A) telnet
B) http
C) ftp
D) rpc
Correct Answer
verified
Multiple Choice
A) remote sensing
B) remote invocation
C) cloud computing
D) private computing
Correct Answer
verified
Multiple Choice
A) bagvapp
B) jcinacio
C) helpdesklive
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) caas
B) aaas
C) paas
D) saas
Correct Answer
verified
Multiple Choice
A) cloudwatch
B) amazon elastic block store
C) aws import/export
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) It's always going to be less expensive and more secure than local computing.
B) You can access your data from any computer in the world, as long as you have an Internet connection.
C) Only a few small companies are investing in the technology, making it a risky venture.
Correct Answer
verified
Multiple Choice
A) software as a service
B) system software and services
C) software as a system
D) system as a service
Correct Answer
verified
Multiple Choice
A) Platform, Software, Infrastructure
B) Software, Hardware, Infrastructure
C) Platform, Hardware, Infrastructure
Correct Answer
verified
Multiple Choice
A) host id
B) host name and identifier
C) identifier
D) process id
Correct Answer
verified
Multiple Choice
A) software
B) platform
C) analytics
D) none of the mentioned
Correct Answer
verified
Multiple Choice
A) Software as a Service
B) Platform as a Service
C) Infrastructure as a Service
Correct Answer
verified
Multiple Choice
A) The Internet
B) Cumulus Clouds
C) A Computer
D) Thin Clients
Correct Answer
verified
Multiple Choice
A) the dot.com bust in 2000
B) the inability of file-hosting companies to successfully monetize online storage
C) the continued commoditization of large disk drives
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) cloudwatch
B) amazon elastic block store
C) aws import/export
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) Model
B) Computing
C) Software
D) All of the mentioned
Correct Answer
verified
Multiple Choice
A) a larger pool of qualified developers
B) more reliable operation
C) a logical design methodology
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) soa
B) ebs
C) gec
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) replicas
B) shards
C) tenants
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) Breaks compliance regulations
B) Adds latency
C) Raises security concerns
D) Makes data recovery harder
Correct Answer
verified
Multiple Choice
A) Many-to-many
B) One-to-many
C) One-to-one
Correct Answer
verified
Showing 61 - 80 of 180
Related Exams