8.
Which deployment model combines both public and private cloud environments?
A) Community Cloud
B) Hybrid Cloud
C) Private Cloud
D) Multi-Cloud
9.
What does "vendor lock-in" refer to in cloud computing?
A) Losing all your cloud data
B) Being tied to one provider due to proprietary tools or services
C) Shared resources between companies
D) Temporary suspension of cloud access
10.
A)
B)
C)
D)
What is SG technology known for?
Creating virtual avatars
Providing ultra-fast wireless communication
Managing cryptocurrency wallets
Editing genetic material
11.
A)
B)
C)
D)
What is the function of a data warehouse in Bl?
To process transactions in real-time
To store and integrate data from different sources for analysis
To protect against cyber threats
To create animated graphics
12.
A)
B)
C)
D)
How do RFIDtags contribute to Supply Chain Visibility?
Encrypt customer passwords
Provide energy to warehouse systems
Track and identify items automatically
Create virtual meetings between suppliers
13.
A)
B)
C)
D)
Which of the following is NOT typically a part of an SCVsystem?
Real-time shipment tracking
Customer satisfaction surveys
Inventory monitoring
Supplier performance tracking
14.
A)
B)
C)
D)
Which protocol is used for securely transmitting data over the internet?
HTTP
FTP
SSL/TLS
SMTP
15.
A)
B)
C)
D)
What is a switch used for in a computer network?
To connect multiple networks and route traffic
To filter traffic based on MAC addresses and forward it to the correct port
To provide wireless access to devices
To assign IP addresses to devices in a local network
16.
A)
B)
What type of software is used to manage hardware components of a computer?
Application software
System software
3