A) application virtualization
B) platform as a service (PaaS)
C) infrastructure as a service (IaaS)
D) network functions virtualization (NFV)
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A VPC uses encrypted connections between the users and its server, while a VPN does not use such secure connections.
B) A VPC can be accessed over the Internet, while a VPN cannot be accessed over the Internet.
C) A VPC does not facilitate data storage, while a VPN allows the storage of a user's most important data.
D) A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.
Correct Answer
verified
Multiple Choice
A) install an operating system on the server
B) purchase licenses for software replication
C) transfer data and develop procedures
D) install a database management system
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Google Mail
B) Office 365
C) Salesforce.com
D) Outlook on the PC
Correct Answer
verified
Multiple Choice
A) It is a markup language that fixes several HyperText Markup Language (HTML) deficiencies and is commonly used for program-to-program interaction over the Web.
B) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
C) It is the most common language for defining the structure and layout of Web pages.
D) It is a connection that uses the Internet to create secure point-to-point connections.
Correct Answer
verified
Multiple Choice
A) allocates specific servers to each task
B) offers elasticity in the usage of servers
C) uses the Intranet
D) provides platform as a service (PaaS)
Correct Answer
verified
Multiple Choice
A) The number of servers is fixed and is not made elastic.
B) Idle servers are dynamically reallocated.
C) Data transfer is enabled without dependency on the Internet.
D) Web service standards are not followed, as they are confined within the limits of a company.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) transport driver interface
B) content delivery network
C) indexing service system
D) remote action system
Correct Answer
verified
Multiple Choice
A) private documents
B) most sensitive data
C) public documents
D) all documents
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) client-servers
B) the cloud
C) mainframes
D) scalable computers
Correct Answer
verified
Multiple Choice
A) elastic
B) pooled computer resources
C) used over the internet
D) use of dumb terminals
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 85
Related Exams