0

Current Trends and Technologies

Description: Current trends and technologies Current Trends and TechnologiesComputer Network
Number of Questions: 25
Created by:
Tags: Current trends and technologies Current Trends and Technologies Computer Network
Attempted 0/25 Correct 0 Score 0

Which of the following technologies is a public domain message passing system available on many multi-computers?

  1. Sub networking technology

  2. Simple networking

  3. Parallel virtual machine

  4. Separated networking

  5. Gateway


Correct Option: C
Explanation:

This technology is a public domain message passing system available on many multi-computers.

Which of the following technologies provides a highly virtualised cloud data centre located inside the company's firewall?

  1. Public cloud

  2. Private cloud

  3. System integrator

  4. Client server computing

  5. Sub networking technology


Correct Option: B
Explanation:

This technology provides a highly virtualised cloud data center located inside the company's firewall.

Which of the following is a formal standard with a standardisation committee and an official document?

  1. MPI

  2. HTTP

  3. FTP

  4. TCP

  5. SMTP


Correct Option: A
Explanation:

This is a formal standard with a standardisation committee and an official defining document.

Which of the following techniques is the fourth basic concept in message passing interface in which the processes can be arranged in a tree, ring, grid etc?

  1. Gateway

  2. Caching

  3. Stratification

  4. Virtual topology

  5. Simple networking


Correct Option: D
Explanation:

This technique is the fourth basic concept in message passing interface in which the processes can be arranged in a tree, ring, grid etc.

Which of the following technologies abstracts compute capacity from the server hardware to create a virtual pool of resources?

  1. Peer to peer computing

  2. Client server computing

  3. Gateway

  4. Sub networking technology

  5. VMware vSphere


Correct Option: E
Explanation:

This technology abstracts compute capacity from the server hardware to create virtual pool of resources.

Which of the following technologies does not deal with process creation or management as a parallel virtual machine does?

  1. Virtual machine technology

  2. MPI-1

  3. Net flow

  4. Distributed computing

  5. Java IDL


Correct Option: B
Explanation:

This technology does not deal with the process creation or management as parallel virtual machine.

Which of the following technologies abstracts the network into a generalised pool of network capacity?

  1. Network virtualisation

  2. Sub networking technology

  3. Separated networking

  4. Router

  5. Collaborative computing


Correct Option: A
Explanation:

This technology abstracts the network into a generalised pool of network capacity.

Which of the following technologies includes a set of 57 instructions resulting in increasing multimedia capabilities of a computer chip?

  1. CORBA

  2. AWT

  3. Shared networking

  4. MMX

  5. Virtual machine technology


Correct Option: D
Explanation:

This technology includes a set of 57 instructions resulting in increasing multimedia capabilities of a computer chip.

Which of the following technologies is used to increase compute utilisation by pooling compute clusters?

  1. Sub networking technology

  2. Single networking

  3. VMware network virtualisation

  4. Client server computing

  5. Local bridge


Correct Option: C
Explanation:

This technology is used to increase compute utilisation by pooling compute clusters.

Which of the following technologies is used when public cloud provider forms a partnership with a vendor that provides private cloud platform?

  1. Hybrid cloud

  2. Public cloud

  3. System integrator

  4. Distributed computing

  5. Sub networking technology


Correct Option: A
Explanation:

This technology is used when public cloud provider forms a partnership with a vendor that provides private cloud platforms.

Which of the following technical processes enables one instruction to perform same function on multiple pieces of data, reducing number of loops required to handle videos?

  1. Process monitor

  2. System monitor

  3. SIMD

  4. RMI

  5. Caching


Correct Option: C
Explanation:

This technical process enables one instruction to perform same function on multiple pieces of data, reducing number of loops required to handle vides.

Which of the following technologies provides multiple features, such as port mirroring, net flow, IPFIX etc. to provide a comprehensive toolkit for traffic management and monitoring with a virtual network?

  1. Public cloud

  2. Indirect networking

  3. Sub networking technology

  4. Peer to peer computing

  5. vSphere distributed switch


Correct Option: E
Explanation:

This technology provides a multiple features, such as port mirroring, net flow, IPFIX etc. to provide a comprehensive toolkit for traffic management and monitoring with a virtual network.

Which of the following technologies deployed in a virtual appliance form factor, supports full active standby HA functionality and can support up to 9 GBps of traffic?

  1. Sub networking technology

  2. Shared networking

  3. vCloud networking and security edge

  4. Java IDL

  5. Collaborative computing


Correct Option: C
Explanation:

This technology is deployed in a virtual appliance form factor, supports full active standby HA functionality and can support up to 9 CBps of traffic.

Which of the following technologies provides the features, such as dynamic processes, remote memory access, non blocking collective communication etc?

  1. MPI-2

  2. VMT

  3. Collaborative computing

  4. CORBA

  5. Java IDL


Correct Option: A
Explanation:

This technology provides features such as dynamic processes, remote memory access, non blocking collective communication etc.

Which of the following technologies is used to create a flexible logical layer 2 overlay network over the existing IP networks?

  1. Sub networking technology

  2. Simple networking

  3. Client server computing

  4. Force.com

  5. VMware vSphere logical network


Correct Option: E
Explanation:

This technology is used to create a flexible logical layer 2 overlay network over the existing IP networks.

Which of the following techniques simulates shared memory at the page level, making it similar to a NUMA machine, except with a much greater penalty for remote references?

  1. Distributed service support

  2. Access control

  3. Database buffer cache

  4. Page based DSM

  5. Distributive computing


Correct Option: D
Explanation:

This technique simulates shared memory at the page level, making it similar to a NUMA machine, except with a much greater penalty for remote references.

Which of the following technologies introduced k6 chips, feature MMX technology and provides potential power of personal computer?

  1. Device monitoring

  2. Advanced micro device

  3. Net flow

  4. Virtual machine technology

  5. Client server computing


Correct Option: B
Explanation:

This technology introduced k6 chips, feature MMX technology and provides potential power of personal computer.

Which of the following technologies is installed from an open virtualisation appliance file, as a virtual machine, by using VMware vSphere client?

  1. vCloud networking and security manager

  2. Sub networking technology

  3. Private networking

  4. Technical account manager

  5. Process monitor


Correct Option: A
Explanation:

This technology is installed from an open virtualisation appliance file, as a virtual machine, by using VMware vSphere client.

In which of the following processes, the old base station drops the telephone before the new base station acquires the telephone?

  1. Device monitoring

  2. Flow analysis

  3. Hard handoff

  4. Tropospheric reflection

  5. Process monitor


Correct Option: C
Explanation:

In this process, the old base station drops the telephone before the new base station acquires the telephone.

Which of the following technologies can be used as a kind of electronic wallet, authorising payments in stores, as a replacement for cash and credit cards?

  1. Virtual machine technology

  2. Public cloud

  3. AWT

  4. MTSO

  5. Wireless PDA


Correct Option: E
Explanation:

This technology can be used as a kind of electronic wallet, authorising payments in store as a replacement for cash and credit.

Which of the following technological components uses vCloud networking and security manager in the back end to provision network virtualisation elements?

  1. Virtual machine technology

  2. Intra-VXLAN packet flow

  3. Technical account manager

  4. vCloud director

  5. System monitor


Correct Option: D
Explanation:

This technological component uses vCloud networking and security manager in the back end to provision network virtualisation elements.

Which of the following techniques represents two virtual machines on two different logical L2 networks?

  1. Intra-VXLAN packet flow

  2. Inter-VXLAN packet flow

  3. Flow analysis

  4. Net flow

  5. Lattice flow


Correct Option: B
Explanation:

This technique represents two virtual machines on two different logical L2 networks.

Which of the following channels is a continuous stream of output from the base station containing the base station identity and the channel status?

  1. Broadcast control channel

  2. TCH/F

  3. Frequency correction channel

  4. Synchronisation channel

  5. RACH/F


Correct Option: A
Explanation:

This channel is a continuous stream of output from the base station containing the base station's identity and the channel status.

Which of the following protocols acts as a control plane that helps build the forwarding table with virtual machine MAC address and VTEP IP address mapping?

  1. User datagram protocol

  2. File transfer protocol

  3. IP Multicast protocol

  4. Simple mail transfer protocol

  5. SNMP


Correct Option: C
Explanation:

This protocol acts as a control plane that helps build the forwarding table with virtual machine MAC address and VTEP IP address mapping.

Which of the following channels is used for location updating, registration, call setup and is used to send the information about maintaining the base station?

  1. Synchronisation channel

  2. Dedicated control channel

  3. Frequency correction channel

  4. Random access channel

  5. TCH/F


Correct Option: B
Explanation:

This channel is used for location updating, registration call setup and is used to send the information about maintaining the base station.

- Hide questions