

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .
751. |
Factory to use our Spring bean as the implementation:- |
A. | jaxws:end |
B. | jaxws:endpoint |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. jaxws:endpoint |
752. |
Publishing messages is handled through Class. |
A. | client() |
B. | server() |
C. | publish() |
D. | batch() |
Answer» A. client() |
753. |
client() class provides to create topics. |
A. | software |
B. | classes |
C. | methods |
D. | batch |
Answer» C. methods |
754. |
method publishes messages to pub/sub. |
A. | client() |
B. | publish() |
C. | server() |
D. | batch() |
Answer» B. publish() |
755. |
How many arguments are accepted by publish()? |
A. | 5 arguments |
B. | 3 arguments |
C. | 1 argument |
D. | 2 arguments |
Answer» D. 2 arguments |
756. |
The topic in the publish method is in which form? |
A. | binomial form |
B. | canonical form |
C. | nominal form |
D. | message form |
Answer» B. canonical form |
757. |
The message in pub/sub is an opaque blob of |
A. | bits |
B. | bytes |
C. | word |
D. | nibble |
Answer» B. bytes |
758. |
error will show if we try to send text string instead of bytes. |
A. | typeerror |
B. | error |
C. | linker error |
D. | compiler error |
Answer» A. typeerror |
759. |
What do we call string in python 2? |
A. | str |
B. | unicode |
C. | strs |
D. | unicades |
Answer» B. unicode |
760. |
When you publish a message is automatically created? |
A. | client |
B. | server |
C. | batch |
D. | server |
Answer» C. batch |
761. |
What is the time elapsed after a batch is created? |
A. | 0.5 seconds |
B. | 0.05 seconds |
C. | 1.5 seconds |
D. | 1 second |
Answer» B. 0.05 seconds |
762. |
Every call to publish() will return a class that conforms to the interface. |
A. | batch |
B. | client |
C. | server |
D. | future |
Answer» D. future |
763. |
Point out the wrong statement. |
A. | abstraction enables the key benefit of cloud computing: shared, ubiquitous access |
B. | virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made |
C. | all cloud computing applications combine their resources into pools that can be assigned on demand to users |
D. | all of the mentioned |
Answer» C. all cloud computing applications combine their resources into pools that can be assigned on demand to users |
764. |
Which of the following type of virtualization is also characteristic of cloud computing? |
A. | storage |
B. | application |
C. | cpu |
D. | all of the mentioned |
Answer» D. all of the mentioned |
765. |
The technology used to distribute service requests to resources is referred to as |
A. | load performing |
B. | load scheduling |
C. | load balancing |
D. | all of the mentioned |
Answer» C. load balancing |
766. |
Point out the correct statement. |
A. | a client can request access to a cloud service from any location |
B. | a cloud has multiple application instances and directs requests to an instance based on conditions |
C. | computers can be partitioned into a set of virtual machines with each machine being assigned a workload |
D. | all of the mentioned |
Answer» D. all of the mentioned |
767. |
Which of the following software can be used to implement load balancing? |
A. | apache mod_balancer |
B. | apache mod_proxy_balancer |
C. | f6’s bigip |
D. | all of the mentioned |
Answer» B. apache mod_proxy_balancer |
768. |
Which of the following network resources can be load balanced? |
A. | connections through intelligent switches |
B. | dns |
C. | storage resources |
D. | all of the mentioned |
Answer» D. all of the mentioned |
769. |
Which of the following is a more sophisticated load balancer? |
A. | workload managers |
B. | workspace managers |
C. | rackserve managers |
D. | all of the mentioned |
Answer» A. workload managers |
770. |
A is a combination load balancer and application server that is a server placed between a firewall or router. |
A. | abc |
B. | acd |
C. | adc |
D. | all of the mentioned |
Answer» C. adc |
771. |
Which of the following should be replaced with the question mark in the following figure? |
A. | abstraction |
B. | virtualization |
C. | mobility pattern |
D. | all of the mentioned |
Answer» B. virtualization |
772. |
In memory-mapped I/O |
A. | the i/o devices and the memory share the same address space |
B. | the i/o devices have a separate address space |
C. | the memory and i/o devices have an associated address space |
D. | a part of the memory is specifically set aside for the i/o operation |
Answer» A. the i/o devices and the memory share the same address space |
773. |
The usual BUS structure used to connect the I/O devices is |
A. | star bus structure |
B. | multiple bus structure |
C. | single bus structure |
D. | node to node bus structure |
Answer» C. single bus structure |
774. |
The advantage of I/O mapped devices to memory mapped is |
A. | the former offers faster transfer of data |
B. | the devices connected using i/o mapping have a bigger buffer space |
C. | the devices have to deal with fewer address lines |
D. | no advantage as such |
Answer» C. the devices have to deal with fewer address lines |
775. |
The system is notified of a read or write operation by |
A. | appending an extra bit of the address |
B. | enabling the read or write bits of the devices |
C. | raising an appropriate interrupt signal |
D. | sending a special signal along the bus |
Answer» D. sending a special signal along the bus |
776. |
To overcome the lag in the operating speeds of the I/O device and the processor we use |
A. | buffer spaces |
B. | status flags |
C. | interrupt signals |
D. | exceptions |
Answer» B. status flags |
777. |
The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is? |
A. | exceptions |
B. | signal handling |
C. | interrupts |
D. | dma |
Answer» C. interrupts |
778. |
The method which offers higher speeds of I/O transfers is |
A. | interrupts |
B. | memory mapping |
C. | program-controlled i/o |
D. | dma |
Answer» D. dma |
779. |
The process wherein the processor constantly checks the status flags is called as |
A. | polling |
B. | inspection |
C. | reviewing |
D. | echoing |
Answer» A. polling |
780. |
The purpose of backup is: |
A. | to restore a computer to an operational state following a disaster |
B. | to restore small numbers of files after they have been accidentally deleted |
C. | to restore one among many version of the same file for multiple backup environment |
D. | all of the mentioned |
Answer» D. all of the mentioned |
781. |
Backup of the source data can be created |
A. | on the same device |
B. | on another device |
C. | at some other location |
D. | all of the mentioned |
Answer» D. all of the mentioned |
782. |
Which of the following backup technique is most space efficient? |
A. | full backup |
B. | incremental backup |
C. | differential backup |
D. | all of the mentioned |
Answer» B. incremental backup |
783. |
Which of the following statements are true? |
A. | data can be recovered fastest in online backup |
B. | tape library is an example of nearline storage |
C. | data recovery can take hours for offline backup |
D. | all of the mentioned |
Answer» D. all of the mentioned |
784. |
Which of the following qualifies as best DR (Disaster Recovery) site? |
A. | dr site in the same campus |
B. | dr site in the same city |
C. | dr site in the same country |
D. | dr site in a different country |
Answer» D. dr site in a different country |
785. |
Which of the following techniques can be used for optimizing backed up data space? |
A. | encryption and deduplication |
B. | compression and deduplication |
C. | authentication and deduplication |
D. | deduplication only |
Answer» B. compression and deduplication |
786. |
To decide on a backup strategy for your organization, which of the following should you consider? |
A. | rpo (recovery point objective) |
B. | rto (recovery time objective) |
C. | both rpo & rto |
D. | none of the mentioned |
Answer» C. both rpo & rto |
787. |
Which of the following can be used for reducing recovery time? |
A. | automatic failover |
B. | by taking backup on a faster device |
C. | taking multiple backups – one in same location, another at different location |
D. | all of the mentioned |
Answer» D. all of the mentioned |
788. |
Which of the following is false? |
A. | the more important the data, the greater the need for backing it up |
B. | a backup is as useful as its associated restore strategy |
C. | storing the backup copy near to its original site is best strategy |
D. | automated backup and scheduling is preferred over manual operations |
Answer» C. storing the backup copy near to its original site is best strategy |
789. |
Which of the following is Backup software? |
A. | amanda |
B. | bacula |
C. | ibm tivoli storage manager |
D. | all of the mentioned |
Answer» D. all of the mentioned |
790. |
Which of the following is incorrect? |
A. | a layered-style program is divided into an array of modules or layers |
B. | each layer provides services to the layer “below” and makes use of services provided by the layer “above” |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. each layer provides services to the layer “below” and makes use of services provided by the layer “above” |
791. |
What is Relaxed Layered Style? |
A. | each layer can be constrained to use only the layer directly below it |
B. | sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it |
792. |
Which of the following is correct? |
A. | module a uses module b if a correct version of b must be present for a to execute correctly |
B. | module a calls (or invokes ) module b if b triggers execution of a |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» A. module a uses module b if a correct version of b must be present for a to execute correctly |
793. |
Which of the following is true with respect to layered architecture? |
A. | each layer is allowed to depend on the layer above it being present and correct |
B. | a layer may call other layers above and below it, as long as it uses them |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» D. none of the mentioned |
794. |
What is Onion diagram illustrates? |
A. | it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system |
B. | it often illustrates operating system layers, with the kernel at the core |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» D. none of the mentioned |
795. |
In particular, layers have which of the following characteristics? |
A. | layers are by definition highly cohesive, thus satisfying the principle of cohesion |
B. | layers doesn’t support information hiding |
C. | layers are constrained to use only above layers |
D. | all of the mentioned |
Answer» A. layers are by definition highly cohesive, thus satisfying the principle of cohesion |
796. |
What are the drawbacks for Layers? |
A. | it is often necessary to pass data through many layers, which can slow performance significantly |
B. | layers support information hiding |
C. | multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers |
D. | none of the mentioned |
Answer» C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers |
797. |
Which of the following is correct? |
A. | layers are not strongly coupled to the layers above them |
B. | each layer is strongly coupled only to the layer immediately below it |
C. | overall layered-style architectures are loosely coupled |
D. | all of the mentioned |
Answer» D. all of the mentioned |
798. |
Which of the following is one of the unique attributes of Cloud Computing? |
A. | utility type of delivery |
B. | elasticity |
C. | low barrier to entry |
D. | all of the mentioned |
Answer» D. all of the mentioned |
799. |
Point out the correct statement. |
A. | service level agreements (slas) is small aspect of cloud computing |
B. | cloud computing does not have impact on software licensing |
C. | cloud computing presents new opportunities to users and developers |
D. | all of the mentioned |
Answer» C. cloud computing presents new opportunities to users and developers |
800. |
Applications that work with cloud computing that have low margins and usually low risk are |
A. | high touch |
B. | low touch |
C. | moderate touch |
D. | all of the mentioned |
Answer» B. low touch |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.