Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Integrative Programming and Technology

Include inter-systems communication, data mapping and exchange, integrative coding, scripting techniques, and an overview of programming languages.

programming languages

intelligent storage system

network programming

storage area networks

intersystem communication

information technology

Which of the following website is used to search other website by typing a keyword ?

  • Search Engine
  • Social Networks
  • Routers
  • Crawler

Disk controller driver in DAS architecture is replaced in SAN either with ——

  • iSCSI
  • TCP/IP stack
  • Any one of the above
  • FC Protocol

Simpler approach of implementing a web service is named as

  • JavaScript Entity Notation
  • Representation State Transfer
  • JavaScript Object Notation
  • Entity State Transfer

_______________ is the assembly language for an imaginary architecture.

  • Executable code
  • Native code
  • Byte code
  • Machine code

Simply stated, these are large boxes that hold lots of hard disks.

  • Disk Array
  • Switch
  • Tape library
  • Host

Which of the following role of web service architecture provides a central place where developers can publish new services or find existing ones?

  • Service Provider
  • Service Query
  • Service Registry
  • Service Requestor

A script is a:

  • Program or sequence of instructions that is interpreted or carried out by processor directly
  • Program or sequence of instruction that is interpreted or carried out by client server only
  • Program or sequence of instruction that is interpreted or carried out by web server only
  • Program or sequence of instruction that is interpreted or carried out by another program

Network congestion occurs when:

  • in case of traffic overloading
  • when a system terminates
  • when connection between two nodes terminates
  • none of the mentioned

Translator which is used to convert codes of assembly language into machine language is termed as

  • attempter
  • compiler
  • assembler
  • debugger

Which of the following layer in Web Service Protocol Stack is responsible for encoding messages in a common XML format so that messages can be understood at either end?

  • XML Messaging
  • Service Discovery
  • Service Transport
  • Service Description

Pick the false statement

  • RAID Level 4 provides block level striping
  • RAID Level 1 provides disk mirroring
  • RAID Level 5 provides block level striping and error correction information
  • RAID Level 2 provides bit level striping with Hamming code ECC

Set of programs which consist of full documentation.

  • File package
  • Software Package
  • Utility Software
  • System Software

Which of the following layer in Web Service Protocol Stack is responsible for centralizing services into a common registry and providing easy publish/find functionality?

  • Service Description
  • Service Transport
  • XML Messaging
  • Service Discovery

A language supported by MS. Net platform.

  • java
  • C
  • C++
  • C#

The software designed to perform a specific task:

  • System Software
  • Synchronous Software
  • Package Software
  • Application Software

A NAS solution is most appropriate for what type of data environment

  • Secured Access
  • Shared access
  • Remote access
  • Parallel access

A list of protocols used by a system, one protocol per layer, is called:

  • protocol suite
  • protocol file
  • protocol stack
  • protocol architecture

Storage management comprises of

  • RAID Arrays
  • Tape drives
  • SAN Management
  • SAN Management, RAID Arrays and Tape drives

Today's fastest growing mobile phone operating system is

  • Apple's IOS
  • Google's Android
  • Mac OS X
  • Black berry OS

When compared to the compiled program, scripts run:

  • The execution speed is similar
  • Faster
  • Depend on the script
  • Slower

TP monitor done its responsibilities with the help of which protocol?

  • IP
  • TCP/IP
  • Two-Phase Commit Protocol
  • SNA

Pick the wrong statement about the hard disk?

  • Data Transfer rate is over 80 MBPS
  • Hard disk has multiple platters and each platter has two read/write heads one on each side
  • It’s a non-volatile & random access storage device
  • Hard disk can only have IDE or USB interface

Which of the following is false?

  • Flash disk can only have USB interface
  • Flash memory is used in memory sticks
  • NVRAM has built in battery which keeps power applied to it even after the power is switched off
  • Flash memory can be electrically erased and reprogrammed

Which of the below is not a valid classification of design pattern?

  • Behavioural patterns
  • Structural patterns
  • Creational patterns
  • Java patterns

Which one of the following extends a private network across public networks?

  • storage area network
  • local area network
  • virtual private network
  • enterprise private network

Software which allows user to view the webpage is called as __________.

  • Interpreter
  • Internet Browser
  • Website
  • Operating System

To speed up the processor operations, the processor includes some internal memory storage locations, called ___________

  • Units
  • Memory
  • Drives
  • Registers

Unit which retains processed information until it can be placed on output devices by output unit is

  • input device
  • output device
  • memory unit
  • ALU

A more complex approach for web service implementation, is referred to as

  • Big Web Services
  • JavaScript Entity Notation
  • JavaScript Object Notation
  • Representation State Transfer

In computer network nodes are:

  • the computer that terminates the data
  • the computer that terminates, originates and routes the data
  • the computer that routes the data
  • the computer that originates the data

Each byte of character is stored as its ASCII value in _______

  • Binary
  • Decimal
  • Octal
  • Hexadecimal

Which of the following role of web service architecture implements the service and makes it available on the Internet?

  • Service Provider
  • Service Requestor
  • Service Query
  • Service Registry

Word processing software is a type of application software.

  • True
  • False

What will be used by SAN to provide connectivity between hosts and storage?

  • FC or iSCSI
  • FC
  • iSCSI
  • SCSI

A tape library does not contain:

  • Robotic Arm
  • RAID Array
  • Tape Drive
  • Bar Code Reader

TCP, FTP, Telnet, SMTP, POP etc. are examples of?

  • Protocol
  • Socket
  • IP Address
  • MAC Address

Which of the following is a security issue with web services?

  • Confidentiality
  • Confidentiality, Authentication and Network Security
  • Authentication
  • Network Security

For the implementation of web services, the widely used approaches are of type

  • 3 types
  • 2 types
  • 5 types
  • 4 types

The principle of serial equivalence for distributed transactions says that:

  • Concurrent transactions should be atomic
  • Sequential transactions should never be executed concurrently, because of the dangers of lost updates
  • When several transactions are executed concurrently, the result should be the same as if they had been executed in sequence
  • Concurrent transactions should always be executed in sequence

Web-applications were developed in order to interact _____________ .

  • Server
  • Different platforms
  • Work Stations
  • Browsers

RAID Level 6 has dual parity where as RAID Level 5 has single parity and both does block level striping

  • True
  • False

When collection of various computers seems a single coherent system to its client, then it is called:

  • networking system
  • computer network
  • c. client server
  • distributed system

Communication channel is shared by all the machines on the network in

  • monocast network
  • multicast network
  • unicast network
  • broadcast network

Which of the following is false about tape devices?

  • Tape drives are used for archival storage of data
  • Tape drives allow random access of data
  • A tape drive is a data storage device that reads and writes data stored on a Magnetic tape
  • Tape media has low unit cost and long archival stability

Nested RAID provides better performance characteristics than the RAID levels that comprise them

  • False
  • True

Prolog comes under ___________

  • Procedural Programming
  • Functional
  • OOP
  • Logic Programming

Which of the following statements regarding Client-server computing are true?

  • Client Server computing can be divided into three components, a Client process, a server process and a Middleware in between them for their interaction
  • Clint-server computing is merely a transitional phase in the larger trend towards fully distributed computing
  • The Client server environment is typically homogeneous and single-vendor. The hardware flat form and operating
  • Database, transaction servers are more advanced and sophisticated types of servers than disk and file servers

Which topology is best suited for medium sized enterprise.

  • DAS
  • NAS
  • SAN

Which three statements describe differences between Storage Area Network (SAN) and Network Attached Storage (NAS) solutions? Choose three. a. SAN is generally more expensive but provides higher performance b. NAS uses TCP/IP for communication between hosts and the NAS server c. NAS requires additional hardware on a host: a host bus adapter for connectivity d. SAN uses proprietary protocols for communication between hosts and the SAN fabric

  • B,C,A
  • A,D,C
  • B,C,D
  • A, B, D

Identify a network file protocol in the below mentioned set.

  • NAS
  • CIFS
  • SCSI
  • FC

Which storage technology requires downtime to add new hard disk capacity

  • DAS
  • SAN
  • UDP
  • NAS

Effective Storage management includes

  • Securities, Backups, Reporting
  • Reporting
  • Backups
  • Securities

This is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.

  • Data Center
  • Fabric
  • Storage lab
  • Data warehouse

Which of the following isn’t a characteristic of High level languages?

  • user-friendly
  • platform independent
  • machine code
  • interactive execution

Which one of the following computer network is built on the top of another network?

  • overlay network
  • prior network
  • prime network
  • chief network

Animations and interactivity with user on web pages can be done by:

  • Visual Basic
  • Visual C#
  • Java script
  • PHP

Which of the following is not a likely configuration of a Client-Server System?

  • Multiple Clients- Multiple Servers System
  • Single Client- Multiple Server System
  • Multiple Clients- Single Server System
  • Single Client- Single Server

In the Client-Server architecture, the component that processes the request and sends the response is

  • Client
  • Protocol
  • Network
  • Server

JVM stands for?

  • Java virtual machine
  • Java visual machine
  • JRE virtual machine
  • JRE visual machine

Select the correct option regarding tape drive

  • select
  • Tape drives have fast average seek times
  • Tape drives can stream data at a very fast rate
  • Tape drives can be used t store data on optical disks
  • Archival life of data stored on tape is around 5 years

Which of the following is not a non volatile storage device?

  • Hard Disk
  • Memory Stick
  • Random Access Memory
  • NVRAM

URL means ________.

  • Term used to connect websites.
  • Term used to get online program
  • Term used to describe Website
  • Address of the resource on the web

What do you call a specific instruction designed to do a task?

  • Process
  • Task
  • Instruction
  • Command

Which of the following is sequential access storage device?

  • CD-ROM
  • Hard Disk
  • Tape Cartridge
  • Main Memory

NetBEUI is an enhanced version of ------ Protocol

  • NetBIOS
  • SPX
  • IPX
  • TCP/IP

What is the most basic level of storage?

  • NAS
  • DAS
  • SAN
  • ISCSI

Which of the following is correct about SOAP?

  • SOAP is complicated in terms of algorithm.
  • SOAP is language independent, simple and extensible.
  • SOAP is simple and extensible.
  • SOAP is language independent.

FORTRAN stands for:

  • For Translation
  • Formal Translator
  • Formula Translator
  • For Editing

Translator which converts high-level language programs into machine language program is called

  • attempter
  • compiler
  • assembler
  • debugger

What does a VLAN do?

  • Breaks up broadcast domains in a layer 2 switch internetwork
  • Provides multiple collision domains on one switch port
  • Provides multiple broadcast domains within a single collision domain
  • Acts as the fastest port to all servers

What SOAP stands for?

  • State Access Object Protocol
  • Simple Access Object Protocol
  • Simple Allied Object Protocol
  • State Allied Object Protocol

A client device designed so that most processing and data storage occurs on the client side describes

  • Thin Client
  • Active Client
  • Application Client
  • Fat Client

Pick odd one out

  • Error-correction
  • Fault tolerance
  • Striping
  • Mirroring

For long term storage (archival) of data which of the following storage devices is generally used: Select one: a.

  • Floppy Disk
  • Tape Cartridges
  • CD Rom
  • Hard Disk

Identify the tasks involved in Storage Capacity management.

  • Monitoring trends for each resource
  • Identifying storage systems are approaching full capacity, monitoring trends for each resource and tracking total capacity, total used, total available
  • Identifying storage systems are approaching full capacity.
  • Tracking Total capacity, total used, total available

Which of the following is not a way of acquiring software?

  • Duplicating the software
  • Downloading public-domain Software
  • Buying pre-written software
  • Ordering customized software

Executables might be called ________

  • machine code
  • executable code
  • native code
  • complex code

Which of the following component of Web service describes interfaces to web services?

  • SOAP
  • ADSL
  • UDDI
  • WSDL

They normally interact with the system via user interface provided by the application software.

  • Users
  • Programmers
  • Testers
  • Developers

Which of the following layer in Web Service Protocol Stack is responsible for describing the public interface to a specific web service?

  • Service Description
  • Service Discovery
  • Service Transport
  • XML Messaging

Which one of the following extends a private network across public networks? [2]

  • Both IP address of Server & Port number
  • IP address of Server
  • Client Server
  • Port number

I/O requests to disk storage on a SAN are called

  • Disk I/Os
  • File I/Os
  • Block I/Os
  • SAN I/Os

What protocol is used to find the hardware address of a local device?

  • ICMP
  • RARP
  • ARP
  • IP

How response is sent in XML-RPC?

  • XML responses are appended to the url of the HTTP response.
  • XML responses are separated from the body of the HTTP response
  • XML responses are appended and embedded both to the url and body of the HTTP response
  • XML responses are embedded in the body of the HTTP response.

This is the practice of collecting computer files that have been packaged together for backup, to transport to some other location, for saving away from the computer so that more hard disks can be made available, or for some other purpose.

  • Backup
  • Archive
  • Migration
  • Compression

Two devices are in network if:

  • a process is running on both devices
  • a process is internally oriented
  • PIDs of the processes running of different devices are same
  • a process in one device is able to exchange information with a process in another device

A program that can execute high-level language programs.

  • Interpreter
  • Circuitry
  • Sensor
  • Compiler

This is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network.

  • Data mining
  • Storage assignment
  • Storage Provisioning
  • Data Warehousing

Language in which single statements can be written to accomplish substantial tasks is termed as

  • medium language
  • machine language
  • high level language
  • assembly language

Nested RAID provides better performance characteristics than the RAID levels that comprise them (true/false)

  • False
  • True

Which of the following statements about various hard disks is wrong?

  • Hard disks are fragile to security attacks.
  • ATA hard disks cannot be connected externally to computer
  • USB Hard disks store data on flash memory
  • SATA Disks support faster transfer rates and have support for hot swapping

Which of the following provides byte level striping?

  • RAID 2
  • RAID 5
  • RAID 4
  • RAID 6

Source program is compiled to an intermediate form called ___________

  • Machine code
  • Smart code
  • Executable code
  • Byte Code

Assembly Language requires less memory and execution time.

  • True
  • False

A __________ is a device that forwards packets between networks by processing the routing information included in the packet.

  • router
  • bridge
  • firewall
  • bridge, firewall and router

What HTTP stands for?

  • Hyper Text Transfer Protocol
  • Hyper Time Transfer Protocol
  • Hyper Transfer Text Protocol
  • Hyperlink Text Transfer Protocol

How do Storage administrators ensure secure access to storage devices:

  • By using Zoning, putting a physical lock on the storage device and keeping devices shutdown when not in use.
  • By putting a physical lock on the storage device
  • By using Zoning
  • By keeping devices shutdown when not in use

Each personal computer has a _________ that manages the computer’s arithmetical, logical and control activities.

  • Interpreter
  • Assembler
  • Microprocessor
  • Microcontroller

Which of the following does not refer to middleware?

  • COM
  • JAVA
  • C
  • (e) JAVA and C
  • DCOM

Which of the following is correct about SOAP? [2]

  • SOAP is a communication protocol.
  • SOAP is an XML-based protocol for exchanging information between computers, communication protocol and communication between applications.
  • SOAP is for communication between applications.
  • SOAP is an XML-based protocol for exchanging information between computers.

Programming language which sometimes called 'write once, run any where is

  • Pascal
  • Basic
  • Ada
  • Java

In SAN storage model, the operating system view storage resources as —— devices

  • FC
  • UDP
  • SAN
  • SCSI

The instructions that tell the assembler what to do.

  • Executable instructions
  • Logical instructions
  • Pseudo-ops
  • Macros

RAID Level 7 does Asynchronous cached striping with dedicated parity.

  • FALSE
  • TRUE

The execution of the functions on a single server or across servers on the network is called:

  • TP- Lite
  • TP Monitor
  • TP-Heavy
  • ORB

Language in which single statements can be written to accomplish substantial task is named as:

  • high level language
  • machine language
  • medium language
  • assembly language

Higher-order functions are not built into the

  • structural language
  • object oriented programming
  • JAVA
  • C++

Which of the Following is not an off-line storage device?

  • Tape Library
  • Flash Memory
  • CD-ROM
  • Tape Cartridge

The URL Connection class can be used to read and write data to the specified resource referred by the URL.

  • True
  • False

The execution of the functions on a single server or across servers on the network is called: [2]

  • All are roll backed regardless of whether they issue any one
  • All are roll backed if they issue rollback
  • Some are committed and some are roll backed
  • All are committed if they issue commit

Which of the following Company manufactures RAID devices?

  • Quantum
  • Falconstor
  • Qlogic
  • LSI

________ programs are automatically loaded and operates as a part of browser.

  • Add-ons
  • Utilities
  • Plug-ins
  • Widgets

FORTRAN was developed by

  • Macintosh
  • Microsoft
  • Oracle
  • IBM
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Object Oriented Programming Laboratory

Mobile Programming

Network Security

Management Information Systems

Managing Information and Technology

Mobile Application Design and Development

Mobile Application Design and Development 2

Living in the Information Technology Era

Mail and Web Services

Information Technology Practicum

Information Technology Capstone Project

Introduction to Computing

Intro to Hardware Description Language

Introduction to Human Computer

Introduction to Information Systems

Introduction to Multimedia

Integrative Programming and Technology 2

Internet Marketing and Entrepreneurship

Internet Technology in Real Estate

Information Assurance and Security 2

Information Assurance and Security 3

Information Security and Management

Information Systems Operations and Maintenance

Fundamentals of Investigation and Intelligence

Fundamentals of Database System

Digital Imaging

Data Communications and Networking 2

Cyber Security: Theories and Practice

Data Communications and Networking

Data Structures and Algorithms

Database Management System

Chemistry for Engineers

Computer Fundamentals

Load Testing

3D Game Art Development

Animation Project

Auditing and Assurance Concepts and Applications

Current Trends and Issues

Applied Business Tools and Technologies

System Administration and Maintenance

Software Engineering

Computer Programming

Linux Administration

Data Communications and Networking 4

Application Lifecycle Management

Principles of Operating System and its Application

Systems Integration and Architecture

Data Communications and Networking 3

Information Assurance and Security


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box