πŸ“Š Cloud Computing
Q. _________ captive requires that the cloud accommodate multiple compliance regimes.
  • (A) Licensed
  • (B) Policy-based
  • (C) Variable
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) Policy-based
πŸ“Š Cloud Computing
Q. Security methods such as private encryption, VLANs and firewalls comes under subject area.
  • (A) Accounting management
  • (B) Compliance
  • (C) Data privacy
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (C) Data privacy
πŸ“Š Cloud Computing
Q. Which of the following captive area deals with monitoring?
  • (A) Licensed
  • (B) Variable but under control
  • (C) Law
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) Variable but under control
πŸ“Š Cloud Computing
Q. Network bottlenecks occur when ________ data sets must be transferred
  • (A) Large
  • (B) Small
  • (C) Big
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (A) Large
πŸ“Š Cloud Computing
Q. How many technologies are used for most of the syndicated content on the Internet?
  • (A) 1
  • (B) 2
  • (C) 3
  • (D) 4
πŸ’¬ Discuss
βœ… Correct Answer: (B) 2
πŸ“Š Cloud Computing
Q. Which of the following technology is used for syndicated content?
  • (A) AJAX
  • (B) RSS
  • (C) javascript
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) RSS
πŸ“Š Cloud Computing
Q. The full form of AJAX is
  • (A) Asynchronous javascript and xm
  • (B) Another java and xml library
  • (C) Abstract json and xml
  • (D) None of these
πŸ’¬ Discuss
βœ… Correct Answer: (A) Asynchronous javascript and xm
πŸ“Š Cloud Computing
Q. The advantages of AJAX is
  • (A) Bandwidth utilisation
  • (B) More interactive
  • (C) Speeder retrieval of data
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (D) All of these
πŸ“Š Cloud Computing
Q. Which of the following are the controls of AJAX?
  • (A) Scriptmanager
  • (B) Scriptmanagerproxy
  • (C) Updateprogress
  • (D) All of these
πŸ’¬ Discuss
βœ… Correct Answer: (D) All of these

Jump to