Which ERP deployment method involves using the Internet to access software applications provided by third-party vendors?
- Cloud-Based Deployment
- Hybrid Deployment
- On-Premises Deployment
- Open-Source Deployment
'Cloud-Based Deployment' in ERP involves using the Internet to access software applications hosted by third-party vendors. This method offers scalability, cost-efficiency, and flexibility in comparison to traditional on-premises deployments.
What is the key difference between Type 1 (bare-metal) and Type 2 (hosted) hypervisors?
- Type 1 hypervisors are easier to install than Type 2 hypervisors.
- Type 1 hypervisors are more expensive than Type 2 hypervisors.
- Type 1 hypervisors are used for gaming, while Type 2 hypervisors are used for server virtualization.
- Type 1 hypervisors run directly on the physical hardware, while Type 2 hypervisors run on top of a host operating system.
The key difference is that 'Type 1 hypervisors' run directly on the physical hardware (bare-metal), while 'Type 2 hypervisors' run on top of a host operating system. Type 1 offers better performance and isolation.
A digital _______ is a cryptographic equivalent of a handwritten signature or stamped seal, but much more secure.
- Certificate
- Firewall
- Hash
- Key
The blank should be filled with "Certificate." A digital certificate serves as a cryptographic equivalent of a traditional signature or seal, offering a secure means of verifying the identity and authenticity of a user or entity.
_______ is the process of distributing data across multiple disks to enhance performance and fault tolerance.
- API
- BIOS
- HTTP
- RAID
'RAID' stands for Redundant Array of Independent Disks. It's a technology used to distribute and replicate data across multiple disks for performance and fault tolerance improvement.
Which cryptographic method involves converting plain text into a scrambled format using a key?
- Deciphering
- Decryption
- Encoding
- Encryption
'Encryption' is a cryptographic process that involves converting plain text into a scrambled format (cipher text) using a specific key. This is used to protect data from unauthorized access.
A _______ is a consolidated network infrastructure in the cloud that replicates an on-premises network.
- Cloud Network
- Data Center
- Virtual Machine
- Virtual Private Network (VPN)
In cloud computing, a 'Cloud Network' refers to a consolidated network infrastructure in the cloud that replicates an on-premises network. It allows organizations to create virtualized network environments in the cloud.
A software engineering practice where production defects are immediately corrected without going through the standard incident management flow is termed _______.
- Agile Development
- Continuous Delivery
- Firefighting
- Zero Defect Approach
This practice is often referred to as the "Zero Defect Approach" or "Zero Bug Bounce." It emphasizes fixing production defects promptly without following the standard incident management process.
You are designing a new computer system that requires very fast temporary storage to hold data between the CPU and main memory. Which type of memory would be most appropriate?
- Cache Memory
- Hard Disk Drive (HDD)
- Optical Drive
- USB Flash Drive
The most appropriate choice for fast temporary storage between the CPU and main memory is 'Cache Memory.' It is a high-speed, volatile memory that reduces latency in data access, improving system performance.
An organization is deploying a secure system where users must prove their identity without revealing any other unnecessary information. Which cryptographic concept allows for this selective disclosure of information?
- Biometric Authentication
- Public Key Infrastructure (PKI)
- Two-Factor Authentication
- Zero-Knowledge Proofs
The cryptographic concept that allows for selective disclosure of information without revealing unnecessary details is 'Zero-Knowledge Proofs.' In this technique, a prover can demonstrate knowledge of a secret without revealing the secret itself, ensuring privacy and security.
Which programming construct allows the execution of a block of code multiple times based on a condition?
- Array
- Function
- Loop
- Pointer
In programming, a 'loop' is a control structure that allows you to execute a block of code repeatedly as long as a certain condition is met. This is commonly used for repetitive tasks in coding.