云服务案例分析小测答案

简介: 本文分享云服务案例分析的小测答案。

Quiz1

1.In IT service management, what is NOT the benefit in use of processes?
a. measurable
b. simplifiable
c. auditable
d. contract compliant

2.Why we have to study services?
a. Service regulates professional activities
b. Service is simple
c. Service resolves technical problems
d. Service equals profits

3.In comparing with Computer Science, Software Engineering is concerning with \_
a. building data structures
b. establishing computing theory
c. delivering useful software
d. applying efficient algorithms

4.In comparing with IT Management, IT SERVICE management is focusing on \_.
a. Centralized behaviors
b. Process orientation
c. Once a time missions
d. Isolated procedures

5.In Service Sciences, Management, and Engineering (SSME), service innovation does NOT include:
a. Technology Innovation
b. Business Innovation
c. Manufacture Innovation
d. Demand Innovation

6.What is NOT the criterion for effective Services Management?
a. Scalability requirements of the world’s most demanding service infrastructures
b. Flexibility and modularity to adapt for business, organizational and technology convergence
c. Security to ensure information transformation correctly
d. Automation of processes and workflows fundamental to service delivery

7.From the customer perspective, Software as a Service means \_.
a. Software is commercially available with minor configuration options
b. Internet accessed services available (near) real-time access of resources after purchase
c. The centralized hosting obviates the need for downloadable patches and upgrades and enables continuous improvements
d. The hosting provider assumes responsibility for the solution

8.To increase corporate profits,the service path is \_.
a. Focusing on team building
b. Extending worker’s working hours
c. Meeting customer requirement
d. Doubling worker’s salary

9.Which one of the following statements may NOT be true?
a. Service Engineering is a multi-disciplinary field
b. In manufactures model the product design comes after process design
c. IT Service Architecture can be viewed from various perspectives.
d. Sometimes the services engineering model works but has limitations due to human judgment is required

10.Which one of the following statements may NOT be true?
a. Science is a way to create knowledge.
b. In interpretive model the improvements come from changes to design or process.
c. Engineering is a way to apply knowledge and create new value.
d. Management improves the process of creating and capturing value.

答案:

1 2 3 4 5 6 7 8 9 10
B B C B A C B C B B

Quiz2

1.The graphical user interface (GUI) is managed by ( )
a. computer hardware
b. computer operating systems
c. computer application software
d. computer input/output devices

2.The computer application software ( ).
a. provides tools for writing computer programs using different programming languages
b. provides tools for writing computer programs using different programming languages
c. manages the computer hardware and the computer system
d. facilitates the input and output devices in a computer system

3.The main functions of Internet may NOT include__.
a. Announcement
b. Encryption
c. News
d. Emails

4.In comparing with Hard Disks, the Solid State Disks (SSD) can ( ).
a. Offer lower cost per megabyte of storage
b. Provide faster access time
c. Depend on a read/write interface synchronizing with a data sector
d. Increase the number of servers needed

5.Which one is NOT characterized as the type of data storage?
a. Volatility of Information
b. Stability of media over time
c. Security of information
d. Ability to change information

6.Data deduplication is an important new technology to control data ( ). The average disk volume contains thousands or even millions of duplicate data objects. As data is created, distributed, backed up, and archived, duplicate data objects are stored unabated across all storage tiers. The end result is inefficient utilization of data storage resources. By eliminating ( ) data objects and referencing just the original object, an immediate benefit is obtained through storage space ( ).
a. storage/useless/reduction
b. proliferation/redundant/efficiencies
c. space/extra/optimization
d. flow/more/saving

7.The common computer platforms do NOT include ( )
a. computer’s architecture
b. operating system
c. programming languages
d. relational database

8.What is the Data Storage Virtualization?
a. A method of combining the available storage resources in a network by splitting up the available bandwidth into channels, each of which can be assigned (or reassigned) to a particular server or device in real time.
b. The masking of server resources (including the number and identity of individual physical servers, processors, and operating systems) from server and storage users.
c. A technique for hiding the physical characteristics of computing resources from the way in which other storage systems, applications, or end users interact with those resources.
d. The pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.

9.Which one of the following statements is NOT correct?
a. A local area network (L AN) is a network of computers close together.
b. Router computers act as receive-and -forward devices; they do not retain information about the packets that they handle.
c. Independent networks should require internal changes to be connected to the network.
d. The Web is more a way of thinking about and organizing information storage and retrieval than it is a specific technology.

10.Microservices may NOT have some characteristics,such as
a. Services in a microservice architecture (MSA) are often processes that communicate over a network to fulfil a goal using technology-agnostic protocols such as HTTP.
b. Services are organized around business capabilities.
c. Services cannot be implemented using different programming languages, databases, hardware and software environment, depending on what fits best.
d. Services are small in size, messaging-enabled, bounded by contexts, autonomously developed, independently deployable, decentralized and built and released with automated processes.

答案:

1 2 3 4 5 6 7 8 9 10
B B B B C B D D C C

Quiz3

1.An IT Architect is ( ).
a. a result seeker
b. a project manager
c. a product expert
d. a lone scientist

2.Which of the followings may NOT be correct?
a. Regulations and governance are means to assuring some acceptable level of quality-of-service
b. Information systems allow separation of production and consumption of services
c. The world is becoming networked, dependent on information and information technology
d. Non Function Requirement is less useful to cloud system design

3.Which one of the following activities is in the lower end of profit chain for IT industry?
a. manufacture a complicate device
b. build up a team to implement a technical consultation assignment
c. broadcast a product news to media
d. send emails to customers for an important product announcement

4.To create a component model by applying patterns for e-Business, which one of the following statements could be incorrect ?
a. Model represents the application object that implements the application data and business logic. b. Back-end system is responsible for the business processes beyond the commerce processes
c. Controller is responsible for formatting the application results and dynamic page construction
d. Database stores information about the commerce application

5.Which one of the following statements may NOT be true?
a. e-Business Solutions present unique challenges such as adapt to rapidly changing technologies and dramatically smaller product cycles.
b. Patterns for e-Business are proven and repeatable architectural constructs that occur across many engagements.
c. Patterns for e-business apply in the later stages of the lifecycle, when business processes are being analyzed and architectural level decisions are being made.
d. Fitting a pre-cut suit is much cheaper than creating one from scratch.

6.Which one of the following statements may NOT be true?
a. Architecting deals almost entirely with measurables using analytic tools derived from mathematics and the hard sciences.
b. The IT Architect may be involved during the construction of a solution as an advocate for the client.
c. A Pattern is a prescriptive technology specification that describes the development, deployment, and operations environment of a class of computer applications.
d. The Operational Model is a representation of a network of computer systems.

7.What may not be the objects of Business Pattern in Patterns for e-business?
a. Identify generalized aspects of business process interactions
b. Provide a non-technical view for not just the IT organization
c. Describe Interactions between the primary Business Actors
d. Describe a specific business process

8.In Patterns for e-business, the Composite pattern means ( ).
a. When a group of Business and Integration patterns have been combined to address a specific set of business process requirements.
b. When the applications need to be accessible via multiple device types, including rich clients, browsers, voice response units, mobile devices, and PDAs.
c. When there is a need to describe the consideration on Performance, Capacity, Scalability, and Availability.
d. When a particular group of Business and Integration patterns become a frequent occurrence.

9.Which one of the following statements may NOT be true?
a. Reuse of architectural knowledge and work products is not an important aspect of design approach.
b. This Systems Management discipline is particularly important in the Web environment as the potential impact of poor performance is that much greater.
c. Architectural Decisions depend on what is being architected, and in what context.
d. Great architects go beyond the role of intermediary to make a visionary combination of technology and purpose that exceeds the expectation of the builder or client.

10.What is not the benefit for Ford to use e-Business Patterns?
a. Save money as multiple development environments cost more money
b. Rapid mapping from business requirements to application and infrastructure designs
c. Standard reusable building blocks selected and aggregated in Patterns grouped by layers
d. IBM won hardware standard for all platforms

答案:

1 2 3 4 5 6 7 8 9 10
A D A C C A D D A D

Quiz4

1.For the dimensions of big data growth, Veracity means ( ).
a. Streaming data, milliseconds to seconds to respond
b. Uncertainty from inconsistency ambiguities
c. Terabytes to exabytes of existing data to process
d. Structured, unstructured, text, multimedia

2.The common types of RFID working model do NOT include ( ).
a. idle
b. active
c. semipassive
d. passive

3.Which one of the following statements is NOT correct?
a. Big Data means unstructured Data.
b. Big Data is a new basis of competitive advantage for enterprises.
c. Data generated from IoT will grow exponentially as the number of connected nodes increases.
d. Big Data is similar to small data, but bigger in size.

4.What may NOT be the Big Data growth drivers?
a. Both mega-IT-vendors and pure-play Big Data vendors took steps to better articulate their product & services roadmaps and larger visions for Big Data in the enterprise, creating greater confidence from enterprise buyers.
b. Continued “Big Data Washing” by legacy IT vendors leading to confusion among enterprise buyers and practitioners, as well as “political” factors that make it difficult for enterprise buyers to engage new vendors.
c. Big Data technologies took important steps towards greater enterprise-grade capabilities, critical for mass enterprise adoption. These steps included better privacy, security and governance capabilities, as well as improved backup & recovery and high-availability for Hadoop specifically.
d. Partnerships played an important role in maturing the Big Data landscape. Of particular importance are a number of reseller agreements and technical partnerships between Big Data vendors and non-Big Data vendors, the results of which that make it easier for practitioners to adopt and integrate Big Data technologies.

5.Which one of the following statements may NOT be correct?
a. Big data is just a technology—it is not a business strategy for capitalizing on information resources
b. Organizations are using big data to target customer-centric outcomes, tap into internal data and build a better information ecosystem
c. Fast forward to the present and technologies like Hadoop give you the scale and flexibility to store data before you know how you are going to process it
d. Technologies such as MapReduce, Hive and Impala enable you to run queries without changing the data structures underneath

6.Which may NOT be the direct impact on IT industry by Big Data?
a. Data storage has grown significantly, shifting market from analog to digital
b. Computation Capability is demanding to process huge amount of data with various formats
c. New business insights are generated from combining and analyzing data types in new ways
d. The foundation is built for future requirements by expanding into big data platform

7.What could be the main benefit of using Big Data on Security/Intelligence Extension?
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
a. Increase customer loyalty and satisfaction by understanding what meaningful actions are needed
b. Track persons of interest (drug/sex traffickers, terrorists, illegal refugees/immigrants) and civil/border activity
c. Find, Visualize & Understand all big data to improve business knowledge
d. Log analytics, energy bill forecasting, energy consumption optimization, anomalous energy usage detection, presence-aware energy management

8.What is NOT the feature of Hadoop?
a. Hadoop is an open source software project.
b. Hadoop is relying on high-end hardware.
c. Hadoop is designed to scale up from a single server to thousands of machines, with very high degree of fault tolerance.
d. Hadoop enables distributed processing of large data sets across clusters.

9.Which one of the following statements may NOT be corret?
a. Hadoop is designed to work best with a modest number of extremely large files.
b. Every data block stored in HDFS has its own metadata and needs to be tracked by a central server.
c. Because of data locality principle, using a storage area network in a Hadoop environment is recommended.
d. All hadoop commands are invoked by the bin/hadoop script.

10.Which one of the following statements may NOT be correct?
a. Spark is an implementation of Resilient Distributed Dataset (RDD) in Scala
b. In spark, MapReduce data flow can be expressed using RDD transformations
c. Spark Streaming extends the core API to allow high-throughput, fault-tolerant stream processing of live data streams
d. Spark cannot persist or cache a dataset in memory across operations

答案:

1 2 3 4 5 6 7 8 9 10
B A A B A C B B C D

Quiz5

1.What’s the significant problem with traditional business networks?
a. Every participant has a separate copy of the ledger and updates it for their transactions
b. There are several contracts involved
c. The participants in a network can never be known
d. No one person can oversee the entire network

2.In the Bitcoin network, everyone knows who is participating.
a. Possible
b. True
c. False
d. Nonsense

3.What is the core requirement for a business blockchain?
a. Technical services, business services and solution
b. Shared ledger, smart contract, privacy and trust
c. A new cryptocurrency
d. Optimized cryptographic mining

4.How can a blockchain business network help the diamond wholesale and retail industry?
a. Can use cognitive tools to analyze customer preferences
b. Can prevent the injection of illicit diamonds in the supply chain
c. Can cut diamonds for studying more thoroughly
d. Can trace diamond history

5.Which of the following statements is false?
a. Blockchain provides a smart contract feature that can be used to model assets of any description
b. Blockchain adds a cognitive analytics capability to the asset supply chain
c. Blockchain captures a record of every committed transaction in chronological order
d. Blockchain can help provide provenance for an asset

6.What is the appropriate use of business blockchain?
a. A more efficient transaction processing system across a business network
b. To make low value, high volume micro payment systems more efficient
c. Modern, cognitive and transformational fabric for the 21st century and beyond
d. None of these

7.Which one is NOT a key concept of Blockchain?
a. Distributed shared ledger
b. Smart contracts
c. Error sensitiveness
d. Cryptography

8.The components of a VR (Virtual Reality) System do not include ( ).
a. Simulation Processor
b. Accelerating Processor
c. Rendering Processor
d. World Database

9.Augmented reality (AR) is a technology that layers computer-generated enhancements atop an existing reality in order to make it more meaningful through the ability to interact with it.
a. True
b. Possible
c. False
d. Nonsense

10.Comparing real and virtual world, light entering the eyes is the result of natural reflection from all angles.
a. True
b. Possible
c. False
d. Nonsense

答案:

1 2 3 4 5 6 7 8 9 10
A C B D B A C B A C

Quiz6

1.Which of the following statements may NOT be right?
a. Machine learning refers to a system capable of the autonomous acquisition and integration of knowledge
b. Learning is constructing or modifying representations of what is being experienced
c. Machine learning is primarily concerned with the accuracy and effectiveness of the computer system.
d. In Deep Learning approach, each neuron implements a relatively complicated mathematical function.

2.Which one of the following statements is NOT correct?
a. Neural Network needs long time for training.
b. Neural Network has a high tolerance to noisy and incomplete data
c. Neural Network cannot work with data in the range of (0,1) or (-1,1)
d. Neural Network is biologically motivated approach to machine learning

3.Which one of the following statements is NOT correct?
a. In Neural Network Learning, the algorithms iteratively adjust weights to reduce error (difference between network output and target output)
b. In Neural Networks, the destructive algorithms take a maximal network and prunes unnecessary layers nodes and connections during training.
c. In Neural Networks, the results get better with more data + bigger models + more computation
d. In Neural Networks, a neuron performs a generally linear operation on the result

4.IBM Watson is a massively parallel probabilistic evidence-based architecture, using a high-end system of ( ).
a. Intel x86 platform
b. IBM Power7 platform
c. DEC Alpha cluster running under OpenVMS
d. IBM Mainframe platform

5.In cognitive system, the decision making as learning from an expert, excludes
a. Asks natural language question, understands the question
b. Finds documents containing keywords, delivers the documents based on popularity
c. Produces possible answers based on evidence
d. Analyzes evidence, computes confidence, delivers response, evidence and confidence

6.Which one of the following statements is NOT correct?
a. Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works
b. A confidence score is the quantitative value produced by a cognitive system representing the merit of a decision after evaluating multiple options
c. Predictive analytics is a business process and a set of related technologies that are not concerned with the prediction of future possibilities and trends
d. Cognitive systems play the role of an assistant – albeit one who is tireless, can consume vast amounts of structured and unstructured information, can reconcile ambiguous and even self-contradictory data, and can learn

7.Which one of the following statements is NOT correct?
a. Watson can consume insights from Big Data for advanced analysis
b. Natural Language is explicit, little contextual, and often precise
c. Watson uses the Apache Hadoop open framework to distribute the workload for loading information into memory
d. Watson’s APIs are the cognitive building blocks that harness data

8.What may NOT be the capability of cognitive computing systems?
a. Provide expert assistance by developing deep domain insights and bringing this information to people in a timely, natural and usable way
b. Provide decision-making functionality that is evidence-based and continually evolve based on new information, outcomes and actions
c. Provide professional judgement and services as the replacement of human experts such as medical doctors in hospitals
d. Provide insights that perhaps could not be discovered by even the most brilliant human beings, through vast amounts of information available around the world

9.In comparing with programmable systems, the cognitive system is NOT ( ).
a. Data-Centric
b. Statistical Analysis
c. Scale up / out
d. Automated Systems / workload management

10.What is the third era of computing in IBM’s vision?
a. single-purpose calculation
b. cloud computing
c. cognitive computing
d. programmable systems

答案:

1 2 3 4 5 6 7 8 9 10
D C D B B C B C C C

说明:本文原载于CSDN,由本人搬运至阿里云开发者社区。

相关文章
|
4月前
|
搜索推荐 算法 数据挖掘
十个最全网站营销方法案例分析
本文探讨了10种网站营销策略:SEO优化提升搜索引擎排名;内容营销建立品牌信任;社交媒体营销扩大影响力;搜索引擎广告吸引目标用户;电子邮件营销促进销售;网站设计优化提升用户体验;移动端优化适应移动设备;数据分析驱动策略优化;视频营销吸引关注;合作伙伴营销扩展品牌覆盖。AokSend提供高效验证码发信服务,助力企业营销。选择合适策略,持续优化,以实现最佳营销效果。
|
26天前
|
Web App开发
【自主探索】发现答案:为何自己寻找解答比直接获取更有效?
这篇文章探讨了自主探索问题答案的重要性,并通过解决Edge浏览器无头模式配置的问题来说明这一点,同时提醒读者要勇于怀疑和验证每个答案,包括自己的答案。
30 1
|
10月前
|
NoSQL 分布式数据库 Redis
103 云笔记案例(代码流程分析)
103 云笔记案例(代码流程分析)
47 0
|
消息中间件 存储 XML
「BPM架构」Zeebe 的常见问题和答案
「BPM架构」Zeebe 的常见问题和答案
|
算法 C++
详细实例说明+典型案例实现 对枚举法进行全面分析 | C++
简单的来说,算法就是用计算机程序代码来实现数学思想的一种方法。学习算法就是为了了解它们在计算机中如何演算,以及在当今的信息时代,它们是如何在各个层面上影响我们的日常生活的,从而提高我们的逻辑思维能力和处理实际问题的能力。善用算法、巧用算法,是培养程序设计逻辑的重中之重,许多实际的问题都可用多个可行的算法来解决, 但是要从中找出最优的解决算法却是一项挑战。
190 0
详细实例说明+典型案例实现 对枚举法进行全面分析 | C++
产品分析:如何给出解决方案?
如何衡量一位产品经理的价值?看他给出的解决方案。
85 0
产品分析:如何给出解决方案?
|
存储 关系型数据库 数据库
腾讯云从业者认证资料共享、例题分析、习题实战
腾讯云从业者认证资料共享、例题分析、习题实战
243 0
|
数据采集 数据挖掘 大数据
一文看懂:行业分析怎么做?
在工作和面试中,很多小伙伴会遇到“对XX行业进行分析”的要求。一听“行业分析”四个字,好多人会觉得特别高大上,不知道该怎么做。今天给大家一个懒人攻略,小伙伴们可以快速上手哦。
253 0
一文看懂:行业分析怎么做?
|
Kubernetes 安全 Cloud Native
如何评估Serverless服务能力,这份报告给出了40条标准
如今,已经有评测机构给出了40条标准来对Serverless的服务能力进行评估,这些评估细则既是技术生态繁荣发展的一种表现,也可以作为新进入者评估Serverless落地成效的一种参考依据。
2077 0
如何评估Serverless服务能力,这份报告给出了40条标准
|
Kubernetes 安全 Cloud Native
如何评估 Serverless 服务能力?这份报告给出了 40 条标准
两年前,我们还在讨论什么是 Serverless,Serverless 如何落地。如今,已经有评测机构给出了 40 条标准来对 Serverless 的服务能力进行评估,这些评估细则既是技术生态繁荣发展的一种表现,也可以作为新进入者评估 Serverless 落地成效的一种参考依据。
如何评估 Serverless 服务能力?这份报告给出了 40 条标准