

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .
1051. |
Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud? |
A. | Amazon Elastic MapReduce |
B. | Amazon Mechanical Turk |
C. | Amazon DevPay |
D. | Multi-Factor Authentication |
Answer» A. Amazon Elastic MapReduce |
1052. |
_________ is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm. |
A. | EC2 |
B. | Azure |
C. | EC5 |
D. | None of the mentioned |
Answer» A. EC2 |
1053. |
AMIs are operating systems running on the _____ virtualization hypervisor. |
A. | Yen |
B. | Xen |
C. | Ben |
D. | Multi-Factor Authentication |
Answer» B. Xen |
1054. |
Which of the following instance class is best used for applications that are processor or compute-intensive? |
A. | Standard Instances |
B. | High Memory Instances |
C. | High CPU Instances |
D. | None of the mentioned |
Answer» C. High CPU Instances |
1055. |
Amazon Relational Database Service is a variant of the _______ 5.1 database system. |
A. | Oracle |
B. | MySQL |
C. | SQL Server |
D. | All of the mentioned |
Answer» B. MySQL |
1056. |
|
A. | Instance store backed |
B. | EBS backed |
C. | Both A & B |
D. | None of the above |
Answer» C. Both A & B |
1057. |
|
A. | Amazon S3 standard |
B. | Amazon S3 standard-infrequent Access |
C. | Amazon Glacier |
D. | All of the above |
Answer» D. All of the above |
1058. |
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as ________. |
A. | Web Sphere |
B. | Tivoli |
C. | Nebula |
D. | Altix |
Answer» B. Tivoli |
1059. |
Cloud system from SGI is functionally considered as an ________. |
A. | on-demand cloud computing service |
B. | on-demand cloud storage service |
C. | on-demand cloud accessing service |
D. | on-demand |
Answer» A. on-demand cloud computing service |
1060. |
NASA created ________ can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient. |
A. | Nebula Cloud |
B. | Cyclone Cloud |
C. | Force.com Cloud |
D. | CERN Cloud |
Answer» A. Nebula Cloud |
1061. |
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a ________ grid and workload management solution of cloud computing platform |
A. | Load Setting Facility |
B. | Load Sharing Facility |
C. | Load Setting Faculty |
D. | Load assigning Faculty |
Answer» B. Load Sharing Facility |
1062. |
One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.
|
A. | true |
B. | false |
Answer» A. true |
1063. |
A mashup cloud can be designed by utilizing the Scalability of AWS and ________ of GAE platforms |
A. | Accessibility |
B. | Mobility |
C. | Agility |
D. | Scalability |
Answer» C. Agility |
1064. |
The Cloudlets have a ________ ownership unlike that of Clouds.
|
A. | centralized |
B. | decentralized |
C. | global |
D. | None of the above |
Answer» B. decentralized |
1065. |
The Data-Intensive Scalable Computing(DISC) utilizes a ________ data-center clusters to gather and maintain data. |
A. | HTC |
B. | HPC |
C. | HCC |
D. | HAC |
Answer» A. HTC |
1066. |
________ refers to an increase in the performance by the addition of more resources along the service layers |
A. | Horizontal Scalability |
B. | Vertical Scalability |
C. | Diagonal Scalability |
D. | None of the above |
Answer» B. Vertical Scalability |
1067. |
The percentage of time the system is up and running smoothly is referred as ________. |
A. | system up time |
B. | system scalability |
C. | system availability |
D. | system efficiency |
Answer» C. system availability |
1068. |
________ is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry |
A. | GPS |
B. | Cloud |
C. | IoT |
D. | RFID |
Answer» D. RFID |
1069. |
RFID stand for ________. |
A. | Rangeable Frequency Identification |
B. | Radio Fragment Identification |
C. | Radio Frequency Identification |
D. | Rangeable Fragment Identification |
Answer» C. Radio Frequency Identification |
1070. |
The architecture of IoT consists of different layers including which of the following? i. Application Layer
|
A. | i, ii, iv |
B. | i, iii, iv |
C. | ii, iii, iv |
D. | ii, iii, iv |
Answer» A. i, ii, iv |
1071. |
________ tags contain battery and transmit signals autonomously |
A. | Acitve RFID |
B. | Passive RFID |
C. | Battery-assisted passive RFID |
D. | Battery-assisted RFID |
Answer» A. Acitve RFID |
1072. |
________ tags needs an external source to wake up the battery.
|
A. | Acitve RFID |
B. | Passive RFID |
C. | Battery-assisted passive RFID |
D. | Battery-assisted active RFID |
Answer» C. Battery-assisted passive RFID |
1073. |
The three major components of RFID hardware based on functionality include : |
A. | RFID Reader |
B. | Reader Antenna |
C. | Reader |
D. | All of the above |
Answer» D. All of the above |
1074. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
|
A. | i, ii, iii |
B. | i, ii, iii, iv |
C. | ii, iii, iv |
D. | i, ii, iv |
Answer» A. i, ii, iii |
1075. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
A. | Scripting |
B. | Cross attack |
C. | Man-in-the-middle |
D. | Radiant |
Answer» C. Man-in-the-middle |
1076. |
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? |
A. | Making infrastructure vulnerable to malware |
B. | Potential for noncompliance |
C. | Data Loss |
D. | All of the above |
Answer» D. All of the above |
1077. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
A. | Availability |
B. | Accounting |
C. | Integrity |
D. | Confidentiality |
Answer» D. Confidentiality |
1078. |
What is the full form of SCADA? |
A. | Supervisory Control and Document Acquisition |
B. | Supervisory Control and Data Acquisition |
C. | Supervisory Column and Data Assessment |
D. | Supervisory Column and Data Assessment |
Answer» B. Supervisory Control and Data Acquisition |
1079. |
DCS is a ________ |
A. | Distributed Control System |
B. | Data Control System |
C. | Data Column System |
D. | Distributed Column System |
Answer» A. Distributed Control System |
1080. |
What is SCADA? |
A. | Software |
B. | Process |
C. | System |
D. | Hardware |
Answer» B. Process |
1081. |
Which of the following is not the component of a SCADA system? |
A. | Database server |
B. | I/O system |
C. | PLC controller |
D. | Sparger controller |
Answer» D. Sparger controller |
1082. |
Which of the following is not involved in working of IoT? |
A. | RFID |
B. | Sensor |
C. | Nano tech |
D. | Server |
Answer» D. Server |
1083. |
M2M is a term introduced by |
A. | IoT service providers |
B. | Fog computing service providers |
C. | Telecommunication service providers |
D. | None of these |
Answer» C. Telecommunication service providers |
1084. |
Which of these statements regarding sensors is TRUE? |
A. | Sensors are input devices. |
B. | Sensors can be analog as well as digital |
C. | Sensors respond to some external stimuli. |
D. | All of these |
Answer» D. All of these |
1085. |
Smart Dust can be used to measure the |
A. | Temperature of the industrial lathe machine |
B. | Heat inside a computer’s CPU |
C. | Chemical in the soil |
D. | Strength of a solid material |
Answer» C. Chemical in the soil |
1086. |
Request field is present in which message format? |
A. | Request message |
B. | Response message |
C. | Both request and response |
D. | Neither request nor response |
Answer» A. Request message |
1087. |
CoAP provides which of the following requirements? |
A. | Multicast support and simplicity |
B. | Low overhead and multicast support |
C. | Simplicity and low overhead |
D. | Multicast support, Low over head, and simplicity |
Answer» D. Multicast support, Low over head, and simplicity |
1088. |
CoAP is a specialized _________ protocol. |
A. | Web Transfer |
B. | Power |
C. | Application |
D. | Resource |
Answer» A. Web Transfer |
1089. |
Which of the following IEEE standards provides the lowest level of the ZigBee software stack? |
A. | IEEE 802.11. |
B. | IEEE 802.15.1. |
C. | IEEE 802.15.3. |
D. | IEEE 802.15.4. |
Answer» D. IEEE 802.15.4. |
1090. |
Which of the following layers are defined by the ZigBee stack? |
A. | Transport layer |
B. | Physical layer. |
C. | Application Support sub-layer. |
D. | Medium Access layer |
Answer» D. Medium Access layer |
1091. |
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | Cross-site scoring scripting |
B. | Cross-site request forgery |
C. | Two-factor authentication |
D. | Cross-site scripting |
Answer» D. Cross-site scripting |
1092. |
Representational State Transfer (REST) is the standard interface between |
A. | Two machines in a LAN |
B. | HTTP client and user |
C. | HTTP client and servers |
D. | None of the above |
Answer» C. HTTP client and servers |
1093. |
Which of the following is not a messaging mode in CoAP? |
A. | Confirmable |
B. | Separate |
C. | Direct |
D. | Piggyback |
Answer» C. Direct |
1094. |
Which of the following is the full form of XMPP? |
A. | Extension Messaging and Presence Protocol |
B. | Extensible Messaging and Presence Protocol |
C. | Extension Messaging and Privacy Protocol |
D. | Extensible Messaging and Privacy Protocol |
Answer» B. Extensible Messaging and Presence Protocol |
1095. |
In 6LoWPAN address, how many bits are globally unique? |
A. | 16 bits |
B. | 32 bits |
C. | 64 bits |
D. | 128 bits |
Answer» C. 64 bits |
1096. |
IEEE 802.15.4 uses which of the following for accessing the channel? |
A. | Carrier sense multiple access (CSMA) |
B. | Carrier sense multiple access with collision detection (CSMA‐CD) |
C. | Carrier sense multiple access with collision avoidance (CSMA‐CA) |
D. | None of these |
Answer» C. Carrier sense multiple access with collision avoidance (CSMA‐CA) |
1097. |
What second programming language did Google add for App Engine development? |
A. | C++ |
B. | Flash |
C. | Java |
D. | Visual Basic |
Answer» C. Java |
1098. |
what facet of cloud computing helps to guard against downtime and determines costs? |
A. | Service-level agreements |
B. | Application programming interfaces |
C. | Virtual private networks |
D. | Bandwidth fees |
Answer» A. Service-level agreements |
1099. |
Which of these is not a major type of cloud computing usage? |
A. | Hardware as a Service |
B. | Platform as a Service |
C. | Software as a Service |
D. | Infrastructure as a Service |
Answer» A. Hardware as a Service |
1100. |
Cloud Services have a________ relationship with their customers. |
A. | Many-to-many |
B. | One-to-many |
C. | One-to-one |
Answer» B. One-to-many |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.