~Connecting LIS Professionals

Search This Blog

Important LIS Objective Questions

 (1) Which of the following research is a correct example for implementing cloud computing services in special libraries?

(a) Historical Research
(b) Action Research
(c) Experimental Research
(d) Survey Research

Answer:-(c) Experimental Research


(2)Which of the following is application and infrastructure management software for hybrid multi-clouds?

 (a) Tapinsystems
 (b) Web Metrics
 (c) VMware Hyperic
 (d) Univa UD

Answer:-(a) Tapinsystems


(3)Which of these is not a major type of cloud computing usage?

 (a) Hardware as a Service
 (b) Platform as a Service
 (c) Software as a Service
 (d) Infrastructure as a Service

Answer:-(a) Hardware as a Service


(4)Which one of these is not a cloud computing pricing model?

 (a) Free
 (b) Ladder
 (c) Pay per use
 (d) Subscription

Answers:-(b) Ladder


(5)Match the following and choose the correct answer from the codes given below

   List - I                       List - II 
(1)  Private Cloud           (a) Google Apps for Government
(2)  Community Cloud       (b) Amazon VPC
(3)  Public Cloud           (c) VMware vCloud
(4)  Hybrid Cloud               (d) IBM Smart Cloud

Codes: 

  1.  (a) (b) (c) (d) 
  2.  (b) (a) (d) (c)
  3.  (c) (d) (a) (b) 
  4.  (d) (a) (c) (b)

Answer:-2.(b) (a) (d) (c)


(6) What does P2P stand for?

 (a) Password to Password
 (b) Peer to Peer
 (c) Product to Product
 (d) Private Key to Public Key

 Answers:-(b) Peer to Peer


(7) Who created Bitcoin?

 (a) Satoshi Nakamoto
 (b) Samsung
 (c) John McAfee
 (d) China

 Answers:-(a) Satoshi Nakamoto


(8) What characteristic makes blockchain tamper-proof?

 (a) Immutability
 (b) VPN
 (c) Cryptocurrency
 (d) Servers

Answers:-(a) Immutability


(9) What are sidechains?

(a) Another term for a hash function
(b)Smart Contracts that have forked off the main blockchain
(c) A parallel network running adjacent to the main blockchain network for additional security
(d) Any mechanism that allows tokens from one blockchain to be securely used within a completely separate blockchain.

 Answers:-(d) Any mechanism that allows tokens from one blockchain to be securely used within a completely separate blockchain.


(10) Which is NOT a part of asymmetric encryption?

 (a) Mining
 (b) Public key
 (c) Passphrase
 (d) Private Key

 Answers:-(a) Mining

No comments:

Post a Comment