云服务案例分析小测答案

简介: 本文分享云服务案例分析的小测答案。

Quiz1

1.In IT service management, what is NOT the benefit in use of processes?
a. measurable
b. simplifiable
c. auditable
d. contract compliant

2.Why we have to study services?
a. Service regulates professional activities
b. Service is simple
c. Service resolves technical problems
d. Service equals profits

3.In comparing with Computer Science, Software Engineering is concerning with \_
a. building data structures
b. establishing computing theory
c. delivering useful software
d. applying efficient algorithms

4.In comparing with IT Management, IT SERVICE management is focusing on \_.
a. Centralized behaviors
b. Process orientation
c. Once a time missions
d. Isolated procedures

5.In Service Sciences, Management, and Engineering (SSME), service innovation does NOT include:
a. Technology Innovation
b. Business Innovation
c. Manufacture Innovation
d. Demand Innovation

6.What is NOT the criterion for effective Services Management?
a. Scalability requirements of the world’s most demanding service infrastructures
b. Flexibility and modularity to adapt for business, organizational and technology convergence
c. Security to ensure information transformation correctly
d. Automation of processes and workflows fundamental to service delivery

7.From the customer perspective, Software as a Service means \_.
a. Software is commercially available with minor configuration options
b. Internet accessed services available (near) real-time access of resources after purchase
c. The centralized hosting obviates the need for downloadable patches and upgrades and enables continuous improvements
d. The hosting provider assumes responsibility for the solution

8.To increase corporate profits,the service path is \_.
a. Focusing on team building
b. Extending worker’s working hours
c. Meeting customer requirement
d. Doubling worker’s salary

9.Which one of the following statements may NOT be true?
a. Service Engineering is a multi-disciplinary field
b. In manufactures model the product design comes after process design
c. IT Service Architecture can be viewed from various perspectives.
d. Sometimes the services engineering model works but has limitations due to human judgment is required

10.Which one of the following statements may NOT be true?
a. Science is a way to create knowledge.
b. In interpretive model the improvements come from changes to design or process.
c. Engineering is a way to apply knowledge and create new value.
d. Management improves the process of creating and capturing value.

答案:

1 2 3 4 5 6 7 8 9 10
B B C B A C B C B B

Quiz2

1.The graphical user interface (GUI) is managed by ( )
a. computer hardware
b. computer operating systems
c. computer application software
d. computer input/output devices

2.The computer application software ( ).
a. provides tools for writing computer programs using different programming languages
b. provides tools for writing computer programs using different programming languages
c. manages the computer hardware and the computer system
d. facilitates the input and output devices in a computer system

3.The main functions of Internet may NOT include__.
a. Announcement
b. Encryption
c. News
d. Emails

4.In comparing with Hard Disks, the Solid State Disks (SSD) can ( ).
a. Offer lower cost per megabyte of storage
b. Provide faster access time
c. Depend on a read/write interface synchronizing with a data sector
d. Increase the number of servers needed

5.Which one is NOT characterized as the type of data storage?
a. Volatility of Information
b. Stability of media over time
c. Security of information
d. Ability to change information

6.Data deduplication is an important new technology to control data ( ). The average disk volume contains thousands or even millions of duplicate data objects. As data is created, distributed, backed up, and archived, duplicate data objects are stored unabated across all storage tiers. The end result is inefficient utilization of data storage resources. By eliminating ( ) data objects and referencing just the original object, an immediate benefit is obtained through storage space ( ).
a. storage/useless/reduction
b. proliferation/redundant/efficiencies
c. space/extra/optimization
d. flow/more/saving

7.The common computer platforms do NOT include ( )
a. computer’s architecture
b. operating system
c. programming languages
d. relational database

8.What is the Data Storage Virtualization?
a. A method of combining the available storage resources in a network by splitting up the available bandwidth into channels, each of which can be assigned (or reassigned) to a particular server or device in real time.
b. The masking of server resources (including the number and identity of individual physical servers, processors, and operating systems) from server and storage users.
c. A technique for hiding the physical characteristics of computing resources from the way in which other storage systems, applications, or end users interact with those resources.
d. The pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.

9.Which one of the following statements is NOT correct?
a. A local area network (L AN) is a network of computers close together.
b. Router computers act as receive-and -forward devices; they do not retain information about the packets that they handle.
c. Independent networks should require internal changes to be connected to the network.
d. The Web is more a way of thinking about and organizing information storage and retrieval than it is a specific technology.

10.Microservices may NOT have some characteristics,such as
a. Services in a microservice architecture (MSA) are often processes that communicate over a network to fulfil a goal using technology-agnostic protocols such as HTTP.
b. Services are organized around business capabilities.
c. Services cannot be implemented using different programming languages, databases, hardware and software environment, depending on what fits best.
d. Services are small in size, messaging-enabled, bounded by contexts, autonomously developed, independently deployable, decentralized and built and released with automated processes.

答案:

1 2 3 4 5 6 7 8 9 10
B B B B C B D D C C

Quiz3

1.An IT Architect is ( ).
a. a result seeker
b. a project manager
c. a product expert
d. a lone scientist

2.Which of the followings may NOT be correct?
a. Regulations and governance are means to assuring some acceptable level of quality-of-service
b. Information systems allow separation of production and consumption of services
c. The world is becoming networked, dependent on information and information technology
d. Non Function Requirement is less useful to cloud system design

3.Which one of the following activities is in the lower end of profit chain for IT industry?
a. manufacture a complicate device
b. build up a team to implement a technical consultation assignment
c. broadcast a product news to media
d. send emails to customers for an important product announcement

4.To create a component model by applying patterns for e-Business, which one of the following statements could be incorrect ?
a. Model represents the application object that implements the application data and business logic. b. Back-end system is responsible for the business processes beyond the commerce processes
c. Controller is responsible for formatting the application results and dynamic page construction
d. Database stores information about the commerce application

5.Which one of the following statements may NOT be true?
a. e-Business Solutions present unique challenges such as adapt to rapidly changing technologies and dramatically smaller product cycles.
b. Patterns for e-Business are proven and repeatable architectural constructs that occur across many engagements.
c. Patterns for e-business apply in the later stages of the lifecycle, when business processes are being analyzed and architectural level decisions are being made.
d. Fitting a pre-cut suit is much cheaper than creating one from scratch.

6.Which one of the following statements may NOT be true?
a. Architecting deals almost entirely with measurables using analytic tools derived from mathematics and the hard sciences.
b. The IT Architect may be involved during the construction of a solution as an advocate for the client.
c. A Pattern is a prescriptive technology specification that describes the development, deployment, and operations environment of a class of computer applications.
d. The Operational Model is a representation of a network of computer systems.

7.What may not be the objects of Business Pattern in Patterns for e-business?
a. Identify generalized aspects of business process interactions
b. Provide a non-technical view for not just the IT organization
c. Describe Interactions between the primary Business Actors
d. Describe a specific business process

8.In Patterns for e-business, the Composite pattern means ( ).
a. When a group of Business and Integration patterns have been combined to address a specific set of business process requirements.
b. When the applications need to be accessible via multiple device types, including rich clients, browsers, voice response units, mobile devices, and PDAs.
c. When there is a need to describe the consideration on Performance, Capacity, Scalability, and Availability.
d. When a particular group of Business and Integration patterns become a frequent occurrence.

9.Which one of the following statements may NOT be true?
a. Reuse of architectural knowledge and work products is not an important aspect of design approach.
b. This Systems Management discipline is particularly important in the Web environment as the potential impact of poor performance is that much greater.
c. Architectural Decisions depend on what is being architected, and in what context.
d. Great architects go beyond the role of intermediary to make a visionary combination of technology and purpose that exceeds the expectation of the builder or client.

10.What is not the benefit for Ford to use e-Business Patterns?
a. Save money as multiple development environments cost more money
b. Rapid mapping from business requirements to application and infrastructure designs
c. Standard reusable building blocks selected and aggregated in Patterns grouped by layers
d. IBM won hardware standard for all platforms

答案:

1 2 3 4 5 6 7 8 9 10
A D A C C A D D A D

Quiz4

1.For the dimensions of big data growth, Veracity means ( ).
a. Streaming data, milliseconds to seconds to respond
b. Uncertainty from inconsistency ambiguities
c. Terabytes to exabytes of existing data to process
d. Structured, unstructured, text, multimedia

2.The common types of RFID working model do NOT include ( ).
a. idle
b. active
c. semipassive
d. passive

3.Which one of the following statements is NOT correct?
a. Big Data means unstructured Data.
b. Big Data is a new basis of competitive advantage for enterprises.
c. Data generated from IoT will grow exponentially as the number of connected nodes increases.
d. Big Data is similar to small data, but bigger in size.

4.What may NOT be the Big Data growth drivers?
a. Both mega-IT-vendors and pure-play Big Data vendors took steps to better articulate their product & services roadmaps and larger visions for Big Data in the enterprise, creating greater confidence from enterprise buyers.
b. Continued “Big Data Washing” by legacy IT vendors leading to confusion among enterprise buyers and practitioners, as well as “political” factors that make it difficult for enterprise buyers to engage new vendors.
c. Big Data technologies took important steps towards greater enterprise-grade capabilities, critical for mass enterprise adoption. These steps included better privacy, security and governance capabilities, as well as improved backup & recovery and high-availability for Hadoop specifically.
d. Partnerships played an important role in maturing the Big Data landscape. Of particular importance are a number of reseller agreements and technical partnerships between Big Data vendors and non-Big Data vendors, the results of which that make it easier for practitioners to adopt and integrate Big Data technologies.

5.Which one of the following statements may NOT be correct?
a. Big data is just a technology—it is not a business strategy for capitalizing on information resources
b. Organizations are using big data to target customer-centric outcomes, tap into internal data and build a better information ecosystem
c. Fast forward to the present and technologies like Hadoop give you the scale and flexibility to store data before you know how you are going to process it
d. Technologies such as MapReduce, Hive and Impala enable you to run queries without changing the data structures underneath

6.Which may NOT be the direct impact on IT industry by Big Data?
a. Data storage has grown significantly, shifting market from analog to digital
b. Computation Capability is demanding to process huge amount of data with various formats
c. New business insights are generated from combining and analyzing data types in new ways
d. The foundation is built for future requirements by expanding into big data platform

7.What could be the main benefit of using Big Data on Security/Intelligence Extension?
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
b. Track persons of interest (drug/sex traffickers, terrorists, illegal refugees/immigrants) and civil/border activity
c. Find, Visualize & Understand all big data to improve business knowledge
d. Log analytics, energy bill forecasting, energy consumption optimization, anomalous energy usage detection, presence-aware energy management

8.What is NOT the feature of Hadoop?
a. Hadoop is an open source software project.
b. Hadoop is relying on high-end hardware.
c. Hadoop is designed to scale up from a single server to thousands of machines, with very high degree of fault tolerance.
d. Hadoop enables distributed processing of large data sets across clusters.

9.Which one of the following statements may NOT be corret?
a. Hadoop is designed to work best with a modest number of extremely large files.
b. Every data block stored in HDFS has its own metadata and needs to be tracked by a central server.
c. Because of data locality principle, using a storage area network in a Hadoop environment is recommended.
d. All hadoop commands are invoked by the bin/hadoop script.

10.Which one of the following statements may NOT be correct?
a. Spark is an implementation of Resilient Distributed Dataset (RDD) in Scala
b. In spark, MapReduce data flow can be expressed using RDD transformations
c. Spark Streaming extends the core API to allow high-throughput, fault-tolerant stream processing of live data streams
d. Spark cannot persist or cache a dataset in memory across operations

答案:

1 2 3 4 5 6 7 8 9 10
B A A B A C B B C D

Quiz5

1.What’s the significant problem with traditional business networks?
a. Every participant has a separate copy of the ledger and updates it for their transactions
b. There are several contracts involved
c. The participants in a network can never be known
d. No one person can oversee the entire network

2.In the Bitcoin network, everyone knows who is participating.
a. Possible
b. True
c. False
d. Nonsense

3.What is the core requirement for a business blockchain?
a. Technical services, business services and solution
b. Shared ledger, smart contract, privacy and trust
c. A new cryptocurrency
d. Optimized cryptographic mining

4.How can a blockchain business network help the diamond wholesale and retail industry?
a. Can use cognitive tools to analyze customer preferences
b. Can prevent the injection of illicit diamonds in the supply chain
c. Can cut diamonds for studying more thoroughly
d. Can trace diamond history

5.Which of the following statements is false?
a. Blockchain provides a smart contract feature that can be used to model assets of any description
b. Blockchain adds a cognitive analytics capability to the asset supply chain
c. Blockchain captures a record of every committed transaction in chronological order
d. Blockchain can help provide provenance for an asset

6.What is the appropriate use of business blockchain?
a. A more efficient transaction processing system across a business network
b. To make low value, high volume micro payment systems more efficient
c. Modern, cognitive and transformational fabric for the 21st century and beyond
d. None of these

7.Which one is NOT a key concept of Blockchain?
a. Distributed shared ledger
b. Smart contracts
c. Error sensitiveness
d. Cryptography

8.The components of a VR (Virtual Reality) System do not include ( ).
a. Simulation Processor
b. Accelerating Processor
c. Rendering Processor
d. World Database

9.Augmented reality (AR) is a technology that layers computer-generated enhancements atop an existing reality in order to make it more meaningful through the ability to interact with it.
a. True
b. Possible
c. False
d. Nonsense

10.Comparing real and virtual world, light entering the eyes is the result of natural reflection from all angles.
a. True
b. Possible
c. False
d. Nonsense

答案:

1 2 3 4 5 6 7 8 9 10
A C B D B A C B A C

Quiz6

1.Which of the following statements may NOT be right?
a. Machine learning refers to a system capable of the autonomous acquisition and integration of knowledge
b. Learning is constructing or modifying representations of what is being experienced
c. Machine learning is primarily concerned with the accuracy and effectiveness of the computer system.
d. In Deep Learning approach, each neuron implements a relatively complicated mathematical function.

2.Which one of the following statements is NOT correct?
a. Neural Network needs long time for training.
b. Neural Network has a high tolerance to noisy and incomplete data
c. Neural Network cannot work with data in the range of (0,1) or (-1,1)
d. Neural Network is biologically motivated approach to machine learning

3.Which one of the following statements is NOT correct?
a. In Neural Network Learning, the algorithms iteratively adjust weights to reduce error (difference between network output and target output)
b. In Neural Networks, the destructive algorithms take a maximal network and prunes unnecessary layers nodes and connections during training.
c. In Neural Networks, the results get better with more data + bigger models + more computation
d. In Neural Networks, a neuron performs a generally linear operation on the result

4.IBM Watson is a massively parallel probabilistic evidence-based architecture, using a high-end system of ( ).
a. Intel x86 platform
b. IBM Power7 platform
c. DEC Alpha cluster running under OpenVMS
d. IBM Mainframe platform

5.In cognitive system, the decision making as learning from an expert, excludes
a. Asks natural language question, understands the question
b. Finds documents containing keywords, delivers the documents based on popularity
c. Produces possible answers based on evidence
d. Analyzes evidence, computes confidence, delivers response, evidence and confidence

6.Which one of the following statements is NOT correct?
a. Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works
b. A confidence score is the quantitative value produced by a cognitive system representing the merit of a decision after evaluating multiple options
c. Predictive analytics is a business process and a set of related technologies that are not concerned with the prediction of future possibilities and trends
d. Cognitive systems play the role of an assistant – albeit one who is tireless, can consume vast amounts of structured and unstructured information, can reconcile ambiguous and even self-contradictory data, and can learn

7.Which one of the following statements is NOT correct?
a. Watson can consume insights from Big Data for advanced analysis
b. Natural Language is explicit, little contextual, and often precise
c. Watson uses the Apache Hadoop open framework to distribute the workload for loading information into memory
d. Watson’s APIs are the cognitive building blocks that harness data

8.What may NOT be the capability of cognitive computing systems?
a. Provide expert assistance by developing deep domain insights and bringing this information to people in a timely, natural and usable way
b. Provide decision-making functionality that is evidence-based and continually evolve based on new information, outcomes and actions
c. Provide professional judgement and services as the replacement of human experts such as medical doctors in hospitals
d. Provide insights that perhaps could not be discovered by even the most brilliant human beings, through vast amounts of information available around the world

9.In comparing with programmable systems, the cognitive system is NOT ( ).
a. Data-Centric
b. Statistical Analysis
c. Scale up / out
d. Automated Systems / workload management

10.What is the third era of computing in IBM’s vision?
a. single-purpose calculation
b. cloud computing
c. cognitive computing
d. programmable systems

答案:

1 2 3 4 5 6 7 8 9 10
D C D B B C B C C C

说明:本文原载于CSDN,由本人搬运至阿里云开发者社区。

相关文章
|
1月前
|
安全 虚拟化
在数字化时代,网络项目的重要性日益凸显。本文从前期准备、方案内容和注意事项三个方面,详细解析了如何撰写一个优质高效的网络项目实施方案,帮助企业和用户实现更好的体验和竞争力
在数字化时代,网络项目的重要性日益凸显。本文从前期准备、方案内容和注意事项三个方面,详细解析了如何撰写一个优质高效的网络项目实施方案,帮助企业和用户实现更好的体验和竞争力。通过具体案例,展示了方案的制定和实施过程,强调了目标明确、技术先进、计划周密、风险可控和预算合理的重要性。
45 5
|
4月前
|
机器学习/深度学习 SQL 数据挖掘
ADB优化器背后的秘密:如何用成本估算和规则引擎编织高效的查询网络?
【8月更文挑战第27天】AnalyticDB (ADB) 是一款专为大规模数据集设计的高性能分析型数据库。本文深入探讨ADB的优化器如何通过成本估算、规则引擎及机器学习等策略生成高效执行计划。成本估算是选择最优路径的关键;规则引擎通过谓词下推等手段优化查询;机器学习则使优化器能基于历史数据预测执行效率。结合示例代码与执行计划分析,展现了ADB在提升查询性能方面的强大功能。未来,ADB将继续进化以满足日益增长的大数据分析需求。
45 0
|
4月前
|
数据采集 监控 数据挖掘
打造高效用户旅程:埋点分析系统的实操指南
在数字化时代,了解用户如何与我们的产品或服务互动是至关重要的。用户行为,在广义上,指的是用户在网站、应用程序或其他数字界面上的所有动作和反应。这些行为可能包括点击链接、浏览页面、填写表单,甚至是在社交媒体上分享内容。每一个动作都是用户体验的一部分,并对我们理解他们的需求和偏好提供了宝贵的线索。 在技术层面上,用户行为的跟踪和分析可以让我们深入了解用户的互动模式,从而指导我们的产品改进和市场战略。通过分析这些数据,我们可以发现用户旅程中的关键触点,识别用户体验的痛点,以及揭示潜在的优化机会。这不仅有助于提升用户满意度和忠诚度,还可以增强产品的市场竞争力。
打造高效用户旅程:埋点分析系统的实操指南
|
数据处理 数据库
ChatGPT学习企业产品、服务内容、往期方案,处理所输入的客户需求,定制化生成解决方案
ChatGPT学习企业产品、服务内容、往期方案,处理所输入的客户需求,定制化生成解决方案
169 0
|
消息中间件 存储 XML
「BPM架构」Zeebe 的常见问题和答案
「BPM架构」Zeebe 的常见问题和答案
产品分析:如何给出解决方案?
如何衡量一位产品经理的价值?看他给出的解决方案。
95 0
产品分析:如何给出解决方案?
|
监控 Java 测试技术
干货 | 精准化测试原理简介与实践探索
干货 | 精准化测试原理简介与实践探索
|
XML 数据采集 存储
接口自动化的关键思路和解决方案,本文全讲清楚了
与UI相比,接口一旦研发完成,通常变更或重构的频率和幅度相对较小。因此做接口自动化的性价比更高,通常运用于迭代版本上线前的回归测试中。 手工做接口测试,测试数据和参数都可以由测试人员手动填写和更新。
接口自动化的关键思路和解决方案,本文全讲清楚了
|
Kubernetes 安全 Cloud Native
如何评估Serverless服务能力,这份报告给出了40条标准
如今,已经有评测机构给出了40条标准来对Serverless的服务能力进行评估,这些评估细则既是技术生态繁荣发展的一种表现,也可以作为新进入者评估Serverless落地成效的一种参考依据。
2118 0
如何评估Serverless服务能力,这份报告给出了40条标准
|
Kubernetes 安全 Cloud Native
如何评估 Serverless 服务能力?这份报告给出了 40 条标准
两年前,我们还在讨论什么是 Serverless,Serverless 如何落地。如今,已经有评测机构给出了 40 条标准来对 Serverless 的服务能力进行评估,这些评估细则既是技术生态繁荣发展的一种表现,也可以作为新进入者评估 Serverless 落地成效的一种参考依据。
如何评估 Serverless 服务能力?这份报告给出了 40 条标准