1120+ Cloud Computing Solved MCQs

601.

CloudFront supports data by performing static data transfers and streaming content from one CloudFront location to another.

A. table caching
B. geocaching
C. index caching
D. windows media server
Answer» B. geocaching
602.

Point out the correct statement.

A. a volume is mounted on a particular instance and is available to all instances
B. the advantages of an ebs boot partition are that you can have a volume up to 1tb
C. you cannot mount multiple volumes on a single instance
D. all of the mentioned
Answer» B. the advantages of an ebs boot partition are that you can have a volume up to 1tb
603.

Data stored in domains doesn’t require maintenance of a schema.

A. simpledb
B. sql server
C. oracle
D. rds
Answer» A. simpledb
604.

Amazon Web Services falls into which of the following cloud-computing category?

A. platform as a service
B. software as a service
C. infrastructure as a service
D. back-end as a service
Answer» C. infrastructure as a service
605.

AWS reaches customers in _countries.

A. 137
B. 182
C. 190
D. 86
Answer» C. 190
606.

Which of the following correctly describes components roughly in their order of importance from top to down?

A. 1. amazon elastic compute cloud 2. amazon simple storage system 3. amazon elastic block store
B. 1. amazon elastic block store 2. amazon elastic compute cloud 3. amazon simple storage system
C. 1. amazon simple storage system 2. amazon elastic block store 3. amazon elastic compute cloud
D. none of the mentioned
Answer» A. 1. amazon elastic compute cloud 2. amazon simple storage system 3. amazon elastic block store
607.

  is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.

A. ec2
B. azure
C. ec5
D. none of the mentioned
Answer» A. ec2
608.

AMIs are operating systems running on the virtualization hypervisor.

A. yen
B. xen
C. ben
D. multi-factor authentication
Answer» B. xen
609.

Which of the following instance class is best used for applications that are processor or compute-intensive?

A. standard instances
B. high memory instances
C. high cpu instances
D. none of the mentioned
Answer» C. high cpu instances
610.

Amazon Relational Database Service is a variant of the 5.1 database system.

A. oracle
B. mysql
C. sql server
D. all of the mentioned
Answer» B. mysql
611.

IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .

A. web sphere
B. tivoli
C. nebula
D. altix
Answer» B. tivoli
612.

Cloud system from SGI is functionally considered as an _.

A. on-demand cloud computing service
B. on-demand cloud storage service
C. on-demand cloud accessing service
D. on-demand
Answer» A. on-demand cloud computing service
613.

NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A. nebula cloud
B. cyclone cloud
C. force.com cloud
D. cern cloud
Answer» A. nebula cloud
614.

To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform

A. load setting facility
B. load sharing facility
C. load setting faculty
D. load assigning faculty
Answer» B. load sharing facility
615.

A mashup cloud can be designed by utilizing the Scalability of AWS and   of GAE platforms

A. accessibility
B. mobility
C. agility
D. scalability
Answer» C. agility
616.

The Cloudlets have a ownership unlike that of Clouds.

A. centralized
B. decentralized
C. global
D. none of the above
Answer» B. decentralized
617.

The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.

A. htc
B. hpc
C. hcc
D. hac
Answer» A. htc
618.

Performance metrics for HPC/HTC systems include :

A. multitasking scalability
B. security index
C. cost effectiveness
D. all of the above
Answer» D. all of the above
619.

[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equation calculates the value of which of the following?

A. scalability
B. throughput
C. availability
D. effectiveness
Answer» B. throughput
620.

  refers to an increase in the performance by the addition of more resources along the service layers

A. horizontal scalability
B. vertical scalability
C. diagonal scalability
D. none of the above
Answer» B. vertical scalability
621.

  is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

A. gps
B. cloud
C. iot
D. rfid
Answer» D. rfid
622.

RFID stand for .

A. rangeable frequency identification
B. radio fragment identification
C. radio frequency identification
D. rangeable fragment identification
Answer» C. radio frequency identification
623.

The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer

A. i, ii, iv
B. i, iii, iv
C. ii, iii, iv
D. ii, iii, iv
Answer» A. i, ii, iv
624.

  tags needs an external source to wake up the battery.

A. acitve rfid
B. passive rfid
C. battery-assisted passive rfid
D. battery-assisted active rfid
Answer» C. battery-assisted passive rfid
625.

Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor

A. i, ii, iii
B. i, ii, iii, iv
C. ii, iii, iv
D. i, ii, iv
Answer» A. i, ii, iii
626.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» C. man-in-the-middle
627.

Which of the following is not the component of IoT Endpoint

A. sensor
B. gateway
C. communication module
D. mcu
Answer» B. gateway
628.

Which of the following makes sure that data is not changed when it not supposed to be?

A. integrity
B. availability
C. confidentiality
D. accounting
Answer» A. integrity
629.

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A. availability
B. accounting
C. integrity
D. confidentiality
Answer» D. confidentiality
630.

DCS is a  

A. distributed control system
B. data control system
C. data column system
D. distributed column system
Answer» A. distributed control system
631.

RFID stands for?

A. random frequency identification
B. radio frequency identification
C. random frequency information
D. radio frequency information
Answer» B. radio frequency identification
632.

M2M is a term introduced by

A. iot service providers
B. fog computing service providers
C. telecommunication service providers
D. none of these
Answer» C. telecommunication service providers
633.

Smart Dust can be used to measure the

A. temperature of the industrial lathe machine
B. heat inside a computer’s cpu
C. chemical in the soil
D. strength of a solid material
Answer» C. chemical in the soil
634.

Request field is present in which message format?

A. request message
B. response message
C. both request and response
D. neither request nor response
Answer» A. request message
635.

CoAP provides which of the following requirements?

A. multicast support and simplicity
B. low overhead and multicast support
C. simplicity and low overhead
D. multicast support, low over head, and simplicity
Answer» D. multicast support, low over head, and simplicity
636.

CoAP is a specialized protocol.

A. web transfer
B. power
C. application
D. resource
Answer» A. web transfer
637.

What is the full form of WLAN?

A. wide local area network
B. wireless local area network
C. wireless land access network
D. wireless local area node
Answer» B. wireless local area network
638.

Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» C. ieee 802.11
639.

Which of the following is not a characteristic of a ZigBee network?

A. low power consumption
B. easy installation.
C. high data rates.
D. unlicensed radio bands.
Answer» C. high data rates.
640.

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» D. ieee 802.15.4.
641.

Which of the following layers are defined by the ZigBee stack?

A. transport layer
B. physical layer.
C. application support sub-layer.
D. medium access layer
Answer» D. medium access layer
642.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. cross-site scoring scripting
B. cross-site request forgery
C. two-factor authentication
D. cross-site scripting
Answer» D. cross-site scripting
643.

Representational State Transfer (REST) is the standard interface between

A. two machines in a lan
B. http client and user
C. http client and servers
D. none of the above
Answer» C. http client and servers
644.

Which of the following is the full form of XMPP?

A. extension messaging and presence protocol
B. extensible messaging and presence protocol
C. extension messaging and privacy protocol
D. extensible messaging and privacy protocol
Answer» B. extensible messaging and presence protocol
645.

In case of , the GPS works as a receiver, not a transmitter.

A. active tracking
B. passive tracking
C. assisted tracking
D. receiver tracking
Answer» B. passive tracking
646.

  is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A. cloud-physical system
B. cyber-space system
C. cyber-physical system
D. none of the above
Answer» C. cyber-physical system
647.

The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A. node degree
B. path length
C. social circle
D. bridge
Answer» A. node degree
648.

  is the degree to which nodes have a common set of connections to other nodes

A. structural hole
B. structural equivalence
C. structural cohesion
D. none of the above
Answer» C. structural cohesion
649.

The degree to which actors are directly linked to one another through cohesive bonds is called as .

A. closeness
B. cohesion
C. centralized
D. path length
Answer» B. cohesion
650.

The social circles are loosely coupled if there is stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» A. less
651.

Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.

A. actors
B. nodes
C. users
D. both a and b
Answer» D. both a and b
652.

JOES stands for  

A. joint expensive operating system
B. just expensive operating system
C. just enough operating system
D. joined environmental operating system
Answer» C. just enough operating system
653.

In future, companies wont worry about the capital for large data center because of  

A. saas solution
B. paas solution
C. iaas solution
D. none of the above
Answer» B. paas solution
654.

  is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability

A. cometcloud
B. asteroidcloud
C. starcloud
D. planetcloud
Answer» A. cometcloud
655.

CometCloud supports policy based autonomic and  

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» D. both a and b
656.

In Comet, a tuple is a simple string

A. java
B. python
C. xml
D. html
Answer» C. xml
657.

The cloud media services are:

A. cloud gaming
B. experiencing multi- screens
C. image processing
D. all of the above
Answer» D. all of the above
658.

KPI stands for  

A. key practices in industry
B. key performance index
C. key performance indicators
D. key parameters in information
Answer» C. key performance indicators
659.

SEEP is used in  

A. energy optimization
B. multimedia
C. information leakage
D. cost reduction
Answer» A. energy optimization
660.

SEEP stands for  

A. system end to end protocol
B. static environmental execution process
C. symbolic execution and energy profiles
D. state execution and energy profiles
Answer» C. symbolic execution and energy profiles
661.

Keywords in Docker are  

A. develop, ship, run anywhere
B. create, export
C. transport, cloud
D. user, data, privacy
Answer» A. develop, ship, run anywhere
662.

Docker can simplify both, and  

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» C. workflows, communication
663.

Docker is generally configured to use TCP port while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» C. 2375
664.

Docker is generally configured to use TCP port while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
665.

CNS stands for  

A. consumption near sweet-spot
B. continuous network system
C. compact neural system
D. compound near sweet-sp0t
Answer» A. consumption near sweet-spot
666.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers

A. network-based positioning
B. real-time location system (rtls)
C. radio frequency identification (rfid)
D. wireless wide area network (wwan)
Answer» C. radio frequency identification (rfid)
667.

delivery of m-commerce transactions to individuals in a specific location, at a specific time

A. location-based m- commerce (l- commerce)
B. context-aware computing
C. ubiquitous computing (ubicom)
D. network-based positioning
Answer» A. location-based m- commerce (l- commerce)
668.

Calculating the location of a mobile device from signals sent by the device to base stations

A. personal area network (pan)
B. terminal-based positioning
C. pervasive computing
D. network-based positioning
Answer» B. terminal-based positioning
669.

a website with an audio interface that can be accessed through a telephone call

A. wimax
B. geolocation
C. mobile portal
D. voice portal
Answer» D. voice portal
670.

computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information

A. personal area network (pan)
B. interactive voice response (ivr)
C. real-time location system (rtls)
D. geographical information system (gis)
Answer» D. geographical information system (gis)
671.

application of mobile computing inside the enterprise (e.g., for improved communication among employees)

A. sensor network
B. mobile enterprise
C. voice portal
D. mobile portal
Answer» B. mobile enterprise
672.

                   computing refers to applications and services that run on a distributed network using virtualized resources.

A. distributed
B. cloud
C. soft
D. parallel
Answer» B. cloud
673.

                 as a utility is a dream that dates from the beginning of the computing industry itself.

A. model
B. computing
C. software
D. all of the mentioned
Answer» B. computing
674.

Which of the following is essential concept related to Cloud?

A. reliability
B. productivity
C. abstraction
D. all of the mentioned
Answer» C. abstraction
675.

Which of the following cloud concept is related to pooling and sharing of resources?

A. polymorphism
B. abstraction
C. virtualization
D. none of the mentioned
Answer» C. virtualization
676.

                 has many of the characteristics of what is now being called cloud computing.

A. internet
B. softwares
C. web service
D. all of the mentioned
Answer» A. internet
677.

Which of the following can be identified as cloud?

A. web applications
B. intranet
C. hadoop
D. all of the mentioned
Answer» C. hadoop
678.

Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a                  resource.

A. real
B. virtual
C. cloud
D. none of the mentioned
Answer» B. virtual
679.

Which of the following is Cloud Platform by Amazon?

A. azure
B. aws
C. cloudera
D. all of the mentioned
Answer» B. aws
680.

                                 is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.

A. remote sensing
B. remote invocation
C. cloud computing
D. private computing
Answer» C. cloud computing
681.

Which of the following is not a cloud stakeholder?

A. cloud providers
B. clients
C. end users
D. cloud users
Answer» B. clients
682.

These cloud services are of the form of utility computing i.e. the                    uses these services pay-as-you-go model.

A. cloud providers
B. clients
C. end users
D. cloud users
Answer» D. cloud users
683.

Which of the following is not a type of cloud?

A. private
B. public
C. protected
D. hybrid
Answer» C. protected
684.

In this type of cloud, an organization rents cloud services from cloud providers on- demand basis.

A. private
B. public
C. protected
D. hybrid
Answer» B. public
685.

In this type of cloud, the cloud is composed of multiple internal or external cloud.

A. private
B. public
C. protected
D. hybrid
Answer» D. hybrid
686.

                           enables the migration of the virtual image from one physical machine to another.

A. visualization
B. virtualization
C. migration
D. virtual transfer
Answer» B. virtualization
687.

Most of the cloud architectures are built on this type of architecture.

A. skeleton
B. grid
C. linear
D. template
Answer» B. grid
688.

Saas stands for?

A. software as a service
B. system software and services
C. software as a system
D. system as a service
Answer» A. software as a service
689.

In distributed system, each processor has its own                        

A. local memory
B. clock
C. both local memory and clock
D. none of the mentioned
Answer» C. both local memory and clock
690.

If one site fails in distributed system then

A. the remaining sites can continue operating
B. all the sites will stop working
C. directly connected sites will stop working
D. none of the mentioned
Answer» A. the remaining sites can continue operating
691.

Network operating system runs on

A. server
B. every system in the network
C. both server and every system in the network
D. none of the mentioned
Answer» A. server
692.

Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?

A. cache coherence scheme
B. computation migration
C. remote procedure call
D. message passing
Answer» B. computation migration
693.

Logical extension of computation migration is                        

A. process migration
B. system migration
C. thread migration
D. data migration
Answer» A. process migration
694.

Processes on the remote systems are identified by                        

A. host id
B. host name and identifier
C. identifier
D. process id
Answer» B. host name and identifier
695.

In distributed systems, link and site failure is detected by                        

A. polling
B. handshaking
C. token passing
D. none of the mentioned
Answer» B. handshaking
696.

The capability of a system to adapt the increased service load is called                        

A. scalability
B. tolerance
C. capacity
D. none of the mentioned
Answer» A. scalability
697.

Internet provides                for remote login.

A. telnet
B. http
C. ftp
D. rpc
Answer» A. telnet
698.

Which of the following was one of the top 5 cloud applications in 2010?

A. cloud backup
B. web applications
C. business applications
D. all of the mentioned
Answer» D. all of the mentioned
699.

Point out the correct statement.

A. google’s cloud includes perhaps some 10 data centers worldwide
B. flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic
C. data centers have been sited to optimize the overall system latency
D. all of the mentioned
Answer» C. data centers have been sited to optimize the overall system latency
700.

Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage?

A. on-demand self-service
B. broad network access
C. resource pooling
D. all of the mentioned
Answer» A. on-demand self-service
Tags
Question and answers in Cloud Computing, Cloud Computing multiple choice questions and answers, Cloud Computing Important MCQs, Solved MCQs for Cloud Computing, Cloud Computing MCQs with answers PDF download