当前位置:首页 >课程 >计算机英语

1、Which of the following statement is True about Private Cloud

A.Private clouds cannot support a hybrid cloud model but requires supplementing local infrastructure with computing capacity from an external Public cloud.
B.Private clouds cannot support a hybrid cloud model but requires supplementing local infras

参考答案:请扫码使用小程序查看答案

2、Choose the correct statement about Hybrid Cloud

A.The Research Compute Cloud (RC2) is a Hybrid cloud, built by IBM, that interconnects the computing and IT resources at eight IBM Research Centers scattered throughout the United States, Europe, and Asia.
B.The Research Compute Cloud (RC2) is a pr

参考答案:请扫码使用小程序查看答案

3、Which of the folllowing is not a complementary courses of action for Security implementation?

A.Encryption
B.Decryption
C.Anticipating disasters
D.Restricting access

参考答案:请扫码使用小程序查看答案

4、Which of the following is not a proper way to guard your computer

A.Put a cable lock on the computer.
B.Not to leave passwords nearby in a place accessible by others.
C.Not to etch your driver’s license number or social security number into your equipment.
D.Use very strong password to your computer

参考答案:请扫码使用小程序查看答案

5、Choose all the statements that are correct about Public Cloud

A.A public cloud is built over the Internet
B.It can be accessed by any user who has paid for the service.
C.Public clouds are owned by Internet service providers and are accessible through a subscription.
D.Many public clouds are available, in

参考答案:请扫码使用小程序查看答案

6、Which of the following technologies play instrumental roles in making cloud computing a reality

A.Papid progress in multi-core CPUs memory chips, and disk arrays has made it possible to build faster data centers with huge amounts of storage space.
B.Resource virtualization enables rapid cloud deployment and disaster recovery
C.Service-orien

参考答案:请扫码使用小程序查看答案

7、In Computer Security, which of the following falls into the category of modification of messages

A.Messages are delayed
B.Suppress all messages directed to a particular destination
C.Messages are reordered to produce an unauthorized effect.
D.Some portion of a legitimate message is altered

参考答案:请扫码使用小程序查看答案

8、A computer cluster help to solve complex operations more efficiently with much faster processing speed, better data integrity than a single computer and they cannot be used for mission-critical applications.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

9、Cloud computing is a high-throughput computing (HTC) paradigm whereby the infrastructure provides the services through a large data center or server farms. The cloud computing model enables users to share access to resources from anywhere at any time

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

10、Cloud computing applies a virtual platform with elastic resources put together by on-demand provisioning of hardware, software, and data sets, dynamically.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案