CS8791 Cloud Computing MCQ PDF

Title CS8791 Cloud Computing MCQ
Author Vishwa A
Course Human Computer Interaction
Institution Anna University
Pages 46
File Size 638.7 KB
File Type PDF
Total Downloads 97
Total Views 171

Summary

asas...


Description

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT I- MCQ 1. Which of the following type of virtualization is also characteristic of cloud computing? A. Storage B. Application C. CPU D. All of the Above 2. The technology used to distribute service requests to resources is referred to as: A. Load performing B. Load scheduling C. Load balancing

3. SaaS supports multiple users and provides a shared data model through _________ model. A. Single-tenancy B. Multi-tenancy C. Multiple-instance D. All of the above

4 _________ is a cloud computing service model in which hardware is virtualized in the cloud. A. PaaS B. CaaS C. IaaS

5 _________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be built. A. Infrastructure B. Platform C. Service

6. _________ computing refers to applications and services that run on a distributed network using virtualized resources. A.Distributed B.Cloud C.Soft D. Parallel

7._______ describes a cloud service that can only be accessed by a limited amount of people. A. Data center B. Private cloud C. Virtualization D. Public cloud

8. ________ describes a distribution model in which applications are hosted by a service provider and made available to users. A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS) C. Software-as-a-Service (SaaS) D. Cloud service

9. ________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs. A. Scalability B. Virtualization C. Security D. Cost-savings

10. __________ is used to transfer messages from one system to another system. A.SOAP B.WSDL C.HTTP D.UDDI

11. In UDDI, __________ Pages refer the technical information about services exposed by the business. A.Yellow B.Green C.Blue D.White

12. Levels of Parallelism are decided on the lumps of code referred as _____________ A. Grain Size B. Function C. Loop D. Instruction

13.__________________ is a collection of independent computers that appears to its users as a single coherent system. A. Parallel System B. Distributed system C .Virtual System D.Cluster System

14. ________________ is the degree to which a system is able to adapt to workload changes by provisioning and deprovisioning resources in an autonomic manner A.Scalability B. Automation C.Elasticity D. Optimization

15. In _____________ mode, the elastic solutions are implemented by a set of Event-ConditionAction rules. A.Reactive B.Proactive

C.Preductive D.Deductive

16. ______________ is the degree of delight or annoyance of the user of an application or service A. Quality of Energy B. Quality of Experience C. Quality of Efficiency D. Quality of Elimination

17. The Communication between PEs in this model takes place through the ________ memory. a.primary b.shared c.data d.secondary

18. To Boost processor efficiency by _______ latency. a.database b.exclude c.hiding d.parallelism

19. Communications is another fundamental aspect of _________ computing. a.hardware b.traverse c.distributed d.communicative

20.Which style is based on the logical arrangement of software components? a.data architectural b.pattern architectural c.software architectural d.system architectural

21. The basic building blocks of clusters are A. Nodes B. Network C. Network characterization D. All of these 22. Which is/are true regarding cloud computing? A. It does not provide ubiquitous access B. It provides on-demand network access C. Resources can be released with no management effort D. None of these

23. Which are essential characteristics of cloud computing? A. On-demand self service B. Resource pooling C. Rapid elasticity D. All of these

24. Amazon Web Services is an example of A. SaaS B. PaaS C. IaaS D. None of these

25. The service provider gives the capability to the consumer to deploy onto the cloud in

A. SaaS B. PaaS C. IaaS D. None of these

26. Live Migration Has _______ Approches. a.5 b.2 c.11 d.9

27.The Architecture of the________ management solutions can be either centralized or decentralized. a.Elasticity b.Provisioning c.Centralized d.Multiple

28. Elasticity is a _________ Property for Cloud Computing. a.Quality b.Service c.Static d.Dynamic

29. The Core Elements of Parallel are_________. a.Software b.Keyboard c.Mouse

d.CPU

30. ________ Processing was Developed to Increase Processing Performance by Operating in a Multitasking Manner. a.Parallel b.Symmetric c.Vector d.Massively

31. Which Technology does the Third Generation Computer Works? a.ICS b.PDP c.PCD d.SDP

32. In Which Year Binary Arithmetic was Developed? a.1955 b.1941 c.1939 d.1930

33. _______ is the Delivery of Technology Infrastructure. a.IaaS b.PaaS c.Saas d.Taas

34. Customers do not Invest on _______Application Programs. a.Software b.Hardware c.System d.Computer

35. Cloud Computing Architecture has _______tiers. a.4 b.2 c.3 d.6

36. Internet Clouds Offers Four Deployment modes Private, Public, managed and _________. a.Data b.List c.Efficiency d.Hybrid

37. The _______ is Often a Collection of Homogeneous Compute Nodes that are Physically connected in close range to one another. a.HTC b.P2P c.Cluster d.AP2P

38.Grids are an ________ Technology. a.Open Source b.Close Source c.General d.Distributed

39. From which Year ____ to _____ a Handful of Mainframes , Including the IBM 360 and CDC 6400 Found. a.1960 to 1980 b.1970 to 1990 c.1950 to 1970 d.1980 to 2000 40. _________ is a Field of Computer Science/engineering that Studies. a.Cloud Computing b.Distributed Computing c.Ubiquitous Computing d.Centralized Computing

41. A _______ is a Pool of Virtualized Computer Networks. a.Cloud b.Cluster c.Data d.Internet

42. Cloud Computing leverages its _______ and Simplicity to benefit both users and providers. a.High cost

b.Low cost c.Mid cost d.Data cost

43. Cloud Architecture Effectively Uses _______. a.Internet b.Formal c. Reliability d. Virtualization

44. Cloud Service Provide the _______ Backend to Many of our Mobile Applications. a.Standard b.Invisible c.released d.minimal

45. ________ is a licensed software offering on the cloud and pay per use. a.PaaS b.SaaS c.LaaS d.IaaS

46. Consumer is able to Deploy and _______ which may include operating systems and applications. a.Elastic Compute Cloud b. RackSpace Hosting

c. Joyent Cloud d. Run Arbitrary Software

47. EDVAC means a.Electronic Difference Variable Automatic Computer b.Electronic Discrete Variable Automatic Computer c.Enable Data variable Automatic Computer d.Electronic Secrect variable Automatic Computer

48. Licklider was founder for the creation of the _________. a.Internet Hardware b.Evolution c.Computing d. AR PANET

49. How many version of TCP/IP are there. a.7 b.6 c.4 d.8

50. Which Model is not Useful in most of the Applications. a.SISD b.MISD c.SIMD d.MIMD

51. The term message-based communication model can be used to refer to any model for_______. a.RPC b.NET c.COM d.IPC

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT II- MCQ 1. A ____________ is a Software system designed to support interoperable machine-to-machine interaction over a network. a.structure b.protocols c.web service d.modular

2. The ________ is carried out by special servers dedicated to generating the virtualized resource pool. a.data b.security c.cloud d.virtualization

3. ________ also aims to make service interoperability extensible and effective. a.Logical view b.message orientation c.description orientation d.Service oriented architecture

4. Attempt to change the configuration of resource used. a.CPU b.behavior sensitive instruction

c.privileged instruction d.control Sensitive instruction

5.How many types of virtualization in cloud. a.9 b.11 c.5 d.12

6. ________is the first approach for I/O Virtualization generally this approach emulates well known, real-world devices. a.direct I/O b.para virtualization c.virtual device d.full device emulation

7.REST architecture element are connectors , components and ________. a.control data b.resource c.data elements d.simplicity

8._______of an event means determing the subscribes that have to receive a published event. a.security b.timeless

c.trust d.reliable delivery

9. Types in web services technology. a.1 b.4 c.2 d.3

10._______tranfers the message from the publisher to the subscribers. a.event bus b.subscriber c.publisher d.receiver

11.________ allows to describe event schema at a higher level of abstraction. a.content based mmodel b.topic based model c.type based model d.concept based model

12.______ systems are now a days considered a key technology for information diffusion. a.xml blocks b.push stratergy c.publish /subscribe

d.event bus

13.REST stands for_______. a.resource static transfer b.receive static transfer c.regional state transfer d.representational state transfer

14.______is a specification of transport-neutral mechanism that allows web services to communicate addressing information. a.ws-resource lifetime b.ws-transaction c.ws-notification d.ws-addressing

15.__________ represent a more robust data model for application developer. a. Topic based Model b. Content based Model c. Concept based Model d. Type based Model

16._______ is a lesser extent in consolidating server hardware by moving services on separate hosts into containers or VMs on one server. a. User-Application Level b. Operating System Level c. Hardware Abstraction Level

d. Library Support Level

17._________ inserts a virtualization layer inside an operating system to partition a machine’s physical resources. a. Virtualization on Linux b. Middleware Support for Virtualization c. Virtualization Structures d. Operating system

18._______ technique removes the difficulty of implementing binary translation of full virtualization. a. Memory Virtualization b.CPU Virtualization c. Hardware Support for Virtualization d. Hardware-Assisted CPU Virtualization 19.________ pattern is a message pattern and a network oriented architectural pattern. a.virtual cluster b.web service c. Publish/Subscribe d.xml

20.________ requires the messages to be broadcasted into logical channels. a. Type based Model b. Content based Model c. Topic-based Model d. Concept based Model

21. The ________ does not have perfect knowledge of the status of the systems listening to the messages. a.subscriber b.publisher c.web service d.xml

22.Controls the execution , inspection and terminating of VM instances on the host where it runs. a.group manager b.instance manager c.cloud manager d.form manager

23.A ________ control center should be able to activate this clone VM in case of failure of the original VM. a.data b.virtualization c.cloud d.security

24._________ provides multiple/alternate representations of each resource. a.REST b.HTTP c.web service

d.URI

25._____virtualization needs to modify the guest operation system. a.para b.full c.binary d.host

26.______ are set of protocols that ensure security for SOAP-based messages. a. WS-ResourceLifetime b.Web Services Reliable Messaging c. WS-Addressing d. Web Services Security

27.A ______message consists of an envelope used by the applications to enclose information that need to be sent. a.REST b.SOAP c.web service d.xml

28. The task of verifying whenever an event e matches a subscription is called______. a.catching b.matching

c.multiprocessing d.REST

29. MIPS binary code can run on an _____based host machine with the help of ISA emulation. a.x85 b.x86 c.x76 d.x75

30. The basic emulation method is through______ interpretation. a.pattern b.code c.numeric d.virtualization

31. ________________ strategy is the responsibility of the publisher to notify all the subscribers. A. Pull B.Move C.Push D.Pick Answer: C

32._______________ is a software architecture style for distributed systems, particularly distributed hypermedia systems. A. SAOP B. HTTP C. REST

D. XML Answer: C

33. Which of the following is another name for the system virtual machine? A. Hardware Virtual Machine B. Software Virtual Machine C. Real Machine D. None of the Mentioned Answer:A

34.Which of the following provide system resource access to virtual machines? A.VMM B.VMC C.VNM D.All of the above Answer:A

35. Email service on cloud is an example of A. SaaS B. PaaS C. IaaS D. None of these

Answer: A 36. Cloud Bursting for load balancing between clouds is an example of A. Community cloud B. Public cloud C. Private cloud D. Hybrid cloud

Answer: D

37. Virtual machine supports migration from one host to another host. A. True B. False

Anser: A 38. Customer’s computer does not need the processing power or hard disk space demanded by the application running in the cloud. A. True B. b) False

39. What is the disadvantage of cloud computing? A. It requires constant internet connection. B. It does not support group collaboration. C. It provides limited storage. D. None of these.

Answer: A 40. Virtual machines are example of A. SaaS B. PaaS C. IaaS D. None of these

Answer: C

41. Adding more resources to a single computation unit is known as A. Vertical scale up B.

Horizontal scale out

C. None of these

Answer: A 42. Google docs is an example of

A. SaaS B. PaaS C. IaaS

Answer: A

43. Google App Engine is an example of A. SaaS B. PaaS C. IaaS

Answer: B 44. SaaS is useful in case of applications where extremely fast processing of real time data is needed. A. True B. False

Answer: B 45. Which of these is/are managed by the user in PaaS? A. Data B. Program C. Runtime D. All of these

Answer: A

46. ______________ is the drawback of public cloud. A. Availability B. Reliability C. Scalability D. Data Security Answer: D

47. _________________ is the advantage of using private cloud. A. Does not provide virtualized services B.Minimizes hardware usage C.Increases complexity D.Trust on Data Answer: D

48. ________________ provides a machine-readable description of how the service can be called. A. WSDL B. UDDI C. REST D. HTML

49. ____________ instructions attempt to change the configuration of resources used. A. Privileged instructions B. Control sensitive instructions C. Behavior-sensitive instructions D. Unprivileged instructions

50. _______________ is a subscriber cannot be notified for an information it is not interested in. A. B. C. D.

Safety (Legality) Safety (Validity) Liveness Timeliness

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS8791- CLOUD COMPUTING UNIT III- MCQ

1.SWIGGY.IN formed a cloud for its all branches but due to its limited resources it obtained the services of AWS for extended provisioning and thus modified its cloud; the cloud so formed is the example of _____________ a) b) c) d)

Private cloud Public cloud Hybrid cloud Community cloud

2.Which of the following is the best known service model? a) b) c) d)

SaaS IaaS PaaS All of the mentioned

3. Which of the following environment best describes WorkXpress? a) 3GL b) 4GL c) 5GL d) None of the mentioned 4.Which of the following module feature is provided by Drupal CMS? a) Traffic management b) OpenID authentication c) User interface creation tools d) All of the mentioned 5.Which of the following AppBase tool allows you to assign access rights to different objects in the system? a) Security Roles Management b) Dashboard Designer c) Report Builder d) All of the mentioned 6.Which of the following is most important area of concern in cloud computing?

a) b) c) d)

Security Storage Scalability All of the mentioned

7.Which of the architectural layer is used as backend in cloud computing? a) b) c) d)

Client Cloud Software Network

8.which is not a characteristics od SaaS? a) b) c) d)

Scalable Uses unused computing power Provide standard and high cpu Multi tennency

9. Cloud foundary is a _____________ a) b) c) d)

Industry wide PaaS initiative VM ware-led open source PaaS Factory that produces cloud components None of the above

10. which of the following architecture layer is used as front end in cloud computing? a) b) c) d)

Cloud Client Soft All of the above

11.which of the following is most feature of cloud storage listed below? a) b) c) d)

Logon authentication Bare file Multiplatform support Adequate bandwidth

12.Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15

c) 20 d) None of the mentioned 13.How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned 14.Which of the following is not a backup category? a) Full system backup b) Half system backup c) Image backup d) All of the mentioned 15.Which of the following backup is also referred to as snapshots? a) Point-in-time b) Differential c) Image backup d) All of the mentioned 16.Which of the following software supplies full system backup? a) Carbonite b) Ghost c) RDIFF-BACKUP d) All of the mentioned 17.The componentized nature of SaaS solutions enables many solutions to support a feature called _____________ a) workspace b) workloads c) mashups d) all of the mentioned 18.In particular, layers have which of the following characteristics? a) b) c) d)

Layers are by definition highly cohesive, thus satisfying the principle of cohesion Layers doesn’t support information hiding Layers are constrained to use only above layers All of the mentioned

19. What are the examples of cloud architectures on which application can run? a) Processing pipelines

b) Batch processing systems c) Websites d) All of the above 20.how many components required for cloud architecture? a) b) c) d)

10 2 5 3

21. what are the major building blocks of cloud architecture? a) b) c) d) e)

Technical architecture Reference architecture Operation architecture Deployment operation architecture Option a,b,d

22.what are the different components used in AWS? a) b) c) d)

Amazon S3 Amazon SQS Amazon EC2 All of the mentioned

23. Which of the following is the fundamental unit of virtualized client in an IaaS deployment? a) workunit b) workspace c) workload d) all of the mentioned 24.How many types of virtual private server instances are partitioned in an IaaS stack? a) one b) two c) three d) all of the mentioned 25. Which of the following correctly represents cloud computing ecosystem? a) Business Process

Application Services Platform Services Infrastructure Services

b) Application Process Business Services Platform Services Infrastructure Services c) Application Process Infrastructure Services Platform Services Infrastructure Services d) Business Process Application Services Infrastructure Services Platform Services

26. Which of the following element(s) in Azure stand(s) for management service? (a) config b) application c) virtual machines
...


Similar Free PDFs