云服务案例分析小测答案

简介: 本文分享云服务案例分析的小测答案。

Quiz1

1.In IT service management, what is NOT the benefit in use of processes?
a. measurable
b. simplifiable
c. auditable
d. contract compliant

2.Why we have to study services?
a. Service regulates professional activities
b. Service is simple
c. Service resolves technical problems
d. Service equals profits

3.In comparing with Computer Science, Software Engineering is concerning with \_
a. building data structures
b. establishing computing theory
c. delivering useful software
d. applying efficient algorithms

4.In comparing with IT Management, IT SERVICE management is focusing on \_.
a. Centralized behaviors
b. Process orientation
c. Once a time missions
d. Isolated procedures

5.In Service Sciences, Management, and Engineering (SSME), service innovation does NOT include:
a. Technology Innovation
b. Business Innovation
c. Manufacture Innovation
d. Demand Innovation

6.What is NOT the criterion for effective Services Management?
a. Scalability requirements of the world’s most demanding service infrastructures
b. Flexibility and modularity to adapt for business, organizational and technology convergence
c. Security to ensure information transformation correctly
d. Automation of processes and workflows fundamental to service delivery

7.From the customer perspective, Software as a Service means \_.
a. Software is commercially available with minor configuration options
b. Internet accessed services available (near) real-time access of resources after purchase
c. The centralized hosting obviates the need for downloadable patches and upgrades and enables continuous improvements
d. The hosting provider assumes responsibility for the solution

8.To increase corporate profits,the service path is \_.
a. Focusing on team building
b. Extending worker’s working hours
c. Meeting customer requirement
d. Doubling worker’s salary

9.Which one of the following statements may NOT be true?
a. Service Engineering is a multi-disciplinary field
b. In manufactures model the product design comes after process design
c. IT Service Architecture can be viewed from various perspectives.
d. Sometimes the services engineering model works but has limitations due to human judgment is required

10.Which one of the following statements may NOT be true?
a. Science is a way to create knowledge.
b. In interpretive model the improvements come from changes to design or process.
c. Engineering is a way to apply knowledge and create new value.
d. Management improves the process of creating and capturing value.

答案:

1 2 3 4 5 6 7 8 9 10
B B C B A C B C B B

Quiz2

1.The graphical user interface (GUI) is managed by ( )
a. computer hardware
b. computer operating systems
c. computer application software
d. computer input/output devices

2.The computer application software ( ).
a. provides tools for writing computer programs using different programming languages
b. provides tools for writing computer programs using different programming languages
c. manages the computer hardware and the computer system
d. facilitates the input and output devices in a computer system

3.The main functions of Internet may NOT include__.
a. Announcement
b. Encryption
c. News
d. Emails

4.In comparing with Hard Disks, the Solid State Disks (SSD) can ( ).
a. Offer lower cost per megabyte of storage
b. Provide faster access time
c. Depend on a read/write interface synchronizing with a data sector
d. Increase the number of servers needed

5.Which one is NOT characterized as the type of data storage?
a. Volatility of Information
b. Stability of media over time
c. Security of information
d. Ability to change information

6.Data deduplication is an important new technology to control data ( ). The average disk volume contains thousands or even millions of duplicate data objects. As data is created, distributed, backed up, and archived, duplicate data objects are stored unabated across all storage tiers. The end result is inefficient utilization of data storage resources. By eliminating ( ) data objects and referencing just the original object, an immediate benefit is obtained through storage space ( ).
a. storage/useless/reduction
b. proliferation/redundant/efficiencies
c. space/extra/optimization
d. flow/more/saving

7.The common computer platforms do NOT include ( )
a. computer’s architecture
b. operating system
c. programming languages
d. relational database

8.What is the Data Storage Virtualization?
a. A method of combining the available storage resources in a network by splitting up the available bandwidth into channels, each of which can be assigned (or reassigned) to a particular server or device in real time.
b. The masking of server resources (including the number and identity of individual physical servers, processors, and operating systems) from server and storage users.
c. A technique for hiding the physical characteristics of computing resources from the way in which other storage systems, applications, or end users interact with those resources.
d. The pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.

9.Which one of the following statements is NOT correct?
a. A local area network (L AN) is a network of computers close together.
b. Router computers act as receive-and -forward devices; they do not retain information about the packets that they handle.
c. Independent networks should require internal changes to be connected to the network.
d. The Web is more a way of thinking about and organizing information storage and retrieval than it is a specific technology.

10.Microservices may NOT have some characteristics,such as
a. Services in a microservice architecture (MSA) are often processes that communicate over a network to fulfil a goal using technology-agnostic protocols such as HTTP.
b. Services are organized around business capabilities.
c. Services cannot be implemented using different programming languages, databases, hardware and software environment, depending on what fits best.
d. Services are small in size, messaging-enabled, bounded by contexts, autonomously developed, independently deployable, decentralized and built and released with automated processes.

答案:

1 2 3 4 5 6 7 8 9 10
B B B B C B D D C C

Quiz3

1.An IT Architect is ( ).
a. a result seeker
b. a project manager
c. a product expert
d. a lone scientist

2.Which of the followings may NOT be correct?
a. Regulations and governance are means to assuring some acceptable level of quality-of-service
b. Information systems allow separation of production and consumption of services
c. The world is becoming networked, dependent on information and information technology
d. Non Function Requirement is less useful to cloud system design

3.Which one of the following activities is in the lower end of profit chain for IT industry?
a. manufacture a complicate device
b. build up a team to implement a technical consultation assignment
c. broadcast a product news to media
d. send emails to customers for an important product announcement

4.To create a component model by applying patterns for e-Business, which one of the following statements could be incorrect ?
a. Model represents the application object that implements the application data and business logic. b. Back-end system is responsible for the business processes beyond the commerce processes
c. Controller is responsible for formatting the application results and dynamic page construction
d. Database stores information about the commerce application

5.Which one of the following statements may NOT be true?
a. e-Business Solutions present unique challenges such as adapt to rapidly changing technologies and dramatically smaller product cycles.
b. Patterns for e-Business are proven and repeatable architectural constructs that occur across many engagements.
c. Patterns for e-business apply in the later stages of the lifecycle, when business processes are being analyzed and architectural level decisions are being made.
d. Fitting a pre-cut suit is much cheaper than creating one from scratch.

6.Which one of the following statements may NOT be true?
a. Architecting deals almost entirely with measurables using analytic tools derived from mathematics and the hard sciences.
b. The IT Architect may be involved during the construction of a solution as an advocate for the client.
c. A Pattern is a prescriptive technology specification that describes the development, deployment, and operations environment of a class of computer applications.
d. The Operational Model is a representation of a network of computer systems.

7.What may not be the objects of Business Pattern in Patterns for e-business?
a. Identify generalized aspects of business process interactions
b. Provide a non-technical view for not just the IT organization
c. Describe Interactions between the primary Business Actors
d. Describe a specific business process

8.In Patterns for e-business, the Composite pattern means ( ).
a. When a group of Business and Integration patterns have been combined to address a specific set of business process requirements.
b. When the applications need to be accessible via multiple device types, including rich clients, browsers, voice response units, mobile devices, and PDAs.
c. When there is a need to describe the consideration on Performance, Capacity, Scalability, and Availability.
d. When a particular group of Business and Integration patterns become a frequent occurrence.

9.Which one of the following statements may NOT be true?
a. Reuse of architectural knowledge and work products is not an important aspect of design approach.
b. This Systems Management discipline is particularly important in the Web environment as the potential impact of poor performance is that much greater.
c. Architectural Decisions depend on what is being architected, and in what context.
d. Great architects go beyond the role of intermediary to make a visionary combination of technology and purpose that exceeds the expectation of the builder or client.

10.What is not the benefit for Ford to use e-Business Patterns?
a. Save money as multiple development environments cost more money
b. Rapid mapping from business requirements to application and infrastructure designs
c. Standard reusable building blocks selected and aggregated in Patterns grouped by layers
d. IBM won hardware standard for all platforms

答案:

1 2 3 4 5 6 7 8 9 10
A D A C C A D D A D

Quiz4

1.For the dimensions of big data growth, Veracity means ( ).
a. Streaming data, milliseconds to seconds to respond
b. Uncertainty from inconsistency ambiguities
c. Terabytes to exabytes of existing data to process
d. Structured, unstructured, text, multimedia

2.The common types of RFID working model do NOT include ( ).
a. idle
b. active
c. semipassive
d. passive

3.Which one of the following statements is NOT correct?
a. Big Data means unstructured Data.
b. Big Data is a new basis of competitive advantage for enterprises.
c. Data generated from IoT will grow exponentially as the number of connected nodes increases.
d. Big Data is similar to small data, but bigger in size.

4.What may NOT be the Big Data growth drivers?
a. Both mega-IT-vendors and pure-play Big Data vendors took steps to better articulate their product & services roadmaps and larger visions for Big Data in the enterprise, creating greater confidence from enterprise buyers.
b. Continued “Big Data Washing” by legacy IT vendors leading to confusion among enterprise buyers and practitioners, as well as “political” factors that make it difficult for enterprise buyers to engage new vendors.
c. Big Data technologies took important steps towards greater enterprise-grade capabilities, critical for mass enterprise adoption. These steps included better privacy, security and governance capabilities, as well as improved backup & recovery and high-availability for Hadoop specifically.
d. Partnerships played an important role in maturing the Big Data landscape. Of particular importance are a number of reseller agreements and technical partnerships between Big Data vendors and non-Big Data vendors, the results of which that make it easier for practitioners to adopt and integrate Big Data technologies.

5.Which one of the following statements may NOT be correct?
a. Big data is just a technology—it is not a business strategy for capitalizing on information resources
b. Organizations are using big data to target customer-centric outcomes, tap into internal data and build a better information ecosystem
c. Fast forward to the present and technologies like Hadoop give you the scale and flexibility to store data before you know how you are going to process it
d. Technologies such as MapReduce, Hive and Impala enable you to run queries without changing the data structures underneath

6.Which may NOT be the direct impact on IT industry by Big Data?
a. Data storage has grown significantly, shifting market from analog to digital
b. Computation Capability is demanding to process huge amount of data with various formats
c. New business insights are generated from combining and analyzing data types in new ways
d. The foundation is built for future requirements by expanding into big data platform

7.What could be the main benefit of using Big Data on Security/Intelligence Extension?
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
b. Track persons of interest (drug/sex traffickers, terrorists, illegal refugees/immigrants) and civil/border activity
c. Find, Visualize & Understand all big data to improve business knowledge
d. Log analytics, energy bill forecasting, energy consumption optimization, anomalous energy usage detection, presence-aware energy management

8.What is NOT the feature of Hadoop?
a. Hadoop is an open source software project.
b. Hadoop is relying on high-end hardware.
c. Hadoop is designed to scale up from a single server to thousands of machines, with very high degree of fault tolerance.
d. Hadoop enables distributed processing of large data sets across clusters.

9.Which one of the following statements may NOT be corret?
a. Hadoop is designed to work best with a modest number of extremely large files.
b. Every data block stored in HDFS has its own metadata and needs to be tracked by a central server.
c. Because of data locality principle, using a storage area network in a Hadoop environment is recommended.
d. All hadoop commands are invoked by the bin/hadoop script.

10.Which one of the following statements may NOT be correct?
a. Spark is an implementation of Resilient Distributed Dataset (RDD) in Scala
b. In spark, MapReduce data flow can be expressed using RDD transformations
c. Spark Streaming extends the core API to allow high-throughput, fault-tolerant stream processing of live data streams
d. Spark cannot persist or cache a dataset in memory across operations

答案:

1 2 3 4 5 6 7 8 9 10
B A A B A C B B C D

Quiz5

1.What’s the significant problem with traditional business networks?
a. Every participant has a separate copy of the ledger and updates it for their transactions
b. There are several contracts involved
c. The participants in a network can never be known
d. No one person can oversee the entire network

2.In the Bitcoin network, everyone knows who is participating.
a. Possible
b. True
c. False
d. Nonsense

3.What is the core requirement for a business blockchain?
a. Technical services, business services and solution
b. Shared ledger, smart contract, privacy and trust
c. A new cryptocurrency
d. Optimized cryptographic mining

4.How can a blockchain business network help the diamond wholesale and retail industry?
a. Can use cognitive tools to analyze customer preferences
b. Can prevent the injection of illicit diamonds in the supply chain
c. Can cut diamonds for studying more thoroughly
d. Can trace diamond history

5.Which of the following statements is false?
a. Blockchain provides a smart contract feature that can be used to model assets of any description
b. Blockchain adds a cognitive analytics capability to the asset supply chain
c. Blockchain captures a record of every committed transaction in chronological order
d. Blockchain can help provide provenance for an asset

6.What is the appropriate use of business blockchain?
a. A more efficient transaction processing system across a business network
b. To make low value, high volume micro payment systems more efficient
c. Modern, cognitive and transformational fabric for the 21st century and beyond
d. None of these

7.Which one is NOT a key concept of Blockchain?
a. Distributed shared ledger
b. Smart contracts
c. Error sensitiveness
d. Cryptography

8.The components of a VR (Virtual Reality) System do not include ( ).
a. Simulation Processor
b. Accelerating Processor
c. Rendering Processor
d. World Database

9.Augmented reality (AR) is a technology that layers computer-generated enhancements atop an existing reality in order to make it more meaningful through the ability to interact with it.
a. True
b. Possible
c. False
d. Nonsense

10.Comparing real and virtual world, light entering the eyes is the result of natural reflection from all angles.
a. True
b. Possible
c. False
d. Nonsense

答案:

1 2 3 4 5 6 7 8 9 10
A C B D B A C B A C

Quiz6

1.Which of the following statements may NOT be right?
a. Machine learning refers to a system capable of the autonomous acquisition and integration of knowledge
b. Learning is constructing or modifying representations of what is being experienced
c. Machine learning is primarily concerned with the accuracy and effectiveness of the computer system.
d. In Deep Learning approach, each neuron implements a relatively complicated mathematical function.

2.Which one of the following statements is NOT correct?
a. Neural Network needs long time for training.
b. Neural Network has a high tolerance to noisy and incomplete data
c. Neural Network cannot work with data in the range of (0,1) or (-1,1)
d. Neural Network is biologically motivated approach to machine learning

3.Which one of the following statements is NOT correct?
a. In Neural Network Learning, the algorithms iteratively adjust weights to reduce error (difference between network output and target output)
b. In Neural Networks, the destructive algorithms take a maximal network and prunes unnecessary layers nodes and connections during training.
c. In Neural Networks, the results get better with more data + bigger models + more computation
d. In Neural Networks, a neuron performs a generally linear operation on the result

4.IBM Watson is a massively parallel probabilistic evidence-based architecture, using a high-end system of ( ).
a. Intel x86 platform
b. IBM Power7 platform
c. DEC Alpha cluster running under OpenVMS
d. IBM Mainframe platform

5.In cognitive system, the decision making as learning from an expert, excludes
a. Asks natural language question, understands the question
b. Finds documents containing keywords, delivers the documents based on popularity
c. Produces possible answers based on evidence
d. Analyzes evidence, computes confidence, delivers response, evidence and confidence

6.Which one of the following statements is NOT correct?
a. Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works
b. A confidence score is the quantitative value produced by a cognitive system representing the merit of a decision after evaluating multiple options
c. Predictive analytics is a business process and a set of related technologies that are not concerned with the prediction of future possibilities and trends
d. Cognitive systems play the role of an assistant – albeit one who is tireless, can consume vast amounts of structured and unstructured information, can reconcile ambiguous and even self-contradictory data, and can learn

7.Which one of the following statements is NOT correct?
a. Watson can consume insights from Big Data for advanced analysis
b. Natural Language is explicit, little contextual, and often precise
c. Watson uses the Apache Hadoop open framework to distribute the workload for loading information into memory
d. Watson’s APIs are the cognitive building blocks that harness data

8.What may NOT be the capability of cognitive computing systems?
a. Provide expert assistance by developing deep domain insights and bringing this information to people in a timely, natural and usable way
b. Provide decision-making functionality that is evidence-based and continually evolve based on new information, outcomes and actions
c. Provide professional judgement and services as the replacement of human experts such as medical doctors in hospitals
d. Provide insights that perhaps could not be discovered by even the most brilliant human beings, through vast amounts of information available around the world

9.In comparing with programmable systems, the cognitive system is NOT ( ).
a. Data-Centric
b. Statistical Analysis
c. Scale up / out
d. Automated Systems / workload management

10.What is the third era of computing in IBM’s vision?
a. single-purpose calculation
b. cloud computing
c. cognitive computing
d. programmable systems

答案:

1 2 3 4 5 6 7 8 9 10
D C D B B C B C C C

说明:本文原载于CSDN,由本人搬运至阿里云开发者社区。

相关文章
|
6月前
|
搜索推荐 算法 数据挖掘
十个最全网站营销方法案例分析
本文探讨了10种网站营销策略:SEO优化提升搜索引擎排名;内容营销建立品牌信任;社交媒体营销扩大影响力;搜索引擎广告吸引目标用户;电子邮件营销促进销售;网站设计优化提升用户体验;移动端优化适应移动设备;数据分析驱动策略优化;视频营销吸引关注;合作伙伴营销扩展品牌覆盖。AokSend提供高效验证码发信服务,助力企业营销。选择合适策略,持续优化,以实现最佳营销效果。
|
4月前
|
人工智能
客户在哪儿 AI:如何用最少场次的活动覆盖最多的目标客户
在ToB市场,线下活动是高效获客的关键。面对面交流增进信任,潜在客户集中,直接展示产品能缩短销售路径。然而,高成本和低效活动是挑战。通过分析目标客户历史活动数据,客户在哪儿AI帮助企业精准定位,以最少投入触达最多潜在客户,如仅10场活动即可覆盖44.9%年营收客户。
|
6月前
|
存储 移动开发 运维
某公司案例分析
某全球大型跨国连锁餐厅,在世界上大约拥有3万间门店,分布在全球121个国家和地区。截至目前,中国内地有超过2,900家该餐厅,员工人数超过15万。该连锁餐厅通过外包代维人员运维全国众多的设备及服务。大量的第三方代维人员使运维管理存在很大的系统和操作风险。
41 0
某公司案例分析
|
安全
项目实战典型案例19——临时解决方案和最终解决方案
项目实战典型案例19——临时解决方案和最终解决方案
146 0
【项目实战典型案例】19.临时解决方案和最终解决方案
【项目实战典型案例】19.临时解决方案和最终解决方案
|
数据处理 数据库
ChatGPT学习企业产品、服务内容、往期方案,处理所输入的客户需求,定制化生成解决方案
ChatGPT学习企业产品、服务内容、往期方案,处理所输入的客户需求,定制化生成解决方案
164 0
|
存储 运维 容灾
多云时代的数据管理:多重挑战,一个答案
多云时代的数据管理:多重挑战,一个答案
产品分析:如何给出解决方案?
如何衡量一位产品经理的价值?看他给出的解决方案。
91 0
产品分析:如何给出解决方案?
|
存储 弹性计算 安全
《阿里云代码安全白皮书》5个维度应对3类代码安全问题
在互联网快速发展的时代,代码是企业最核心的资产,代码安全也是企业资产安全最重要部分;为了保护企业代码安全,各公司使出的手段也是五花八门。阿里云云效联合阿里云的代码安全能力从基础安全、备份与恢复、安全与加密、审计与洞察、代码安全检测5个维度,达成「进不来」、「搞不坏」、「译不破」、「带不走」、「赖不掉」的效果。
2509 1
《阿里云代码安全白皮书》5个维度应对3类代码安全问题
|
NoSQL 数据可视化 API
搭建内部系统的好帮手 - Superblocks 深度评测
码匠通过使用 Superblocks 搭建一个内部数据看板为例,带您探究 Superblocks 使用体验如何。
350 0
搭建内部系统的好帮手 - Superblocks 深度评测