GkSeries.com

Cloud Programming Multiple Choice Questions(MCQs)& Answers

161 ____________ is the most complete cloud computing service model?
[A] PaaS
[B] IaaS
[C] CaaS
[D] SaaS
Answer: SaaS
162 VPoint out the correct statement.
[A] Platforms can be based on specific types of development languages, application frameworks, or other constructs
[B] SaaS is the cloud-based equivalent of shrink-wrapped software
[C] Software as a Service (SaaS) may be succinctly described as software that is deployed on a hosted service
[D] All of the mentioned
Answer: All of the mentioned

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

163 Which of the following aspect of the service is abstracted away?
[A] Data escrow
[B] User Interaction
[C] Adoption drivers
[D] None of the mentioned
Answer: User Interaction
164 Which of the following SaaS platform is with an exposed API?
[A] salesforce.com
[B] amazon.com
[C] flipkart.com
[D] all of the mentioned
Answer: salesforce.com
165 Point out the wrong statement.
[A] SaaS applications come in all shapes and sizes
[B] Every computer user is familiar with SaaS systems
[C] SaaS software is not customizable
[D] None of the mentioned
Answer: All of the mentioned
166 ______________ is a SaaS characteristic?
[A] The typical license is subscription-based or usage-based and is billed on a recurring basis
[B] The software is available over the Internet globally through a browser on demand
[C] The software and the service are monitored and maintained by the vendor
[D] All of the mentioned
Answer: i
167 _________ applications have a much lower barrier to entry than their locally installed competitors.
[A] IaaS
[B] CaaS
[C] PaaS
[D] None of the mentioned
Answer: None of the mentioned
168 SaaS supports multiple users and provides a shared data model through _________ model.
[A] single-tenancy
[B] multi-tenancy
[C] multiple-instance
[D] all of the mentioned
Answer: multi-tenancy
169 Open source software used in a SaaS is called _______ SaaS.
[A] closed
[B] free
[C] open
[D] all of the mentioned
Answer: open
170 The componentized nature of SaaS solutions enables many solutions to support a feature called _____________
[A] workspace
[B] workloads
[C] mashups
[D] all of the mentioned
Answer: mashups
171 Salesforce.com is the largest ______ provider of CRM software.
[A] PaaS
[B] IaaS
[C] CaaS
[D] SaaS
Answer: SaaS
172 Type of Conversion in which compiler is unable to convert the data type implicitly is?
[A] ushort to long
[B] int to uint
[C] ushort to long
[D] byte to decimal
Answer: byte to decimal
173 ___________ is dedicated to support technologies that implement enterprise mashups?
[A] Open Alliance Apache
[B] Open Mashup Alliance
[C] Open Tech Alliance
[D] None of the mentioned
Answer: Open Mashup Alliance
174 TWhich of the following attribute should be unique?
[A] identity
[B] digital identity
[C] mashup
[D] all of the mentioned
Answer: digital identity
175 Point out the wrong statement.
[A] Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
[B] Services that provide digital identity management as a service have been part of internetworked systems from Day One
[C] IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
[D] None of the mentioned
Answer: IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
176 Which of the following authentication requires the outside use of a network security or trust service.
[A] SSO
[B] Singlefactor
[C] Multi Factor
[D] All of the mentioned
Answer: Multi Factor
177 ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.
[A] Internet Hardware Addresses
[B] Ethernet Software Addresses
[C] Ethernet Hardware Addresses
[D] None of the mentioned
Answer: Ethernet Hardware Addresses
178 _________ is one of the more expensive and complex areas of network computing.
[A] Multi-Factor Authentication
[B] Fault tolerance
[C] Identity protection
[D] All of the mentioned
Answer: Identity protection
179 ___________ is provided by Identity as a Service?
[A] Identity governance
[B] Provisioning
[C] Risk and event monitoring
[D] All of the mentioned
Answer: All of the mentioned
180 Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider.
[A] OpenID
[B] OpenUser
[C] OpenSSD
[D] None of the mentioned
Answer: OpenID

Please share this page

Click Here to Read more questions

Teacher Eligibility Test