a n Ge o g r a ph y shop.ssbcrack.com
Last Answer : Ans: (d)
Description : I want a blog as a part of my website and not a link to another website like example.blogspot.com?
Last Answer : Wordpress will work for this. I host a Wordpress blog on a domain. like http://wwww.whatever.com/blog using Wordpress without any problems.
Description : The number of reduces for the job is set by the user via _________ CSE-R17.BLOGSPOT.COM a) JobConf.setNumTasks(int)b) JobConf.setNumReduceTasks(int) c) JobConf.setNumMapTasks(int) d) All of the mentioned
Last Answer : JobConf.setNumReduceTasks(int)
Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer
Last Answer : map
Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : All of the mentioned
Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : CloudSensor
Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned
Last Answer : Both Cloudkick and RightScale are known
Description : The __________ property states that the system must have a mechanism to recover from committed transactions should that be necessary. a) Atomicity CSE-R17.BLOGSPOT.COM b) Consistencyc) Isolation d) Durability
Last Answer : Durability
Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned
Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned
Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned
Last Answer : Program-controlled I/O
Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing
Description : Every call to publish() will return a class that conforms to the __________ interface. a) Batch b) Client c) Server CSE-R17.BLOGSPOT.COM d) Future
Last Answer : Future
Description : Tomcat doesn’t support JAX-WS by itself. a) True CSE-R17.BLOGSPOT.COM b) False
Last Answer : True
Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.
Last Answer : False
Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned
Description : Which of the following figure is associated with Description Module in SOA stack? a) b) c) CSE-R17.BLOGSPOT.COM d) None of the mentioned
Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned
Last Answer : SOA provides access to reusable Web services over an SMTP network
Description : Which of the following file transfer utility creates a shared folder metaphor using a Web CSE-R17.BLOGSPOT.COM service?a) Dropbox b) Skype c) Drive d) All of the mentioned
Last Answer : Dropbox
Description : Is anyone out there using Novell Groupwise on the iPhone?
Last Answer : I’m assuming not. My school used it and everyone (students) hated it, passionately. It was also not very secure. There’s exchange and VPN, but unless Apple adds it in or they make an app I’d say probably not.
Description : Is Novell Zenworks Application Virtualization separate from Zenworks for Desktop?
Last Answer : Yes, they are separate. Here is their site, showing the two programs as separate downloads. http://download.novell.com/index.jsp
Description : The collection of links throughout the Internet creates an interconnected network called the - 1) WWW 2) Web 3) World Wide Web 4) All of the above
Last Answer : 4) All of the above
Description : The collection of links throughout the Internet creates an interconnected network called the - 1 WWW 2 Web 3 World Wide Web 4 All of the above
Last Answer : 4 All of the above
Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure
Last Answer : b. Path
Description : Which language in WWW specifies a web's way by describing three- dimensional objects? a. HTML b. VRML c. XML d. UML
Last Answer : b. VRML
Description : In ________ is a repository of information linked together from points all over the world. A. The WWW B. HTTP C. HTML D. none of the above
Last Answer : A. The WWW
Description : Explain the WWW in detail
Last Answer : ∙ Hypertext & Hypermedia ∙ Browser Architecture ∙ Categories of Web Documents ∙ HTML ∙ CGI ∙ Java
Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above
Last Answer : b. DHCP
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro
Last Answer : d. error control
Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD
Last Answer : B. CONFIG_INET
Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c
Last Answer : A. Network
Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP
Last Answer : C. TCP and UDP
Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls
Last Answer : B. Unix
Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above
Last Answer : D. All of the Above