McqMate
601. |
CloudFront supports data by performing static data transfers and streaming content from one CloudFront location to another. |
A. | table caching |
B. | geocaching |
C. | index caching |
D. | windows media server |
Answer» B. geocaching |
602. |
Point out the correct statement. |
A. | a volume is mounted on a particular instance and is available to all instances |
B. | the advantages of an ebs boot partition are that you can have a volume up to 1tb |
C. | you cannot mount multiple volumes on a single instance |
D. | all of the mentioned |
Answer» B. the advantages of an ebs boot partition are that you can have a volume up to 1tb |
603. |
Data stored in domains doesn’t require maintenance of a schema. |
A. | simpledb |
B. | sql server |
C. | oracle |
D. | rds |
Answer» A. simpledb |
604. |
Amazon Web Services falls into which of the following cloud-computing category? |
A. | platform as a service |
B. | software as a service |
C. | infrastructure as a service |
D. | back-end as a service |
Answer» C. infrastructure as a service |
605. |
AWS reaches customers in _countries. |
A. | 137 |
B. | 182 |
C. | 190 |
D. | 86 |
Answer» C. 190 |
606. |
Which of the following correctly describes components roughly in their order of importance from top to down? |
A. | 1. amazon elastic compute cloud 2. amazon simple storage system 3. amazon elastic block store |
B. | 1. amazon elastic block store 2. amazon elastic compute cloud 3. amazon simple storage system |
C. | 1. amazon simple storage system 2. amazon elastic block store 3. amazon elastic compute cloud |
D. | none of the mentioned |
Answer» A. 1. amazon elastic compute cloud 2. amazon simple storage system 3. amazon elastic block store |
607. |
is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm. |
A. | ec2 |
B. | azure |
C. | ec5 |
D. | none of the mentioned |
Answer» A. ec2 |
608. |
AMIs are operating systems running on the virtualization hypervisor. |
A. | yen |
B. | xen |
C. | ben |
D. | multi-factor authentication |
Answer» B. xen |
609. |
Which of the following instance class is best used for applications that are processor or compute-intensive? |
A. | standard instances |
B. | high memory instances |
C. | high cpu instances |
D. | none of the mentioned |
Answer» C. high cpu instances |
610. |
Amazon Relational Database Service is a variant of the 5.1 database system. |
A. | oracle |
B. | mysql |
C. | sql server |
D. | all of the mentioned |
Answer» B. mysql |
611. |
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as . |
A. | web sphere |
B. | tivoli |
C. | nebula |
D. | altix |
Answer» B. tivoli |
612. |
Cloud system from SGI is functionally considered as an _. |
A. | on-demand cloud computing service |
B. | on-demand cloud storage service |
C. | on-demand cloud accessing service |
D. | on-demand |
Answer» A. on-demand cloud computing service |
613. |
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient. |
A. | nebula cloud |
B. | cyclone cloud |
C. | force.com cloud |
D. | cern cloud |
Answer» A. nebula cloud |
614. |
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform |
A. | load setting facility |
B. | load sharing facility |
C. | load setting faculty |
D. | load assigning faculty |
Answer» B. load sharing facility |
615. |
A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms |
A. | accessibility |
B. | mobility |
C. | agility |
D. | scalability |
Answer» C. agility |
616. |
The Cloudlets have a ownership unlike that of Clouds. |
A. | centralized |
B. | decentralized |
C. | global |
D. | none of the above |
Answer» B. decentralized |
617. |
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data. |
A. | htc |
B. | hpc |
C. | hcc |
D. | hac |
Answer» A. htc |
618. |
Performance metrics for HPC/HTC systems include : |
A. | multitasking scalability |
B. | security index |
C. | cost effectiveness |
D. | all of the above |
Answer» D. all of the above |
619. |
[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equation calculates the value of which of the following? |
A. | scalability |
B. | throughput |
C. | availability |
D. | effectiveness |
Answer» B. throughput |
620. |
refers to an increase in the performance by the addition of more resources along the service layers |
A. | horizontal scalability |
B. | vertical scalability |
C. | diagonal scalability |
D. | none of the above |
Answer» B. vertical scalability |
621. |
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry |
A. | gps |
B. | cloud |
C. | iot |
D. | rfid |
Answer» D. rfid |
622. |
RFID stand for . |
A. | rangeable frequency identification |
B. | radio fragment identification |
C. | radio frequency identification |
D. | rangeable fragment identification |
Answer» C. radio frequency identification |
623. |
The architecture of IoT consists of different layers including which of the following? i. Application Layer
|
A. | i, ii, iv |
B. | i, iii, iv |
C. | ii, iii, iv |
D. | ii, iii, iv |
Answer» A. i, ii, iv |
624. |
tags needs an external source to wake up the battery. |
A. | acitve rfid |
B. | passive rfid |
C. | battery-assisted passive rfid |
D. | battery-assisted active rfid |
Answer» C. battery-assisted passive rfid |
625. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
|
A. | i, ii, iii |
B. | i, ii, iii, iv |
C. | ii, iii, iv |
D. | i, ii, iv |
Answer» A. i, ii, iii |
626. |
Even with two-factor authentication, users may still be vulnerable to attacks. |
A. | scripting |
B. | cross attack |
C. | man-in-the-middle |
D. | radiant |
Answer» C. man-in-the-middle |
627. |
Which of the following is not the component of IoT Endpoint |
A. | sensor |
B. | gateway |
C. | communication module |
D. | mcu |
Answer» B. gateway |
628. |
Which of the following makes sure that data is not changed when it not supposed to be? |
A. | integrity |
B. | availability |
C. | confidentiality |
D. | accounting |
Answer» A. integrity |
629. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
A. | availability |
B. | accounting |
C. | integrity |
D. | confidentiality |
Answer» D. confidentiality |
630. |
DCS is a |
A. | distributed control system |
B. | data control system |
C. | data column system |
D. | distributed column system |
Answer» A. distributed control system |
631. |
RFID stands for? |
A. | random frequency identification |
B. | radio frequency identification |
C. | random frequency information |
D. | radio frequency information |
Answer» B. radio frequency identification |
632. |
M2M is a term introduced by |
A. | iot service providers |
B. | fog computing service providers |
C. | telecommunication service providers |
D. | none of these |
Answer» C. telecommunication service providers |
633. |
Smart Dust can be used to measure the |
A. | temperature of the industrial lathe machine |
B. | heat inside a computer’s cpu |
C. | chemical in the soil |
D. | strength of a solid material |
Answer» C. chemical in the soil |
634. |
Request field is present in which message format? |
A. | request message |
B. | response message |
C. | both request and response |
D. | neither request nor response |
Answer» A. request message |
635. |
CoAP provides which of the following requirements? |
A. | multicast support and simplicity |
B. | low overhead and multicast support |
C. | simplicity and low overhead |
D. | multicast support, low over head, and simplicity |
Answer» D. multicast support, low over head, and simplicity |
636. |
CoAP is a specialized protocol. |
A. | web transfer |
B. | power |
C. | application |
D. | resource |
Answer» A. web transfer |
637. |
What is the full form of WLAN? |
A. | wide local area network |
B. | wireless local area network |
C. | wireless land access network |
D. | wireless local area node |
Answer» B. wireless local area network |
638. |
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? |
A. | ieee 802.16 |
B. | ieee 802.3 |
C. | ieee 802.11 |
D. | ieee 802.15 |
Answer» C. ieee 802.11 |
639. |
Which of the following is not a characteristic of a ZigBee network? |
A. | low power consumption |
B. | easy installation. |
C. | high data rates. |
D. | unlicensed radio bands. |
Answer» C. high data rates. |
640. |
Which of the following IEEE standards provides the lowest level of the ZigBee software stack? |
A. | ieee 802.11. |
B. | ieee 802.15.1. |
C. | ieee 802.15.3. |
D. | ieee 802.15.4. |
Answer» D. ieee 802.15.4. |
641. |
Which of the following layers are defined by the ZigBee stack? |
A. | transport layer |
B. | physical layer. |
C. | application support sub-layer. |
D. | medium access layer |
Answer» D. medium access layer |
642. |
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | cross-site scoring scripting |
B. | cross-site request forgery |
C. | two-factor authentication |
D. | cross-site scripting |
Answer» D. cross-site scripting |
643. |
Representational State Transfer (REST) is the standard interface between |
A. | two machines in a lan |
B. | http client and user |
C. | http client and servers |
D. | none of the above |
Answer» C. http client and servers |
644. |
Which of the following is the full form of XMPP? |
A. | extension messaging and presence protocol |
B. | extensible messaging and presence protocol |
C. | extension messaging and privacy protocol |
D. | extensible messaging and privacy protocol |
Answer» B. extensible messaging and presence protocol |
645. |
In case of , the GPS works as a receiver, not a transmitter. |
A. | active tracking |
B. | passive tracking |
C. | assisted tracking |
D. | receiver tracking |
Answer» B. passive tracking |
646. |
is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system |
A. | cloud-physical system |
B. | cyber-space system |
C. | cyber-physical system |
D. | none of the above |
Answer» C. cyber-physical system |
647. |
The number of binding of a node to other actors of the graph in the graph representation of a network is called as . |
A. | node degree |
B. | path length |
C. | social circle |
D. | bridge |
Answer» A. node degree |
648. |
is the degree to which nodes have a common set of connections to other nodes |
A. | structural hole |
B. | structural equivalence |
C. | structural cohesion |
D. | none of the above |
Answer» C. structural cohesion |
649. |
The degree to which actors are directly linked to one another through cohesive bonds is called as . |
A. | closeness |
B. | cohesion |
C. | centralized |
D. | path length |
Answer» B. cohesion |
650. |
The social circles are loosely coupled if there is stringency of direct contact. |
A. | less |
B. | more |
C. | equal |
D. | no |
Answer» A. less |
651. |
Nodes in the network analysis graph represent the and the edges represent the relationships between nodes. |
A. | actors |
B. | nodes |
C. | users |
D. | both a and b |
Answer» D. both a and b |
652. |
JOES stands for |
A. | joint expensive operating system |
B. | just expensive operating system |
C. | just enough operating system |
D. | joined environmental operating system |
Answer» C. just enough operating system |
653. |
In future, companies wont worry about the capital for large data center because of |
A. | saas solution |
B. | paas solution |
C. | iaas solution |
D. | none of the above |
Answer» B. paas solution |
654. |
is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability |
A. | cometcloud |
B. | asteroidcloud |
C. | starcloud |
D. | planetcloud |
Answer» A. cometcloud |
655. |
CometCloud supports policy based autonomic and |
A. | cloudbursting |
B. | cloudbridging |
C. | none |
D. | both a and b |
Answer» D. both a and b |
656. |
In Comet, a tuple is a simple string |
A. | java |
B. | python |
C. | xml |
D. | html |
Answer» C. xml |
657. |
The cloud media services are: |
A. | cloud gaming |
B. | experiencing multi- screens |
C. | image processing |
D. | all of the above |
Answer» D. all of the above |
658. |
KPI stands for |
A. | key practices in industry |
B. | key performance index |
C. | key performance indicators |
D. | key parameters in information |
Answer» C. key performance indicators |
659. |
SEEP is used in |
A. | energy optimization |
B. | multimedia |
C. | information leakage |
D. | cost reduction |
Answer» A. energy optimization |
660. |
SEEP stands for |
A. | system end to end protocol |
B. | static environmental execution process |
C. | symbolic execution and energy profiles |
D. | state execution and energy profiles |
Answer» C. symbolic execution and energy profiles |
661. |
Keywords in Docker are |
A. | develop, ship, run anywhere |
B. | create, export |
C. | transport, cloud |
D. | user, data, privacy |
Answer» A. develop, ship, run anywhere |
662. |
Docker can simplify both, and |
A. | process, state |
B. | behavior, aspect |
C. | workflows, communication |
D. | all of the above |
Answer» C. workflows, communication |
663. |
Docker is generally configured to use TCP port while executing unencrypted traffic |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» C. 2375 |
664. |
Docker is generally configured to use TCP port while managing encrypted traffic. |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» D. 2376 |
665. |
CNS stands for |
A. | consumption near sweet-spot |
B. | continuous network system |
C. | compact neural system |
D. | compound near sweet-sp0t |
Answer» A. consumption near sweet-spot |
666. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers |
A. | network-based positioning |
B. | real-time location system (rtls) |
C. | radio frequency identification (rfid) |
D. | wireless wide area network (wwan) |
Answer» C. radio frequency identification (rfid) |
667. |
delivery of m-commerce transactions to individuals in a specific location, at a specific time |
A. | location-based m- commerce (l- commerce) |
B. | context-aware computing |
C. | ubiquitous computing (ubicom) |
D. | network-based positioning |
Answer» A. location-based m- commerce (l- commerce) |
668. |
Calculating the location of a mobile device from signals sent by the device to base stations |
A. | personal area network (pan) |
B. | terminal-based positioning |
C. | pervasive computing |
D. | network-based positioning |
Answer» B. terminal-based positioning |
669. |
a website with an audio interface that can be accessed through a telephone call |
A. | wimax |
B. | geolocation |
C. | mobile portal |
D. | voice portal |
Answer» D. voice portal |
670. |
computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information |
A. | personal area network (pan) |
B. | interactive voice response (ivr) |
C. | real-time location system (rtls) |
D. | geographical information system (gis) |
Answer» D. geographical information system (gis) |
671. |
application of mobile computing inside the enterprise (e.g., for improved communication among employees) |
A. | sensor network |
B. | mobile enterprise |
C. | voice portal |
D. | mobile portal |
Answer» B. mobile enterprise |
672. |
computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» B. cloud |
673. |
as a utility is a dream that dates from the beginning of the computing industry itself. |
A. | model |
B. | computing |
C. | software |
D. | all of the mentioned |
Answer» B. computing |
674. |
Which of the following is essential concept related to Cloud? |
A. | reliability |
B. | productivity |
C. | abstraction |
D. | all of the mentioned |
Answer» C. abstraction |
675. |
Which of the following cloud concept is related to pooling and sharing of resources? |
A. | polymorphism |
B. | abstraction |
C. | virtualization |
D. | none of the mentioned |
Answer» C. virtualization |
676. |
has many of the characteristics of what is now being called cloud computing. |
A. | internet |
B. | softwares |
C. | web service |
D. | all of the mentioned |
Answer» A. internet |
677. |
Which of the following can be identified as cloud? |
A. | web applications |
B. | intranet |
C. | hadoop |
D. | all of the mentioned |
Answer» C. hadoop |
678. |
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a resource. |
A. | real |
B. | virtual |
C. | cloud |
D. | none of the mentioned |
Answer» B. virtual |
679. |
Which of the following is Cloud Platform by Amazon? |
A. | azure |
B. | aws |
C. | cloudera |
D. | all of the mentioned |
Answer» B. aws |
680. |
is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. |
A. | remote sensing |
B. | remote invocation |
C. | cloud computing |
D. | private computing |
Answer» C. cloud computing |
681. |
Which of the following is not a cloud stakeholder? |
A. | cloud providers |
B. | clients |
C. | end users |
D. | cloud users |
Answer» B. clients |
682. |
These cloud services are of the form of utility computing i.e. the uses these services pay-as-you-go model. |
A. | cloud providers |
B. | clients |
C. | end users |
D. | cloud users |
Answer» D. cloud users |
683. |
Which of the following is not a type of cloud? |
A. | private |
B. | public |
C. | protected |
D. | hybrid |
Answer» C. protected |
684. |
In this type of cloud, an organization rents cloud services from cloud providers on- demand basis. |
A. | private |
B. | public |
C. | protected |
D. | hybrid |
Answer» B. public |
685. |
In this type of cloud, the cloud is composed of multiple internal or external cloud. |
A. | private |
B. | public |
C. | protected |
D. | hybrid |
Answer» D. hybrid |
686. |
enables the migration of the virtual image from one physical machine to another. |
A. | visualization |
B. | virtualization |
C. | migration |
D. | virtual transfer |
Answer» B. virtualization |
687. |
Most of the cloud architectures are built on this type of architecture. |
A. | skeleton |
B. | grid |
C. | linear |
D. | template |
Answer» B. grid |
688. |
Saas stands for? |
A. | software as a service |
B. | system software and services |
C. | software as a system |
D. | system as a service |
Answer» A. software as a service |
689. |
In distributed system, each processor has its own |
A. | local memory |
B. | clock |
C. | both local memory and clock |
D. | none of the mentioned |
Answer» C. both local memory and clock |
690. |
If one site fails in distributed system then |
A. | the remaining sites can continue operating |
B. | all the sites will stop working |
C. | directly connected sites will stop working |
D. | none of the mentioned |
Answer» A. the remaining sites can continue operating |
691. |
Network operating system runs on |
A. | server |
B. | every system in the network |
C. | both server and every system in the network |
D. | none of the mentioned |
Answer» A. server |
692. |
Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system? |
A. | cache coherence scheme |
B. | computation migration |
C. | remote procedure call |
D. | message passing |
Answer» B. computation migration |
693. |
Logical extension of computation migration is |
A. | process migration |
B. | system migration |
C. | thread migration |
D. | data migration |
Answer» A. process migration |
694. |
Processes on the remote systems are identified by |
A. | host id |
B. | host name and identifier |
C. | identifier |
D. | process id |
Answer» B. host name and identifier |
695. |
In distributed systems, link and site failure is detected by |
A. | polling |
B. | handshaking |
C. | token passing |
D. | none of the mentioned |
Answer» B. handshaking |
696. |
The capability of a system to adapt the increased service load is called |
A. | scalability |
B. | tolerance |
C. | capacity |
D. | none of the mentioned |
Answer» A. scalability |
697. |
Internet provides for remote login. |
A. | telnet |
B. | http |
C. | ftp |
D. | rpc |
Answer» A. telnet |
698. |
Which of the following was one of the top 5 cloud applications in 2010? |
A. | cloud backup |
B. | web applications |
C. | business applications |
D. | all of the mentioned |
Answer» D. all of the mentioned |
699. |
Point out the correct statement. |
A. | google’s cloud includes perhaps some 10 data centers worldwide |
B. | flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic |
C. | data centers have been sited to optimize the overall system latency |
D. | all of the mentioned |
Answer» C. data centers have been sited to optimize the overall system latency |
700. |
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? |
A. | on-demand self-service |
B. | broad network access |
C. | resource pooling |
D. | all of the mentioned |
Answer» A. on-demand self-service |
Done Reading?