Technical Questions

Q:

Cloud computing uses Server virtualization.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:

Cloud computing :: 


Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet.


 


Server virtualization :


Server virtualization is a virtualization technique that involves partitioning a physical server into a number of small, virtual servers with the help of virtualization software. In server virtualization, each virtual server runs multiple operating system instances at the same time.


cloud-computing_server_virtuaization1532503685.jpg image


 


Server virtualization is more for a good reason. It offers the potential to dramatically save space and improve server efficiency. Vendors are in fierce competition to offer the most advanced tools that they hope will earn them the virtualization crown.


 


Hence, the given statement that 'Cloud computing uses Server virtualization.' is TRUE.


 


 

Report Error

View Answer Workspace Report Error Discuss

37 4800
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4789
Q:

Which of the following is true of VoIP?

A) It uses the public switched telephone network. B) Skype is an example of VoIP software.
C) It uses a slow speed dial-up connection. D) All of the above
 
Answer & Explanation Answer: B) Skype is an example of VoIP software.

Explanation:

VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.

 

Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.

 

Here in the given options, Skype is the only voice service that enables us to talk over internet.

Report Error

View Answer Report Error Discuss

7 4738
Q:

 In a 1:N relationship, the foreign key is placed in:

A) the parent table. B) the child table.
C) either table without specifying parent and child tables. D) either the parent table or the child table.
 
Answer & Explanation Answer: B) the child table.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4735
Q:

Where does the Real mode on the CPU come from?

Answer

The original 8086, which only had 1 MB of memory. This megabyte is split into low memory for IRQ tables, application memory and high memory.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4705
Q:

 A distributed database can use which of the following strategies?

A) Totally centralized one location and accessed by many sites B) Partially or totally replicated across sites
C) Partitioned into segments at different sites D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4671
Q:

 The first step in database development is which of the following?

A) Enterprise data modeling B) Logical database design
C) Physical database design and definition D) Database Implementation
 
Answer & Explanation Answer: A) Enterprise data modeling

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4659
Q:

What is SIM and RIM instructions?

Answer

SIM is Set Interrupt Mask. Used to mask the hardware interrupts.


RIM is Read Interrupt Mask. Used to check whether the interrupt is Masked or not.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

1 4653