Title | CS8791 Cloud Computing MCQ |
---|---|
Author | Vishwa A |
Course | Human Computer Interaction |
Institution | Anna University |
Pages | 46 |
File Size | 638.7 KB |
File Type | |
Total Downloads | 97 |
Total Views | 171 |
asas...
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT I- MCQ 1. Which of the following type of virtualization is also characteristic of cloud computing? A. Storage B. Application C. CPU D. All of the Above 2. The technology used to distribute service requests to resources is referred to as: A. Load performing B. Load scheduling C. Load balancing
3. SaaS supports multiple users and provides a shared data model through _________ model. A. Single-tenancy B. Multi-tenancy C. Multiple-instance D. All of the above
4 _________ is a cloud computing service model in which hardware is virtualized in the cloud. A. PaaS B. CaaS C. IaaS
5 _________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be built. A. Infrastructure B. Platform C. Service
6. _________ computing refers to applications and services that run on a distributed network using virtualized resources. A.Distributed B.Cloud C.Soft D. Parallel
7._______ describes a cloud service that can only be accessed by a limited amount of people. A. Data center B. Private cloud C. Virtualization D. Public cloud
8. ________ describes a distribution model in which applications are hosted by a service provider and made available to users. A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS) C. Software-as-a-Service (SaaS) D. Cloud service
9. ________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs. A. Scalability B. Virtualization C. Security D. Cost-savings
10. __________ is used to transfer messages from one system to another system. A.SOAP B.WSDL C.HTTP D.UDDI
11. In UDDI, __________ Pages refer the technical information about services exposed by the business. A.Yellow B.Green C.Blue D.White
12. Levels of Parallelism are decided on the lumps of code referred as _____________ A. Grain Size B. Function C. Loop D. Instruction
13.__________________ is a collection of independent computers that appears to its users as a single coherent system. A. Parallel System B. Distributed system C .Virtual System D.Cluster System
14. ________________ is the degree to which a system is able to adapt to workload changes by provisioning and deprovisioning resources in an autonomic manner A.Scalability B. Automation C.Elasticity D. Optimization
15. In _____________ mode, the elastic solutions are implemented by a set of Event-ConditionAction rules. A.Reactive B.Proactive
C.Preductive D.Deductive
16. ______________ is the degree of delight or annoyance of the user of an application or service A. Quality of Energy B. Quality of Experience C. Quality of Efficiency D. Quality of Elimination
17. The Communication between PEs in this model takes place through the ________ memory. a.primary b.shared c.data d.secondary
18. To Boost processor efficiency by _______ latency. a.database b.exclude c.hiding d.parallelism
19. Communications is another fundamental aspect of _________ computing. a.hardware b.traverse c.distributed d.communicative
20.Which style is based on the logical arrangement of software components? a.data architectural b.pattern architectural c.software architectural d.system architectural
21. The basic building blocks of clusters are A. Nodes B. Network C. Network characterization D. All of these 22. Which is/are true regarding cloud computing? A. It does not provide ubiquitous access B. It provides on-demand network access C. Resources can be released with no management effort D. None of these
23. Which are essential characteristics of cloud computing? A. On-demand self service B. Resource pooling C. Rapid elasticity D. All of these
24. Amazon Web Services is an example of A. SaaS B. PaaS C. IaaS D. None of these
25. The service provider gives the capability to the consumer to deploy onto the cloud in
A. SaaS B. PaaS C. IaaS D. None of these
26. Live Migration Has _______ Approches. a.5 b.2 c.11 d.9
27.The Architecture of the________ management solutions can be either centralized or decentralized. a.Elasticity b.Provisioning c.Centralized d.Multiple
28. Elasticity is a _________ Property for Cloud Computing. a.Quality b.Service c.Static d.Dynamic
29. The Core Elements of Parallel are_________. a.Software b.Keyboard c.Mouse
d.CPU
30. ________ Processing was Developed to Increase Processing Performance by Operating in a Multitasking Manner. a.Parallel b.Symmetric c.Vector d.Massively
31. Which Technology does the Third Generation Computer Works? a.ICS b.PDP c.PCD d.SDP
32. In Which Year Binary Arithmetic was Developed? a.1955 b.1941 c.1939 d.1930
33. _______ is the Delivery of Technology Infrastructure. a.IaaS b.PaaS c.Saas d.Taas
34. Customers do not Invest on _______Application Programs. a.Software b.Hardware c.System d.Computer
35. Cloud Computing Architecture has _______tiers. a.4 b.2 c.3 d.6
36. Internet Clouds Offers Four Deployment modes Private, Public, managed and _________. a.Data b.List c.Efficiency d.Hybrid
37. The _______ is Often a Collection of Homogeneous Compute Nodes that are Physically connected in close range to one another. a.HTC b.P2P c.Cluster d.AP2P
38.Grids are an ________ Technology. a.Open Source b.Close Source c.General d.Distributed
39. From which Year ____ to _____ a Handful of Mainframes , Including the IBM 360 and CDC 6400 Found. a.1960 to 1980 b.1970 to 1990 c.1950 to 1970 d.1980 to 2000 40. _________ is a Field of Computer Science/engineering that Studies. a.Cloud Computing b.Distributed Computing c.Ubiquitous Computing d.Centralized Computing
41. A _______ is a Pool of Virtualized Computer Networks. a.Cloud b.Cluster c.Data d.Internet
42. Cloud Computing leverages its _______ and Simplicity to benefit both users and providers. a.High cost
b.Low cost c.Mid cost d.Data cost
43. Cloud Architecture Effectively Uses _______. a.Internet b.Formal c. Reliability d. Virtualization
44. Cloud Service Provide the _______ Backend to Many of our Mobile Applications. a.Standard b.Invisible c.released d.minimal
45. ________ is a licensed software offering on the cloud and pay per use. a.PaaS b.SaaS c.LaaS d.IaaS
46. Consumer is able to Deploy and _______ which may include operating systems and applications. a.Elastic Compute Cloud b. RackSpace Hosting
c. Joyent Cloud d. Run Arbitrary Software
47. EDVAC means a.Electronic Difference Variable Automatic Computer b.Electronic Discrete Variable Automatic Computer c.Enable Data variable Automatic Computer d.Electronic Secrect variable Automatic Computer
48. Licklider was founder for the creation of the _________. a.Internet Hardware b.Evolution c.Computing d. AR PANET
49. How many version of TCP/IP are there. a.7 b.6 c.4 d.8
50. Which Model is not Useful in most of the Applications. a.SISD b.MISD c.SIMD d.MIMD
51. The term message-based communication model can be used to refer to any model for_______. a.RPC b.NET c.COM d.IPC
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT II- MCQ 1. A ____________ is a Software system designed to support interoperable machine-to-machine interaction over a network. a.structure b.protocols c.web service d.modular
2. The ________ is carried out by special servers dedicated to generating the virtualized resource pool. a.data b.security c.cloud d.virtualization
3. ________ also aims to make service interoperability extensible and effective. a.Logical view b.message orientation c.description orientation d.Service oriented architecture
4. Attempt to change the configuration of resource used. a.CPU b.behavior sensitive instruction
c.privileged instruction d.control Sensitive instruction
5.How many types of virtualization in cloud. a.9 b.11 c.5 d.12
6. ________is the first approach for I/O Virtualization generally this approach emulates well known, real-world devices. a.direct I/O b.para virtualization c.virtual device d.full device emulation
7.REST architecture element are connectors , components and ________. a.control data b.resource c.data elements d.simplicity
8._______of an event means determing the subscribes that have to receive a published event. a.security b.timeless
c.trust d.reliable delivery
9. Types in web services technology. a.1 b.4 c.2 d.3
10._______tranfers the message from the publisher to the subscribers. a.event bus b.subscriber c.publisher d.receiver
11.________ allows to describe event schema at a higher level of abstraction. a.content based mmodel b.topic based model c.type based model d.concept based model
12.______ systems are now a days considered a key technology for information diffusion. a.xml blocks b.push stratergy c.publish /subscribe
d.event bus
13.REST stands for_______. a.resource static transfer b.receive static transfer c.regional state transfer d.representational state transfer
14.______is a specification of transport-neutral mechanism that allows web services to communicate addressing information. a.ws-resource lifetime b.ws-transaction c.ws-notification d.ws-addressing
15.__________ represent a more robust data model for application developer. a. Topic based Model b. Content based Model c. Concept based Model d. Type based Model
16._______ is a lesser extent in consolidating server hardware by moving services on separate hosts into containers or VMs on one server. a. User-Application Level b. Operating System Level c. Hardware Abstraction Level
d. Library Support Level
17._________ inserts a virtualization layer inside an operating system to partition a machine’s physical resources. a. Virtualization on Linux b. Middleware Support for Virtualization c. Virtualization Structures d. Operating system
18._______ technique removes the difficulty of implementing binary translation of full virtualization. a. Memory Virtualization b.CPU Virtualization c. Hardware Support for Virtualization d. Hardware-Assisted CPU Virtualization 19.________ pattern is a message pattern and a network oriented architectural pattern. a.virtual cluster b.web service c. Publish/Subscribe d.xml
20.________ requires the messages to be broadcasted into logical channels. a. Type based Model b. Content based Model c. Topic-based Model d. Concept based Model
21. The ________ does not have perfect knowledge of the status of the systems listening to the messages. a.subscriber b.publisher c.web service d.xml
22.Controls the execution , inspection and terminating of VM instances on the host where it runs. a.group manager b.instance manager c.cloud manager d.form manager
23.A ________ control center should be able to activate this clone VM in case of failure of the original VM. a.data b.virtualization c.cloud d.security
24._________ provides multiple/alternate representations of each resource. a.REST b.HTTP c.web service
d.URI
25._____virtualization needs to modify the guest operation system. a.para b.full c.binary d.host
26.______ are set of protocols that ensure security for SOAP-based messages. a. WS-ResourceLifetime b.Web Services Reliable Messaging c. WS-Addressing d. Web Services Security
27.A ______message consists of an envelope used by the applications to enclose information that need to be sent. a.REST b.SOAP c.web service d.xml
28. The task of verifying whenever an event e matches a subscription is called______. a.catching b.matching
c.multiprocessing d.REST
29. MIPS binary code can run on an _____based host machine with the help of ISA emulation. a.x85 b.x86 c.x76 d.x75
30. The basic emulation method is through______ interpretation. a.pattern b.code c.numeric d.virtualization
31. ________________ strategy is the responsibility of the publisher to notify all the subscribers. A. Pull B.Move C.Push D.Pick Answer: C
32._______________ is a software architecture style for distributed systems, particularly distributed hypermedia systems. A. SAOP B. HTTP C. REST
D. XML Answer: C
33. Which of the following is another name for the system virtual machine? A. Hardware Virtual Machine B. Software Virtual Machine C. Real Machine D. None of the Mentioned Answer:A
34.Which of the following provide system resource access to virtual machines? A.VMM B.VMC C.VNM D.All of the above Answer:A
35. Email service on cloud is an example of A. SaaS B. PaaS C. IaaS D. None of these
Answer: A 36. Cloud Bursting for load balancing between clouds is an example of A. Community cloud B. Public cloud C. Private cloud D. Hybrid cloud
Answer: D
37. Virtual machine supports migration from one host to another host. A. True B. False
Anser: A 38. Customer’s computer does not need the processing power or hard disk space demanded by the application running in the cloud. A. True B. b) False
39. What is the disadvantage of cloud computing? A. It requires constant internet connection. B. It does not support group collaboration. C. It provides limited storage. D. None of these.
Answer: A 40. Virtual machines are example of A. SaaS B. PaaS C. IaaS D. None of these
Answer: C
41. Adding more resources to a single computation unit is known as A. Vertical scale up B.
Horizontal scale out
C. None of these
Answer: A 42. Google docs is an example of
A. SaaS B. PaaS C. IaaS
Answer: A
43. Google App Engine is an example of A. SaaS B. PaaS C. IaaS
Answer: B 44. SaaS is useful in case of applications where extremely fast processing of real time data is needed. A. True B. False
Answer: B 45. Which of these is/are managed by the user in PaaS? A. Data B. Program C. Runtime D. All of these
Answer: A
46. ______________ is the drawback of public cloud. A. Availability B. Reliability C. Scalability D. Data Security Answer: D
47. _________________ is the advantage of using private cloud. A. Does not provide virtualized services B.Minimizes hardware usage C.Increases complexity D.Trust on Data Answer: D
48. ________________ provides a machine-readable description of how the service can be called. A. WSDL B. UDDI C. REST D. HTML
49. ____________ instructions attempt to change the configuration of resources used. A. Privileged instructions B. Control sensitive instructions C. Behavior-sensitive instructions D. Unprivileged instructions
50. _______________ is a subscriber cannot be notified for an information it is not interested in. A. B. C. D.
Safety (Legality) Safety (Validity) Liveness Timeliness
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT III- MCQ
1.SWIGGY.IN formed a cloud for its all branches but due to its limited resources it obtained the services of AWS for extended provisioning and thus modified its cloud; the cloud so formed is the example of _____________ a) b) c) d)
Private cloud Public cloud Hybrid cloud Community cloud
2.Which of the following is the best known service model? a) b) c) d)
SaaS IaaS PaaS All of the mentioned
3. Which of the following environment best describes WorkXpress? a) 3GL b) 4GL c) 5GL d) None of the mentioned 4.Which of the following module feature is provided by Drupal CMS? a) Traffic management b) OpenID authentication c) User interface creation tools d) All of the mentioned 5.Which of the following AppBase tool allows you to assign access rights to different objects in the system? a) Security Roles Management b) Dashboard Designer c) Report Builder d) All of the mentioned 6.Which of the following is most important area of concern in cloud computing?
a) b) c) d)
Security Storage Scalability All of the mentioned
7.Which of the architectural layer is used as backend in cloud computing? a) b) c) d)
Client Cloud Software Network
8.which is not a characteristics od SaaS? a) b) c) d)
Scalable Uses unused computing power Provide standard and high cpu Multi tennency
9. Cloud foundary is a _____________ a) b) c) d)
Industry wide PaaS initiative VM ware-led open source PaaS Factory that produces cloud components None of the above
10. which of the following architecture layer is used as front end in cloud computing? a) b) c) d)
Cloud Client Soft All of the above
11.which of the following is most feature of cloud storage listed below? a) b) c) d)
Logon authentication Bare file Multiplatform support Adequate bandwidth
12.Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15
c) 20 d) None of the mentioned 13.How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned 14.Which of the following is not a backup category? a) Full system backup b) Half system backup c) Image backup d) All of the mentioned 15.Which of the following backup is also referred to as snapshots? a) Point-in-time b) Differential c) Image backup d) All of the mentioned 16.Which of the following software supplies full system backup? a) Carbonite b) Ghost c) RDIFF-BACKUP d) All of the mentioned 17.The componentized nature of SaaS solutions enables many solutions to support a feature called _____________ a) workspace b) workloads c) mashups d) all of the mentioned 18.In particular, layers have which of the following characteristics? a) b) c) d)
Layers are by definition highly cohesive, thus satisfying the principle of cohesion Layers doesn’t support information hiding Layers are constrained to use only above layers All of the mentioned
19. What are the examples of cloud architectures on which application can run? a) Processing pipelines
b) Batch processing systems c) Websites d) All of the above 20.how many components required for cloud architecture? a) b) c) d)
10 2 5 3
21. what are the major building blocks of cloud architecture? a) b) c) d) e)
Technical architecture Reference architecture Operation architecture Deployment operation architecture Option a,b,d
22.what are the different components used in AWS? a) b) c) d)
Amazon S3 Amazon SQS Amazon EC2 All of the mentioned
23. Which of the following is the fundamental unit of virtualized client in an IaaS deployment? a) workunit b) workspace c) workload d) all of the mentioned 24.How many types of virtual private server instances are partitioned in an IaaS stack? a) one b) two c) three d) all of the mentioned 25. Which of the following correctly represents cloud computing ecosystem? a) Business Process
Application Services Platform Services Infrastructure Services
b) Application Process Business Services Platform Services Infrastructure Services c) Application Process Infrastructure Services Platform Services Infrastructure Services d) Business Process Application Services Infrastructure Services Platform Services
26. Which of the following element(s) in Azure stand(s) for management service? (a) config b) application c) virtual machines
...