(1) Which of the following research is a correct example for implementing cloud computing services in special libraries?
Answer:-(c) Experimental Research
(2)Which of the following is application and infrastructure management software for hybrid multi-clouds?
(b) Web Metrics
(c) VMware Hyperic
(d) Univa UD
Answer:-(a) Tapinsystems
(3)Which of these is not a major type of cloud computing usage?
(b) Platform as a Service
(c) Software as a Service
(d) Infrastructure as a Service
Answer:-(a) Hardware as a Service
(4)Which one of these is not a cloud computing pricing model?
(b) Ladder
(c) Pay per use
(d) Subscription
Answers:-(b) Ladder
(5)Match the following and choose the correct answer from the codes given below
(1) Private Cloud (a) Google Apps for Government
(2) Community Cloud (b) Amazon VPC
(3) Public Cloud (c) VMware vCloud
(4) Hybrid Cloud (d) IBM Smart Cloud
Codes:
- (a) (b) (c) (d)
- (b) (a) (d) (c)
- (c) (d) (a) (b)
- (d) (a) (c) (b)
Answer:-2.(b) (a) (d) (c)
(6) What does P2P stand for?
(b) Peer to Peer
(c) Product to Product
(d) Private Key to Public Key
Answers:-(b) Peer to Peer
(7) Who created Bitcoin?
(b) Samsung
(c) John McAfee
(d) China
Answers:-(a) Satoshi Nakamoto
(8) What characteristic makes blockchain tamper-proof?
(b) VPN
(c) Cryptocurrency
(d) Servers
Answers:-(a) Immutability
(9) What are sidechains?
(b)Smart Contracts that have forked off the main blockchain
(c) A parallel network running adjacent to the main blockchain network for additional security
(d) Any mechanism that allows tokens from one blockchain to be securely used within a completely separate blockchain.
Answers:-(d) Any mechanism that allows tokens from one blockchain to be securely used within a completely separate blockchain.
(10) Which is NOT a part of asymmetric encryption?
(b) Public key
(c) Passphrase
(d) Private Key
Answers:-(a) Mining
No comments:
Post a Comment