137
86k

1120+ Cloud Computing Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .

751.

Factory to use our Spring bean as the implementation:-

A. jaxws:end
B. jaxws:endpoint
C. all of the mentioned
D. none of the mentioned
Answer» B. jaxws:endpoint
752.

Publishing messages is handled through                  Class.

A. client()
B. server()
C. publish()
D. batch()
Answer» A. client()
753.

client() class provides                  to create topics.

A. software
B. classes
C. methods
D. batch
Answer» C. methods
754.

                 method publishes messages to pub/sub.

A. client()
B. publish()
C. server()
D. batch()
Answer» B. publish()
755.

How many arguments are accepted by publish()?

A. 5 arguments
B. 3 arguments
C. 1 argument
D. 2 arguments
Answer» D. 2 arguments
756.

The topic in the publish method is in which form?

A. binomial form
B. canonical form
C. nominal form
D. message form
Answer» B. canonical form
757.

The message in pub/sub is an opaque blob of                  

A. bits
B. bytes
C. word
D. nibble
Answer» B. bytes
758.

                 error will show if we try to send text string instead of bytes.

A. typeerror
B. error
C. linker error
D. compiler error
Answer» A. typeerror
759.

What do we call string in python 2?

A. str
B. unicode
C. strs
D. unicades
Answer» B. unicode
760.

When you publish a message                  is automatically created?

A. client
B. server
C. batch
D. server
Answer» C. batch
761.

What is the time elapsed after a batch is created?

A. 0.5 seconds
B. 0.05 seconds
C. 1.5 seconds
D. 1 second
Answer» B. 0.05 seconds
762.

Every call to publish() will return a class that conforms to the                      interface.

A. batch
B. client
C. server
D. future
Answer» D. future
763.

Point out the wrong statement.

A. abstraction enables the key benefit of cloud computing: shared, ubiquitous access
B. virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made
C. all cloud computing applications combine their resources into pools that can be assigned on demand to users
D. all of the mentioned
Answer» C. all cloud computing applications combine their resources into pools that can be assigned on demand to users
764.

Which of the following type of virtualization is also characteristic of cloud computing?

A. storage
B. application
C. cpu
D. all of the mentioned
Answer» D. all of the mentioned
765.

The technology used to distribute service requests to resources is referred to as

A. load performing
B. load scheduling
C. load balancing
D. all of the mentioned
Answer» C. load balancing
766.

Point out the correct statement.

A. a client can request access to a cloud service from any location
B. a cloud has multiple application instances and directs requests to an instance based on conditions
C. computers can be partitioned into a set of virtual machines with each machine being assigned a workload
D. all of the mentioned
Answer» D. all of the mentioned
767.

Which of the following software can be used to implement load balancing?

A. apache mod_balancer
B. apache mod_proxy_balancer
C. f6’s bigip
D. all of the mentioned
Answer» B. apache mod_proxy_balancer
768.

Which of the following network resources can be load balanced?

A. connections through intelligent switches
B. dns
C. storage resources
D. all of the mentioned
Answer» D. all of the mentioned
769.

Which of the following is a more sophisticated load balancer?

A. workload managers
B. workspace managers
C. rackserve managers
D. all of the mentioned
Answer» A. workload managers
770.

A              is a combination load balancer and application server that is a server placed between a firewall or router.

A. abc
B. acd
C. adc
D. all of the mentioned
Answer» C. adc
771.

Which of the following should be replaced with the question mark in the following figure?

A. abstraction
B. virtualization
C. mobility pattern
D. all of the mentioned
Answer» B. virtualization
772.

In memory-mapped I/O                          

A. the i/o devices and the memory share the same address space
B. the i/o devices have a separate address space
C. the memory and i/o devices have an associated address space
D. a part of the memory is specifically set aside for the i/o operation
Answer» A. the i/o devices and the memory share the same address space
773.

The usual BUS structure used to connect the I/O devices is                        

A. star bus structure
B. multiple bus structure
C. single bus structure
D. node to node bus structure
Answer» C. single bus structure
774.

The advantage of I/O mapped devices to memory mapped is                        

A. the former offers faster transfer of data
B. the devices connected using i/o mapping have a bigger buffer space
C. the devices have to deal with fewer address lines
D. no advantage as such
Answer» C. the devices have to deal with fewer address lines
775.

The system is notified of a read or write operation by                        

A. appending an extra bit of the address
B. enabling the read or write bits of the devices
C. raising an appropriate interrupt signal
D. sending a special signal along the bus
Answer» D. sending a special signal along the bus
776.

To overcome the lag in the operating speeds of the I/O device and the processor we use                        

A. buffer spaces
B. status flags
C. interrupt signals
D. exceptions
Answer» B. status flags
777.

The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?

A. exceptions
B. signal handling
C. interrupts
D. dma
Answer» C. interrupts
778.

The method which offers higher speeds of I/O transfers is                        

A. interrupts
B. memory mapping
C. program-controlled i/o
D. dma
Answer» D. dma
779.

The process wherein the processor constantly checks the status flags is called as

A. polling
B. inspection
C. reviewing
D. echoing
Answer» A. polling
780.

The purpose of backup is:

A. to restore a computer to an operational state following a disaster
B. to restore small numbers of files after they have been accidentally deleted
C. to restore one among many version of the same file for multiple backup environment
D. all of the mentioned
Answer» D. all of the mentioned
781.

Backup of the source data can be created

A. on the same device
B. on another device
C. at some other location
D. all of the mentioned
Answer» D. all of the mentioned
782.

Which of the following backup technique is most space efficient?

A. full backup
B. incremental backup
C. differential backup
D. all of the mentioned
Answer» B. incremental backup
783.

Which of the following statements are true?

A. data can be recovered fastest in online backup
B. tape library is an example of nearline storage
C. data recovery can take hours for offline backup
D. all of the mentioned
Answer» D. all of the mentioned
784.

Which of the following qualifies as best DR (Disaster Recovery) site?

A. dr site in the same campus
B. dr site in the same city
C. dr site in the same country
D. dr site in a different country
Answer» D. dr site in a different country
785.

Which of the following techniques can be used for optimizing backed up data space?

A. encryption and deduplication
B. compression and deduplication
C. authentication and deduplication
D. deduplication only
Answer» B. compression and deduplication
786.

To decide on a backup strategy for your organization, which of the following should you consider?

A. rpo (recovery point objective)
B. rto (recovery time objective)
C. both rpo & rto
D. none of the mentioned
Answer» C. both rpo & rto
787.

Which of the following can be used for reducing recovery time?

A. automatic failover
B. by taking backup on a faster device
C. taking multiple backups – one in same location, another at different location
D. all of the mentioned
Answer» D. all of the mentioned
788.

Which of the following is false?

A. the more important the data, the greater the need for backing it up
B. a backup is as useful as its associated restore strategy
C. storing the backup copy near to its original site is best strategy
D. automated backup and scheduling is preferred over manual operations
Answer» C. storing the backup copy near to its original site is best strategy
789.

Which of the following is Backup software?

A. amanda
B. bacula
C. ibm tivoli storage manager
D. all of the mentioned
Answer» D. all of the mentioned
790.

Which of the following is incorrect?

A. a layered-style program is divided into an array of modules or layers
B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”
C. all of the mentioned
D. none of the mentioned
Answer» B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”
791.

What is Relaxed Layered Style?

A. each layer can be constrained to use only the layer directly below it
B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
C. all of the mentioned
D. none of the mentioned
Answer» B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
792.

Which of the following is correct?

A. module a uses module b if a correct version of b must be present for a to execute correctly
B. module a calls (or invokes ) module b if b triggers execution of a
C. all of the mentioned
D. none of the mentioned
Answer» A. module a uses module b if a correct version of b must be present for a to execute correctly
793.

Which of the following is true with respect to layered architecture?

A. each layer is allowed to depend on the layer above it being present and correct
B. a layer may call other layers above and below it, as long as it uses them
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
794.

What is Onion diagram illustrates?

A. it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system
B. it often illustrates operating system layers, with the kernel at the core
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
795.

In particular, layers have which of the following characteristics?

A. layers are by definition highly cohesive, thus satisfying the principle of cohesion
B. layers doesn’t support information hiding
C. layers are constrained to use only above layers
D. all of the mentioned
Answer» A. layers are by definition highly cohesive, thus satisfying the principle of cohesion
796.

What are the drawbacks for Layers?

A. it is often necessary to pass data through many layers, which can slow performance significantly
B. layers support information hiding
C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
D. none of the mentioned
Answer» C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
797.

Which of the following is correct?

A. layers are not strongly coupled to the layers above them
B. each layer is strongly coupled only to the layer immediately below it
C. overall layered-style architectures are loosely coupled
D. all of the mentioned
Answer» D. all of the mentioned
798.

Which of the following is one of the unique attributes of Cloud Computing?

A. utility type of delivery
B. elasticity
C. low barrier to entry
D. all of the mentioned
Answer» D. all of the mentioned
799.

Point out the correct statement.

A. service level agreements (slas) is small aspect of cloud computing
B. cloud computing does not have impact on software licensing
C. cloud computing presents new opportunities to users and developers
D. all of the mentioned
Answer» C. cloud computing presents new opportunities to users and developers
800.

Applications that work with cloud computing that have low margins and usually low risk are                            

A. high touch
B. low touch
C. moderate touch
D. all of the mentioned
Answer» B. low touch

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.