Professional Documents
Culture Documents
Max. Marks : 25
PART – A ( 20*1 = 20 Marks)
Answer All Questions
6. What are the I/O requests to disk storage on a SAN are called
a. File I/Os
b. SAN I/Os
c. Block I/Os
d. Disk I/Os
8. In what way the unauthorized users can be restricted in changing Home router settings.
a) Change the firewall settings on your computer.
b) Change the default administrator password and SSID.
c) Change the MAC address of the router.
d) Nothing.
14. Find out the type , where in virtualization applications are stored and executed on the
server?
Application virtualization
Presentation virtualization
Network virtualization
Server virtualization
15. Identify the properties are the basic requirements of Fault Tolerance?
Fault Containments, Fail Safe, Fault Isolation
Data Recovery, Dynamic Recovery, Fault Isolation
Fault Containments, Data Isolation, Dynamic Recovery
Fault Containments, Dynamic Recovery, Fault Isolation
16. Identify the network which is specifically associated with Bluetooth devices
a) WAN
b) MAN
c) PAN
d) LAN
18. The Network Attached Storage (NAS) has limited performance, when _______ are
many and complex _______________ .
a) Resources , Process
b) Threads , Process
c) Users , I/O process
d) Users , CPU Process
19. What will be the survival rate at the end of the 3 rd year if the hypothetical retention rate is
1.0, in CRM system?
a) 0.56
b) 1.0
c) 2.89
d) 8.9
20. __________ reduces manual effort and store a large amount of data in small space.
A. Office Automation System
B. Decision Support System
C. Transaction Process System
D. Automation System
Part – B ( 5 Marks)
Set 1
1. List out the characteristics of office automation system (2)
2. What is Fibre Channel SAN? Specify its benefits and limitations (3)
Set 2
1. List the type of CRM software based on installation and functionality(2)
Set 3
1. What are the factors influencing in selecting cloud based backup. (2)
2. Give a short notes on File level virtualization, with its benefits and limitations. (3)
Set 4
1. List out the issues faced by the business enterprises for not adopting backup and
recovery methods. (2)