Cloud Computing/Cloud Computing Mcq Set 5 Sample Test,Sample questions

Question:
           is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

1.cloud-physical system

2.cyber-space system

3.cyber-physical system

4.None of the above


Question:
         is the degree to which nodes have a common set of connections toother nodes

1.structural hole

2.structuralequivalence

3.structural cohesion

4.none of the above


Question:
     is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability

1.cometcloud

2.asteroidcloud

3.starcloud

4.planetcloud


Question:
 automatically identifying a Web user's location

1.voice portal

2.geolocation

3.sensor network

4.wimax


Question:
 Basic approach of Docker as a company is:

1.“batteries included but removable”

2.batteries included but non-removable”

3.batteries but chargeable

4.“battery less execution”


Question:
 CometCloud supports policy based autonomic      and      

1.cloudbursting

2.cloudbridging

3.none

4.both a and b


Question:
 Keywords in Docker are    

1.develop, ship, run anywhere

2.create, export

3.transport, cloud

4.user, data, privacy


Question:
 Process that prevents someone from denying that she accessed resource

1. accounting

2.non-repudiation

3.sniffing

4.authorisation


Question:
 Responsibility of OS developers to add new feature in existing OS are

1.more reliability

2.convenience and security

3.compatibility

4.All of the above


Question:
 What is the full form of WLAN?

1.wide local areanetwork

2.wireless local areanetwork

3.wireless land accessnetwork

4.wireless local areanode


Question:
 When did the SCADA start?

1.1980s

2.1990s

3.1970s

4.1960s


Question:
 Which are the three conceptual layers in CometCloud?

1. development, application, physical

2. infrastructure, dynamic, static

3. transport, network, programming

4.programming, service, infrastructure


Question:
 Which of the following can be considered as a distributed caching system?

1.cnd

2.cdn

3.cwd

4.All of the mentioned


Question:
 Which of the following is relational database service provided by Amazon?

1.simpledb

2.sql server

3.oracle

4.rds


Question:
 Which of the following is Type 2 VM?

1.virtuallogix vlx

2.vmware esx

3.xen

4.lynxsecure


Question:
 Which of the following layers are defined by the ZigBee stack?

1. transport layer

2.physical layer

3.application supportsub-layer.

4.medium access layer


Question:
 Which of the following should be placed in second lowermost layer for the following figure?

1.host operating system

2.software

3.vm

4.None of the mentioned


Question:
 Which of the following will be the host operating system for Windows Server?

1.virtuallogix vlx

2.microsoft hyper-v

3.xen

4.All of the mentioned


Question:
. Docker is generally configured to use TCP port          while executing unencrypted traffic

1. 3306

2.53378

3.2375

4.2376


Question:
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes

1.voice portal

2.mobile portal

3.geolocation

4.sensor network


Question:
a technology that offers Internet browsing from wireless devices

1.real-time location system (rtls)

2.wireless wide area network (wwan)

3. wireless local area network (wlan)

4.wireless application protocol (wap)


Question:
Amazon Web Services falls into which of the following cloud-computingcategory?

1.platform as a service

2.software as a service

3.infrastructure as aservice

4.back-end as a service


Question:
AMIs are operating systems running on the            virtualization hypervisor.

1.yen

2.xen

3.ben

4.multi-factorauthentication


Question:
An operating system running on a Type             VM is full virtualization.

1.1

2.2

3.3

4.None of the mentioned


Question:
Arrange the stages in supply chain management:
i. Material and Equipment Supplies
ii. Delivery of Products
iii. After Sale Service and Returns
iv. Planning and Coordination
v. Manufacturing and Testing

1. iv, v, i, ii, iii

2. iv, i, v, iii, ii

3.iv, i, v, ii, iii

4.i, ii, iv, v, ii


Question:
Based on PageRank algorithm, Google returns                      for a query that is parsed for its keywords.

1.sep

2.sap

3.serp

4.business objects build


Question:
Cloud system from SGI is functionally considered as an            

1. on-demand cloudcomputing service

2. on-demand cloudstorage service

3.on-demand cloudaccessing service

4. on-demand


Question:
CNS stands for      

1.consumption near sweet-spot

2.continuous network system

3.compact neural system

4.compound near sweet-sp0t


Question:
CoAP is a specialized protocol.

1.web transfer

2.power

3.application

4.resource


Question:
CoAP is specialized for

1. A. internet applications

2.device applications

3.wireless applications

4.wired applications


Question:
Computing capabilities embedded in the environment but typically not mobile

1.mobile portal

2.pervasive computing

3.context-aware computing

4.voice portal


Question:
Computing capabilities embedded into objects around us (mobile and stationary)

1. pervasive computing

2.ubiquitous computing (ubicom)

3.context-aware computing

4.geolocation


Question:
Docker can simplify both,          and   

1.process, state

2.behavior, aspect

3.workflows, communication

4.all of the above


Question:
Docker is generally configured to use TCP port          while managing encrypted traffic.

1.3306

2.53378

3.2375

4.2376


Question:
Dynamic content presented in Google               crawling isn’t normally indexed.

1.ajax

2.java

3.javascript

4.All of the mentioned


Question:
gateway to the Internet optimized for mobility

1.voice portal

2.wimax

3.mobile enterprise

4.mobile portal


Question:
IEEE 802.15.4 uses which of the following for accessing the channel?

1.carrier sense multiple access (csma)

2.carrier sense multiple access with collision detection (csma-cd)

3.carrier sense multiple access with collision avoidance (csma-ca)

4.None of These


Question:
In 6LoWPAN address, how many bits are globally unique?

1. 16 bits

2.32 bits

3.64 bits

4.128 bits


Question:
In case of , the GPS works as a receiver, not a transmitter.

1.active tracking

2.passive tracking

3.assisted tracking

4.receiver tracking


Question:
In Comet, a tuple is a simple        string

1.java

2.python

3.xml

4.html


Question:
In future, companies wont worry about the capital for large data center because of

1. saas solution

2.paas solution

3.iaas solution

4. none of the above


Question:
JOES stands for                 

1.joint expensive operating system

2.just expensive operating system

3. just enough operating system

4. joined environmental operating system


Question:
KPI stands for          

1.key practices in industry

2. key performance index

3.key performance indicators

4.key parameters in information


Question:
NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

1.nebula cloud

2.cyclone cloud

3.force.com cloud

4.cern cloud


Question:
Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

1. actors

2.nodes

3.users

4. both a and b


Question:
Out of the following which is not element of threat modelling

1.asset

2.vulnerability

3.threat

4. time


Question:
Point out the correct statement.

1.with paas, the goal is to create hosted scalable applications that are used in a software as a service model

2.applications built using paas tools need to be standards-based

3.in wolf, the data and transaction management conforms to the business rules you create

4.All of the mentioned


Question:
Point out the wrong statement.

1. load balancing virtualizes systems and resources by mapping a logical address to a physical address

2.multiple instances of various google applications are running on different hosts

3. google uses hardware virtualization

4.all of the mentioned


Question:
Point out the wrong statement.

1.wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database

2.applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content

3.google applications are cloud-based applications

4.None of the mentioned


Question:
Point out the wrong statement.

1.amazon machine instances are sized at various levels and rented on a computing/hour basis

2. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

3. a number of tools are used to support ec2 services

4.None of the mentioned


Question:
Representational State Transfer (REST) is the standard interface between

1.two machines in alan

2.http client and user

3.http client andservers

4.None of the above


Question:
SEEP is used in              

1.energy optimization

2.multimedia

3.information leakage

4.cost reduction


Question:
SEEP stands for           

1.system end to end protocol

2.static environmental execution process

3. symbolic execution and energy profiles

4.state execution and energy profiles


Question:
short-range radio frequency communication technology for remotely storing and retrieving data using devices called        tags and        readers

1.network-based positioning

2.real-time location system (rtls)

3.radio frequency identification (rfid)

4.wireless wide area network (wwan)


Question:
systems used to track and identify the location of objects in real time

1.geolocation

2.geographical information system (gis)

3.wireless application protocol (wap)

4.real-time location system (rtls)


Question:
The cloud media services are:

1. cloud gaming

2.experiencing multi-screens

3.image processing

4.all of the above


Question:
The Data-Intensive Scalable Computing(DISC) utilizes a                  data-centerclusters to gather and maintain data.

1.htc

2.hpc

3.hcc

4.hac


Question:
The degree to which actors are directly linked to one another throughcohesive bonds is called as .

1.closeness

2.cohesion

3.centralized

4. path length


Question:
The examples of deployment tools are:

1.docker’s storm

2.new relic’s centurion

3.spotify’s helios

4.All of the above


Question:
The examples of deployment tools are:

1.docker’s storm

2.new relic’s centurion

3. spotify’s helios

4.All of the above


Question:
The measures of centrality include:

1.betweenness

2.closeness

3.degree

4.All of the above


Question:
The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as .

1.node degree

2.path length

3.social circle

4.bridge


Question:
The output of the reduce task is typically written to the FileSystem via                            

1.outputcollector.collect

2.outputcollector.get

3.outputcollector.receive

4. outputcollector.put


Question:
The social circles are loosely coupled if there is                   stringency of direct contact.

1. less

2.more

3.equal

4.no


Question:
Three parts of GPS include:

1.space segment

2.control segment

3.user segment

4.All of the above


Question:
Two main components in Docker are:

1.master, slave

2.client, server

3.client, master

4.All of the above


Question:
URI and content type support is which protocol feature?

1. http

2.udp

3.coap

4.spi


Question:
Vehicle mount solutions
• Handheld solutions
• Hands-free and voice solutions

1.mobile enterprise

2.wireless wide area network (wwan)

3. typical mobile devices used in warehouses

4.interactive voice response (ivr)


Question:
What is SCADA?

1. software

2.process

3.system

4.hardware


Question:
What is the typical range of transmission distance in a ZigBee network?
A. 5 m.

B. 
C. 
D. 

1.5 m.

2.50 m.

3.500 m.

4.5 km


Question:
Which containers are used by Docker severs?

1.windows

2.android

3.linux

4.mac


Question:
Which of the following is not a characteristic of a ZigBee network?

1.low powerconsumption

2.easy installation.

3.high data rates

4.unlicensed radiobands


Question:
Which of the following is not a correct way to secure communication layer

1. cloud initiated communication

2.tls/ssl

3.ips(intrusion prevention system)

4.firewalls


Question:
Which of the following is not a messaging mode in CoAP?

1.confirmable

2.separate

3.direct

4.piggyback


Question:
Which of the following is not involved in working of IoT?

1. rfid

2.sensor

3.nano tech

4.server


Question:
Which of the following is not provided by “Deep Web”?

1. database generated web pages

2.private or limited access web pages

3.pages without links

4.All of the mentioned


Question:
Which of the following is the full form of XMPP?

1.extension messaging and presenceprotocol

2.extensible messaging and presenceprotocol

3.extension messaging and privacy protocol

4.extensible messaging and privacy protocol


Question:
Which of the following is the heart of a SCADA system?

1. plc

2.hmi

3.alarm task

4. i/o task


Question:
Which of the following metrics are used to support Elastic Load Balancing?

1.cloudwatch

2.amazon elastic blockstore

3.aws import/export

4.All of the mentioned


Question:
Which of the following operation retrieves the newest version of the object?

1.put

2.get

3.post

4.copy


Question:
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

1.deadline-based

2.budget-based

3.quality-based

4.workload-based


Question:
Which of the following provide system resource access to virtual machines?

1. vmm

2.vmc

3.vnm

4.None of the mentioned


Question:
Which of the following should be used considering factors shown in thefigure?

1.simpledb

2.rds

3.amazon ec2

4.All of the mentioned


Question:
Which of these statements regarding sensors is TRUE?

1. sensors are input devices.

2.sensors can be analog as well as digital

3.sensors respond to some external stimuli.

4.All of the above


Question:
Which type of Hypervisor is shown in the following figure?

1. type 1

2.type 2

3.type 3

4.All of the mentioned


More MCQS

  1. Cloud Computing Mcq Set 1
  2. Computer Science & Engineering Cloud Computing MCQs Part 2
  3. Cloud Computing Mcq
  4. Cloud Computing Multiple Choice Questions
  5. Cloud Computing Mcq Set 1
  6. Cloud Computing Mcq Set 2
  7. Cloud Computing Mcq Set 3
  8. Cloud Computing Mcq Set 4
  9. Cloud Computing Mcq Set 5
  10. Cloud Computing Mcq Set 6
  11. High Performance Computing Set 3
  12. High Performance Computing Set 4
  13. High Performance Computing Set 5
  14. High Performance Computing Set 6
Search
Olete Team
Online Exam TestTop Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on Online Exam Testwebsite is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!