Explore topic-wise MCQs in Technical Programming.

This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

251.

Which of the following is not provided by “Deep Web”?

A. database generated web pages
B. private or limited access web pages
C. pages without links
D. all of the mentioned
Answer» E.
252.

Based on PageRank algorithm, Google returns                      for a query that is parsed for its keywords.

A. sep
B. sap
C. serp
D. business objects build
Answer» D. business objects build
253.

Which of the following algorithm is used by Google to determine the importance of a particular page?

A. svd
B. pagerank
C. fastmap
D. all of the mentioned
Answer» C. fastmap
254.

Which of the following should be placed in second lowermost layer for the following figure?

A. host operating system
B. software
C. vm
D. none of the mentioned
Answer» B. software
255.

Which of the following will be the host operating system for Windows Server?

A. virtuallogix vlx
B. microsoft hyper-v
C. xen
D. all of the mentioned
Answer» C. xen
256.

Which of the following is Type 2 VM?

A. virtuallogix vlx
B. vmware esx
C. xen
D. lynxsecure
Answer» D. lynxsecure
257.

Which of the following is Type 1 Hypervisor?

A. wind river simics
B. virtual server 2005 r2
C. kvm
D. lynxsecure
Answer» E.
258.

An operating system running on a Type             VM is full virtualization.

A. 1
B. 2
C. 3
D. all of the mentioned
Answer» B. 2
259.

Which of the following provide system resource access to virtual machines?

A. vmm
B. vmc
C. vnm
D. all of the mentioned
Answer» B. vmc
260.

Which of the following is another name for the system virtual machine?

A. hardware virtual machine
B. software virtual machine
C. real machine
D. none of the mentioned
Answer» B. software virtual machine
261.

Which type of Hypervisor is shown in the following figure?

A. type 1
B. type 2
C. type 3
D. all of the mentioned
Answer» B. type 2
262.

The output of the reduce task is typically written to the FileSystem via

A. outputcollector.collect
B. outputcollector.get
C. outputcollector.receive
D. outputcollector.put
Answer» B. outputcollector.get
263.

The framework groups Reducer inputs by key in                    stage.

A. sort
B. shuffle
C. reduce
D. none of the mentioned
Answer» B. shuffle
264.

The number of reduces for the job is set by the user via

A. jobconf.setnumtasks(int)
B. jobconf.setnumreducetasks(int)
C. jobconf.setnummaptasks(int)
D. all of the mentioned
Answer» C. jobconf.setnummaptasks(int)
265.

Applications can use the                          to report progress and set application-level status messages.

A. partitioner
B. outputsplit
C. reporter
D. all of the mentioned
Answer» D. all of the mentioned
266.

The right level of parallelism for maps seems to be around                    maps per- node.

A. 1-10
B. 10-100
C. 100-150
D. 150-200
Answer» C. 100-150
267.

The Hadoop MapReduce framework spawns one map task for each                       generated by the InputFormat for the job.

A. outputsplit
B. inputsplit
C. inputsplitstream
D. all of the mentioned
Answer» C. inputsplitstream
268.

The Hadoop list includes the HBase database, the Apache Mahout                   system, and matrix operations.

A. machine learning
B. pattern recognition
C. statistical classification
D. artificial intelligence
Answer» B. pattern recognition
269.

The Mapper implementation processes one line at a time via                    method.TOPIC 5.2 MAPREDUCE

A. map
B. reduce
C. mapper
D. reducer
Answer» B. reduce
270.

Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require                  storage on hosts.

A. raid
B. standard raid levels
C. zfs
D. operating system
Answer» B. standard raid levels
271.

Sun also has the Hadoop Live CD                 project, which allows running a fully functional Hadoop cluster using a live CD.

A. openoffice.org
B. opensolaris
C. gnu
D. linux
Answer» C. gnu
272.

IBM and                  have announced a major initiative to use Hadoop to support university courses in distributed computer programming.

A. google latitude
B. android (operating system)
C. google variations
D. google
Answer» E.
273.

Which of the following disk operation is performed When a tenant is granted access to a virtual storage container?

A. crud
B. file system modifications
C. partitioning
D. all of the mentioned
Answer» E.
274.

Which of the following protocol is used for discovering and retrieving objects from a cloud?

A. occi
B. smtp
C. http
D. all of the mentioned
Answer» B. smtp
275.

Which of the following use LUNs to define a storage volume that appears to a connected computer as a device?

A. san
B. iscsi
C. fibre channel
D. all of the mentioned
Answer» E.
276.

A                  is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs.

A. gets
B. pun
C. lun
D. all of the mentioned
Answer» D. all of the mentioned
277.

Which of the following can manage data from CIFS and NFS file systems over HTTPnetworks?

A. storagegrid
B. datagrid
C. diskgrid
D. all of the mentioned
Answer» B. datagrid
278.

Redundancy has to be implemented at the                   architectural level for effective results in cloud computing.

A. lower
B. higher
C. middle
D. all of the mentioned
Answer» C. middle
279.

Which of the following feature make cloud-based storage systems highly reliable?

A. redundant networks
B. redundant name servers
C. replication
D. all of the mentioned
Answer» E.
280.

For the                    model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» C. iaas
281.

Which of the following service provider provides the highest level of service?

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» B. paas
282.

The componentized nature of SaaS solutions enables many solutions to support a feature called

A. workspace
B. workloads
C. mashups
D. all of the mentioned
Answer» D. all of the mentioned
283.

Open source software used in a SaaS is called                SaaS.

A. closed
B. free
C. open
D. all of the mentioned
Answer» D. all of the mentioned
284.

SaaS supports multiple users and provides a shared data model through                     model.

A. single-tenancy
B. multi-tenancy
C. multiple-instance
D. all of the mentioned
Answer» C. multiple-instance
285.

applications have a much lower barrier to entry than their locally installed competitors.

A. iaas
B. caas
C. paas
D. none of the mentioned
Answer» E.
286.

Which of the following is a SaaS characteristic?

A. the typical license is subscription-based or usage-based and is billed on a recurring basis
B. the software is available over the internet globally through a browser on demand
C. the software and the service are monitored and maintained by the vendor
D. all of the mentioned
Answer» E.
287.

Which of the following SaaS platform is with an exposed API?

A. salesforce.com
B. amazon.com
C. flipkart.com
D. all of the mentioned
Answer» B. amazon.com
288.

Which of the following aspect of the service is abstracted away?

A. data escrow
B. user interaction
C. adoption drivers
D. none of the mentioned
Answer» C. adoption drivers
289.

Which of the following is the most complete cloud computing service model?

A. paas
B. iaas
C. caas
D. saas
Answer» E.
290.

Amazon Web Services supports                  Type II Audits.

A. sas70
B. sas20
C. sas702
D. none of the mentioned
Answer» B. sas20
291.

Which of the following are a common means for losing encrypted data?

A. lose the keys
B. lose the encryption standard
C. lose the account
D. all of the mentioned
Answer» B. lose the encryption standard
292.

Which of the following is a key mechanism for protecting data?

A. access control
B. auditing
C. authentication
D. all of the mentioned
Answer» E.
293.

Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?

A. amazon elastic mapreduce
B. amazon mechanical turk
C. amazon devpay
D. multi-factor authentication
Answer» B. amazon mechanical turk
294.

Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis?

A. amazon elastic mapreduce
B. amazon mechanical turk
C. amazon devpay
D. multi-factor authentication
Answer» C. amazon devpay
295.

Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

A. amazon elastic compute cloud
B. amazon associates web services
C. alexa web information service
D. all of the mentioned
Answer» C. alexa web information service
296.

Which of the following should be used considering factors shown in the figure?

A. simpledb
B. rds
C. amazon ec2
D. all of the mentioned
Answer» C. amazon ec2
297.

Amazon Machine Images are virtual appliances that have been packaged to run on the grid of          nodes.

A. ben
B. xen
C. ken
D. zen
Answer» C. ken
298.

Which of the following provider rely on the virtual machine technology to deliver servers?

A. caas
B. aaas
C. paas
D. iaas
Answer» E.
299.

Which of the following component is called hypervisor?

A. vgm
B. vmc
C. vmm
D. all of the mentioned
Answer» D. all of the mentioned
300.

Communication between services is done widely using                protocol.

A. rest
B. soap
C. restful
D. none of the mentioned
Answer» C. restful