

MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
251. |
Which of the following is not provided by “Deep Web”? |
A. | database generated web pages |
B. | private or limited access web pages |
C. | pages without links |
D. | all of the mentioned |
Answer» E. | |
252. |
Based on PageRank algorithm, Google returns for a query that is parsed for its keywords. |
A. | sep |
B. | sap |
C. | serp |
D. | business objects build |
Answer» D. business objects build | |
253. |
Which of the following algorithm is used by Google to determine the importance of a particular page? |
A. | svd |
B. | pagerank |
C. | fastmap |
D. | all of the mentioned |
Answer» C. fastmap | |
254. |
Which of the following should be placed in second lowermost layer for the following figure? |
A. | host operating system |
B. | software |
C. | vm |
D. | none of the mentioned |
Answer» B. software | |
255. |
Which of the following will be the host operating system for Windows Server? |
A. | virtuallogix vlx |
B. | microsoft hyper-v |
C. | xen |
D. | all of the mentioned |
Answer» C. xen | |
256. |
Which of the following is Type 2 VM? |
A. | virtuallogix vlx |
B. | vmware esx |
C. | xen |
D. | lynxsecure |
Answer» D. lynxsecure | |
257. |
Which of the following is Type 1 Hypervisor? |
A. | wind river simics |
B. | virtual server 2005 r2 |
C. | kvm |
D. | lynxsecure |
Answer» E. | |
258. |
An operating system running on a Type VM is full virtualization. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | all of the mentioned |
Answer» B. 2 | |
259. |
Which of the following provide system resource access to virtual machines? |
A. | vmm |
B. | vmc |
C. | vnm |
D. | all of the mentioned |
Answer» B. vmc | |
260. |
Which of the following is another name for the system virtual machine? |
A. | hardware virtual machine |
B. | software virtual machine |
C. | real machine |
D. | none of the mentioned |
Answer» B. software virtual machine | |
261. |
Which type of Hypervisor is shown in the following figure? |
A. | type 1 |
B. | type 2 |
C. | type 3 |
D. | all of the mentioned |
Answer» B. type 2 | |
262. |
The output of the reduce task is typically written to the FileSystem via |
A. | outputcollector.collect |
B. | outputcollector.get |
C. | outputcollector.receive |
D. | outputcollector.put |
Answer» B. outputcollector.get | |
263. |
The framework groups Reducer inputs by key in stage. |
A. | sort |
B. | shuffle |
C. | reduce |
D. | none of the mentioned |
Answer» B. shuffle | |
264. |
The number of reduces for the job is set by the user via |
A. | jobconf.setnumtasks(int) |
B. | jobconf.setnumreducetasks(int) |
C. | jobconf.setnummaptasks(int) |
D. | all of the mentioned |
Answer» C. jobconf.setnummaptasks(int) | |
265. |
Applications can use the to report progress and set application-level status messages. |
A. | partitioner |
B. | outputsplit |
C. | reporter |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
266. |
The right level of parallelism for maps seems to be around maps per- node. |
A. | 1-10 |
B. | 10-100 |
C. | 100-150 |
D. | 150-200 |
Answer» C. 100-150 | |
267. |
The Hadoop MapReduce framework spawns one map task for each generated by the InputFormat for the job. |
A. | outputsplit |
B. | inputsplit |
C. | inputsplitstream |
D. | all of the mentioned |
Answer» C. inputsplitstream | |
268. |
The Hadoop list includes the HBase database, the Apache Mahout system, and matrix operations. |
A. | machine learning |
B. | pattern recognition |
C. | statistical classification |
D. | artificial intelligence |
Answer» B. pattern recognition | |
269. |
The Mapper implementation processes one line at a time via method.TOPIC 5.2 MAPREDUCE |
A. | map |
B. | reduce |
C. | mapper |
D. | reducer |
Answer» B. reduce | |
270. |
Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require storage on hosts. |
A. | raid |
B. | standard raid levels |
C. | zfs |
D. | operating system |
Answer» B. standard raid levels | |
271. |
Sun also has the Hadoop Live CD project, which allows running a fully functional Hadoop cluster using a live CD. |
A. | openoffice.org |
B. | opensolaris |
C. | gnu |
D. | linux |
Answer» C. gnu | |
272. |
IBM and have announced a major initiative to use Hadoop to support university courses in distributed computer programming. |
A. | google latitude |
B. | android (operating system) |
C. | google variations |
D. | |
Answer» E. | |
273. |
Which of the following disk operation is performed When a tenant is granted access to a virtual storage container? |
A. | crud |
B. | file system modifications |
C. | partitioning |
D. | all of the mentioned |
Answer» E. | |
274. |
Which of the following protocol is used for discovering and retrieving objects from a cloud? |
A. | occi |
B. | smtp |
C. | http |
D. | all of the mentioned |
Answer» B. smtp | |
275. |
Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? |
A. | san |
B. | iscsi |
C. | fibre channel |
D. | all of the mentioned |
Answer» E. | |
276. |
A is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs. |
A. | gets |
B. | pun |
C. | lun |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
277. |
Which of the following can manage data from CIFS and NFS file systems over HTTPnetworks? |
A. | storagegrid |
B. | datagrid |
C. | diskgrid |
D. | all of the mentioned |
Answer» B. datagrid | |
278. |
Redundancy has to be implemented at the architectural level for effective results in cloud computing. |
A. | lower |
B. | higher |
C. | middle |
D. | all of the mentioned |
Answer» C. middle | |
279. |
Which of the following feature make cloud-based storage systems highly reliable? |
A. | redundant networks |
B. | redundant name servers |
C. | replication |
D. | all of the mentioned |
Answer» E. | |
280. |
For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer. |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» C. iaas | |
281. |
Which of the following service provider provides the highest level of service? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» B. paas | |
282. |
The componentized nature of SaaS solutions enables many solutions to support a feature called |
A. | workspace |
B. | workloads |
C. | mashups |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
283. |
Open source software used in a SaaS is called SaaS. |
A. | closed |
B. | free |
C. | open |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
284. |
SaaS supports multiple users and provides a shared data model through model. |
A. | single-tenancy |
B. | multi-tenancy |
C. | multiple-instance |
D. | all of the mentioned |
Answer» C. multiple-instance | |
285. |
applications have a much lower barrier to entry than their locally installed competitors. |
A. | iaas |
B. | caas |
C. | paas |
D. | none of the mentioned |
Answer» E. | |
286. |
Which of the following is a SaaS characteristic? |
A. | the typical license is subscription-based or usage-based and is billed on a recurring basis |
B. | the software is available over the internet globally through a browser on demand |
C. | the software and the service are monitored and maintained by the vendor |
D. | all of the mentioned |
Answer» E. | |
287. |
Which of the following SaaS platform is with an exposed API? |
A. | salesforce.com |
B. | amazon.com |
C. | flipkart.com |
D. | all of the mentioned |
Answer» B. amazon.com | |
288. |
Which of the following aspect of the service is abstracted away? |
A. | data escrow |
B. | user interaction |
C. | adoption drivers |
D. | none of the mentioned |
Answer» C. adoption drivers | |
289. |
Which of the following is the most complete cloud computing service model? |
A. | paas |
B. | iaas |
C. | caas |
D. | saas |
Answer» E. | |
290. |
Amazon Web Services supports Type II Audits. |
A. | sas70 |
B. | sas20 |
C. | sas702 |
D. | none of the mentioned |
Answer» B. sas20 | |
291. |
Which of the following are a common means for losing encrypted data? |
A. | lose the keys |
B. | lose the encryption standard |
C. | lose the account |
D. | all of the mentioned |
Answer» B. lose the encryption standard | |
292. |
Which of the following is a key mechanism for protecting data? |
A. | access control |
B. | auditing |
C. | authentication |
D. | all of the mentioned |
Answer» E. | |
293. |
Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud? |
A. | amazon elastic mapreduce |
B. | amazon mechanical turk |
C. | amazon devpay |
D. | multi-factor authentication |
Answer» B. amazon mechanical turk | |
294. |
Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis? |
A. | amazon elastic mapreduce |
B. | amazon mechanical turk |
C. | amazon devpay |
D. | multi-factor authentication |
Answer» C. amazon devpay | |
295. |
Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function? |
A. | amazon elastic compute cloud |
B. | amazon associates web services |
C. | alexa web information service |
D. | all of the mentioned |
Answer» C. alexa web information service | |
296. |
Which of the following should be used considering factors shown in the figure? |
A. | simpledb |
B. | rds |
C. | amazon ec2 |
D. | all of the mentioned |
Answer» C. amazon ec2 | |
297. |
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes. |
A. | ben |
B. | xen |
C. | ken |
D. | zen |
Answer» C. ken | |
298. |
Which of the following provider rely on the virtual machine technology to deliver servers? |
A. | caas |
B. | aaas |
C. | paas |
D. | iaas |
Answer» E. | |
299. |
Which of the following component is called hypervisor? |
A. | vgm |
B. | vmc |
C. | vmm |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
300. |
Communication between services is done widely using protocol. |
A. | rest |
B. | soap |
C. | restful |
D. | none of the mentioned |
Answer» C. restful | |