84
72.2k

1120+ Cloud Computing Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .

251.

CoAP provides which of the following requirements?

A. multicast support and simplicity
B. low overhead and multicast support
C. simplicity and low overhead
D. multicast support, low over head, and simplicity
Answer» D. multicast support, low over head, and simplicity
252.

CoAP is a specialized protocol.

A. web transfer
B. power
C. application
D. resource
Answer» A. web transfer
253.

URI and content type support is which protocol feature?

A. http
B. udp
C. coap
D. spi
Answer» C. coap
254.

What is the full form of WLAN?

A. wide local area network
B. wireless local area network
C. wireless land access network
D. wireless local area node
Answer» B. wireless local area network
255.

Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» C. ieee 802.11
256.

Which of the following is not a characteristic of a ZigBee network?

A. low power consumption
B. easy installation.
C. high data rates.
D. unlicensed radio bands.
Answer» C. high data rates.
257.

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» D. ieee 802.15.4.
258.

Which of the following layers are defined by the ZigBee stack?

A. transport layer
B. physical layer.
C. application support sub-layer.
D. medium access layer
Answer» D. medium access layer
259.

What is the typical range of transmission distance in a ZigBee network?

A. 5 m.
B. 50 m.
C. 500 m.
D. 5 km
Answer» B. 50 m.
260.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. cross-site scoring scripting
B. cross-site request forgery
C. two-factor authentication
D. cross-site scripting
Answer» D. cross-site scripting
261.

Representational State Transfer (REST) is the standard interface between

A. two machines in a lan
B. http client and user
C. http client and servers
D. none of the above
Answer» C. http client and servers
262.

Which of the following is not a messaging mode in CoAP?

A. confirmable
B. separate
C. direct
D. piggyback
Answer» C. direct
263.

Which of the following is the full form of XMPP?

A. extension messaging and presence protocol
B. extensible messaging and presence protocol
C. extension messaging and privacy protocol
D. extensible messaging and privacy protocol
Answer» B. extensible messaging and presence protocol
264.

In 6LoWPAN address, how many bits are globally unique?

A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
Answer» C. 64 bits
265.

IEEE 802.15.4 uses which of the following for accessing the channel?

A. carrier sense multiple access (csma)
B. carrier sense multiple access with collision detection (csma-cd)
C. carrier sense multiple access with collision avoidance (csma-ca)
D. none of these
Answer» C. carrier sense multiple access with collision avoidance (csma-ca)
266.

Three parts of GPS include:

A. space segment
B. control segment
C. user segment
D. all of the above
Answer» D. all of the above
267.

In case of , the GPS works as a receiver, not a transmitter.

A. active tracking
B. passive tracking
C. assisted tracking
D. receiver tracking
Answer» B. passive tracking
268.

                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A. cloud-physical system
B. cyber-space system
C. cyber-physical system
D. none of the above
Answer» C. cyber-physical system
269.

The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A. node degree
B. path length
C. social circle
D. bridge
Answer» A. node degree
270.

                 is the degree to which nodes have a common set of connections to other nodes

A. structural hole
B. structural equivalence
C. structural cohesion
D. none of the above
Answer» C. structural cohesion
271.

The degree to which actors are directly linked to one another through cohesive bonds is called as .

A. closeness
B. cohesion
C. centralized
D. path length
Answer» B. cohesion
272.

The social circles are loosely coupled if there is                   stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» A. less
273.

The measures of centrality include:

A. betweenness
B. closeness
C. degree
D. all of the above
Answer» D. all of the above
274.

Arrange the stages in supply chain management:
i. Material and Equipment Supplies
ii. Delivery of Products
iii. After Sale Service and Returns
iv. Planning and Coordination
v. Manufacturing and Testing

A. iv, v, i, ii, iii
B. iv, i, v, iii, ii
C. iv, i, v, ii, iii
D. i, ii, iv, v, ii
Answer» C. iv, i, v, ii, iii
275.

Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

A. actors
B. nodes
C. users
D. both a and b
Answer» D. both a and b
276.

Which is the latest Operating System?

A. real-time os
B. desktop os
C. mainframe os
D. cloud os
Answer» D. cloud os
277.

JOES stands for                  

A. joint expensive operating system
B. just expensive operating system
C. just enough operating system
D. joined environmental operating system
Answer» C. just enough operating system
278.

Responsibility of OS developers to add new feature in existing OS are

A. more reliability
B. convenience and security
C. compatibility
D. all of the above
Answer» D. all of the above
279.

In future, companies wont worry about the capital for large data center because of                        

A. saas solution
B. paas solution
C. iaas solution
D. none of the above
Answer» B. paas solution
280.

                   is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability

A. cometcloud
B. asteroidcloud
C. starcloud
D. planetcloud
Answer» A. cometcloud
281.

CometCloud supports policy based autonomic      and      

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» D. both a and b
282.

Which are the three conceptual layers in CometCloud?

A. development, application, physical
B. infrastructure, dynamic, static
C. transport, network, programming
D. programming, service, infrastructure
Answer» D. programming, service, infrastructure
283.

In Comet, a tuple is a simple        string

A. java
B. python
C. xml
D. html
Answer» C. xml
284.

Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

A. deadline-based
B. budget-based
C. quality-based
D. workload-based
Answer» C. quality-based
285.

The cloud media services are:

A. cloud gaming
B. experiencing multi- screens
C. image processing
D. all of the above
Answer» D. all of the above
286.

KPI stands for

A. key practices in industry
B. key performance index
C. key performance indicators
D. key parameters in information
Answer» C. key performance indicators
287.

SEEP is used in                    

A. energy optimization
B. multimedia
C. information leakage
D. cost reduction
Answer» A. energy optimization
288.

SEEP stands for                    

A. system end to end protocol
B. static environmental execution process
C. symbolic execution and energy profiles
D. state execution and energy profiles
Answer» C. symbolic execution and energy profiles
289.

Keywords in Docker are                  

A. develop, ship, run anywhere
B. create, export
C. transport, cloud
D. user, data, privacy
Answer» A. develop, ship, run anywhere
290.

Docker can simplify both,          and          

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» C. workflows, communication
291.

Basic approach of Docker as a company is:

A. “batteries included but removable”
B. “batteries included but non-removable”
C. “batteries but chargeable”
D. “battery less execution”
Answer» A. “batteries included but removable”
292.

Which containers are used by Docker severs?

A. windows
B. android
C. linux
D. mac
Answer» C. linux
293.

Two main components in Docker are:

A. master, slave
B. client, server
C. client, master
D. all of the above
Answer» B. client, server
294.

Docker is generally configured to use TCP port          while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» C. 2375
295.

Docker is generally configured to use TCP port          while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
296.

Containers require less disk space as compared to virtual machine

A. true
B. false
Answer» A. true
297.

There is no built-in framework in Docker for testing.

A. true
B. false
Answer» A. true
298.

Docker provides simple one-line deployment strategy.

A. true
B. false
Answer» A. true
299.

The examples of deployment tools are:

A. docker’s storm
B. new relic’s centurion
C. spotify’s helios
D. all of the above
Answer» D. all of the above
300.

CNS stands for                      

A. consumption near sweet-spot
B. continuous network system
C. compact neural system
D. compound near sweet-sp0t
Answer» A. consumption near sweet-spot

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.