McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .
201. |
Which of the following can be considered as a distributed caching system? |
A. | cnd |
B. | cdn |
C. | cwd |
D. | all of the mentioned |
Answer» B. cdn |
202. |
Amazon Relational Database Service is a variant of the 5.1 database system. |
A. | oracle |
B. | mysql |
C. | sql server |
D. | all of the mentioned |
Answer» B. mysql |
203. |
What are the different types of instances? |
A. | general purpose |
B. | computer optimized |
C. | storage optimized |
D. | all of the above |
Answer» D. all of the above |
204. |
The types of AMI provided by AWS are: |
A. | instance store backed |
B. | ebs backed |
C. | both a & b |
D. | none of the above |
Answer» C. both a & b |
205. |
Storage classes available with Amazon s3 are - |
A. | amazon s3 standard |
B. | amazon s3 standard- infrequent access |
C. | amazon glacier |
D. | all of the above |
Answer» D. all of the above |
206. |
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as . |
A. | web sphere |
B. | tivoli |
C. | nebula |
D. | altix |
Answer» B. tivoli |
207. |
Cloud system from SGI is functionally considered as an . |
A. | on-demand cloud computing service |
B. | on-demand cloud storage service |
C. | on-demand cloud accessing service |
D. | on-demand |
Answer» A. on-demand cloud computing service |
208. |
Cyclone is available in two service models as follows: |
A. | paas and iaas |
B. | saas and paas |
C. | saas and iaas |
D. | all of the above |
Answer» C. saas and iaas |
209. |
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient. |
A. | nebula cloud |
B. | cyclone cloud |
C. | force.com cloud |
D. | cern cloud |
Answer» A. nebula cloud |
210. |
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform |
A. | load setting facility |
B. | load sharing facility |
C. | load setting faculty |
D. | load assigning faculty |
Answer» B. load sharing facility |
211. |
One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False. |
A. | true |
B. | false |
Answer» A. true |
212. |
A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms |
A. | accessibility |
B. | mobility |
C. | agility |
D. | scalability |
Answer» C. agility |
213. |
The Cloudlets have a ownership unlike that of Clouds. |
A. | centralized |
B. | decentralized |
C. | global |
D. | none of the above |
Answer» B. decentralized |
214. |
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data. |
A. | htc |
B. | hpc |
C. | hcc |
D. | hac |
Answer» A. htc |
215. |
Performance metrics for HPC/HTC systems include : |
A. | multitasking scalability |
B. | security index |
C. | cost effectiveness |
D. | all of the above |
Answer» D. all of the above |
216. |
[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which of the following? |
A. | scalability |
B. | throughput |
C. | availability |
D. | effectiveness |
Answer» B. throughput |
217. |
refers to an increase in the performance by the addition of more resources along the service layers |
A. | horizontal scalability |
B. | vertical scalability |
C. | diagonal scalability |
D. | none of the above |
Answer» B. vertical scalability |
218. |
The percentage of time the system is up and running smoothly is referred as . |
A. | system up time |
B. | system scalability |
C. | system availability |
D. | system efficiency |
Answer» C. system availability |
219. |
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry |
A. | gps |
B. | cloud |
C. | iot |
D. | rfid |
Answer» D. rfid |
220. |
RFID stand for . |
A. | rangeable frequency identification |
B. | radio fragment identification |
C. | radio frequency identification |
D. | rangeable fragment identification |
Answer» C. radio frequency identification |
221. |
The architecture of IoT consists of different layers including which of the following? i. Application Layer
|
A. | i, ii, iv |
B. | i, iii, iv |
C. | ii, iii, iv |
D. | ii, iii, iv |
Answer» A. i, ii, iv |
222. |
tags contain battery and transmit signals autonomously |
A. | acitve rfid |
B. | passive rfid |
C. | battery-assisted passive rfid |
D. | battery-assisted rfid |
Answer» A. acitve rfid |
223. |
tags needs an external source to wake up the battery. |
A. | acitve rfid |
B. | passive rfid |
C. | battery-assisted passive rfid |
D. | battery-assisted active rfid |
Answer» C. battery-assisted passive rfid |
224. |
The three major components of RFID hardware based on functionality include : |
A. | rfid reader |
B. | reader antenna |
C. | reader |
D. | all of the above |
Answer» D. all of the above |
225. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
|
A. | i, ii, iii |
B. | i, ii, iii, iv |
C. | ii, iii, iv |
D. | i, ii, iv |
Answer» A. i, ii, iii |
226. |
Even with two-factor authentication, users may still be vulnerable to attacks. |
A. | scripting |
B. | cross attack |
C. | man-in-the-middle |
D. | radiant |
Answer» C. man-in-the-middle |
227. |
Process of identifying any individual |
A. | auditing |
B. | authorisation |
C. | authentication |
D. | accounting |
Answer» C. authentication |
228. |
Process that prevents someone from denying that she accessed resource |
A. | accounting |
B. | non-repudiation |
C. | sniffing |
D. | authorisation |
Answer» B. non-repudiation |
229. |
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? |
A. | making infrastructure vulnerable to malware |
B. | potential for noncompliance |
C. | data loss |
D. | all of the above |
Answer» D. all of the above |
230. |
Which of the following is not a correct way to secure communication layer |
A. | cloud initiated communication |
B. | tls/ssl |
C. | ips(intrusion prevention system) |
D. | firewalls |
Answer» A. cloud initiated communication |
231. |
Which of the following is not the component of IoT Endpoint |
A. | sensor |
B. | gateway |
C. | communication module |
D. | mcu |
Answer» B. gateway |
232. |
Which of the following makes sure that data is not changed when it not supposed to be? |
A. | integrity |
B. | availability |
C. | confidentiality |
D. | accounting |
Answer» A. integrity |
233. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
A. | availability |
B. | accounting |
C. | integrity |
D. | confidentiality |
Answer» D. confidentiality |
234. |
What is the full form of SCADA? |
A. | supervisory control and document acquisition |
B. | supervisory control and data acquisition |
C. | supervisory column and data assessment |
D. | supervisory column and data assessment |
Answer» B. supervisory control and data acquisition |
235. |
DCS is a |
A. | distributed control system |
B. | data control system |
C. | data column system |
D. | distributed column system |
Answer» A. distributed control system |
236. |
What is SCADA? |
A. | software |
B. | process |
C. | system |
D. | hardware |
Answer» B. process |
237. |
The control in SCADA is |
A. | online control |
B. | direct control |
C. | supervisory control |
D. | automatic control |
Answer» C. supervisory control |
238. |
When did the SCADA start? |
A. | 1980s |
B. | 1990s |
C. | 1970s |
D. | 1960s |
Answer» B. 1990s |
239. |
Which of the following is not the component of a SCADA system? |
A. | database server |
B. | i/o system |
C. | plc controller |
D. | sparger controller |
Answer» D. sparger controller |
240. |
Which of the following is the heart of a SCADA system? |
A. | plc |
B. | hmi |
C. | alarm task |
D. | i/o task |
Answer» D. i/o task |
241. |
RFID stands for? |
A. | random frequencyidentification |
B. | radio frequencyidentification |
C. | random frequencyinformation |
D. | radio frequencyinformation |
Answer» B. radio frequencyidentification |
242. |
Which of the following is not involved in working of IoT? |
A. | rfid |
B. | sensor |
C. | nano tech |
D. | server |
Answer» D. server |
243. |
M2M is a term introduced by |
A. | iot service providers |
B. | fog computing service providers |
C. | telecommunication service providers |
D. | none of these |
Answer» C. telecommunication service providers |
244. |
Which of these statements regarding sensors is TRUE? |
A. | sensors are input devices. |
B. | sensors can be analog as well as digital |
C. | sensors respond to some external stimuli. |
D. | all of these |
Answer» D. all of these |
245. |
Smart Dust can be used to measure the |
A. | temperature of the industrial lathe machine |
B. | heat inside a computer’s cpu |
C. | chemical in the soil |
D. | strength of a solid material |
Answer» C. chemical in the soil |
246. |
In threat modeling, what methodology used to perform risk analysis |
A. | dread |
B. | owasp |
C. | stride |
D. | dar |
Answer» A. dread |
247. |
Out of the following which is not element of threat modelling |
A. | asset |
B. | vulnerability |
C. | threat |
D. | time |
Answer» D. time |
248. |
Request field is present in which message format? |
A. | request message |
B. | response message |
C. | both request and response |
D. | neither request nor response |
Answer» A. request message |
249. |
CoAP is specialized for |
A. | internet applications |
B. | device applications |
C. | wireless applications |
D. | wired applications |
Answer» A. internet applications |
250. |
Which layer is CoAP? |
A. | control layer |
B. | transport layer |
C. | service layer |
D. | application layer |
Answer» C. service layer |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.