The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.

  • Cloud Bursting
  • Multi-Tenancy
  • Single-Tenancy
  • Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.

The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.

  • Data Aggregation
  • Data Duplication
  • Data Integration
  • Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.

In app development, the method of delivering updates to only a portion of the app's user base to test changes before a full release is known as _______.

  • A/B testing
  • Alpha testing
  • Beta testing
  • Canary testing
A/B testing, or "split testing," is a method where different versions of an application are released to different user groups. It's a technique used to assess the impact of changes before a full release.

An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

When visualizing data with a large number of categories, a _______ chart can help in displaying the data in a compact and organized manner.

  • Bar
  • Line
  • Pie
  • Treemap
For data visualization with many categories, a 'Treemap' chart is useful. It displays hierarchical data in a compact way, with nested rectangles representing different categories.

In object-oriented programming, what concept involves hiding the internal states and requiring all interaction to be performed through well-defined interfaces?

  • Abstraction
  • Encapsulation
  • Inheritance
  • Polymorphism
'Encapsulation' is a key concept in object-oriented programming that involves bundling the internal state and methods into a single unit (a class) and allowing interaction through well-defined interfaces, thus hiding implementation details.

Which ITSM process aims to minimize the negative impact of changes to the IT infrastructure?

  • Asset Management
  • Change Management
  • Incident Management
  • Problem Management
'Change Management' in ITSM focuses on controlling and managing changes to the IT infrastructure. It aims to minimize the negative impact of changes, ensuring that they are planned and implemented effectively.

In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is called _______.

  • Accountability
  • Compliance
  • Equity
  • Transparency
In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is 'equity.' This means that the interests and concerns of all stakeholders are fairly addressed, promoting fairness and inclusivity.

The process of gathering information about a target system to find vulnerabilities that can be exploited is called _______.

  • Debugging
  • Encryption
  • Hacking
  • Scanning
The process of gathering information about a target system to find vulnerabilities is known as 'Scanning.' It's a critical phase in penetration testing and security assessment.