Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
Flow control _______A. is a type of Error DetectionB. ensures the sender does not too much data that may overwhelm the receiverC. None of themD. Controls the congestion of network
What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically?A. IGRPB. HTTPC. DHCPD. OSPF
With WWW as an example of client-server computer software, the server is:A. The machine that makes WWW documents available B. The machine that enables you to connect to the internetC. The machine that you use to display WWW documentsD. All are correct
relational database uses ____ to store data and manipulate it.
You are invited to join an IT meeting where merits and pitfalls of cloud computing are being debated. Your manager conveys her concerns of data confidentiality for cloud storage. What can be done?
What memory management technique causes performance degradation from slow access to data?
What is a safe overcommitment ratio for vCPUs?
Which service is used in front of a cloud application to prevent web application attacks such as SQL injection?
Which device would be used to identify potentially malicious activity on a network?
You are troubleshooting performance problems on a development virtual machine and you notice a high number of page faults. Which solution will improve performance?
What is the most important criteria for a hot site?
Which of the following is NOT a metric that would be measured to confirm it meets the baseline?
You are configuring cloud backup settings. Only data modified since the last backup must be captured. What type of backup should you configure?
Which type of test measures the amount of time between requests and responses?
You want to monitor resource utilization of your virtual machines to predict future needs and detect anomalies. What must your first have?
Paul had a server crash on Thursday morning. He performed a backup where he used complete backup from Sunday and several other tapes from Monday, Tuesday, and Wednesday. What method was used?
Identify the term that applies to the statement below:Maximum duration of time within which the restoration process must be completed in order to avoid unacceptable consequences.
You are creating ACL entries to provide access to a resource within a small network setup. What type of access control model is this?
What are the typical RTO and RPO values for "important" applications and services within an organization?
Which AWS service is an example of Infrastructure as Code (IaC)?
