Cloud Computing Technologies MCQs
1. Writing parallel programs is referred to as
A. Parallel computation
B. Parallel processes
C. Parallel development
D. Parallel programming
2. The computer system of a parallel computer is capable of
A. Decentralized computing
B. Parallel computing
C. Distributed computing
D. Decentralized computing
3. In which application system Distributed systems can run well?
A. HPC
B. D. HTC
C. C. HRC
D. D. HPC and HTC
4. Type of HTC applications are-------------
A. Business
B. Engineering
C. Science
D. Media mass
5. Broader concept offers Cloud computing .to select which of the following.
A. Parallel computing
B. Centralized computing
C. Utility computing
D. Decentralized computing
6. Uniprocessor computing devices is called__________.
A. Grid computing
B. Centralized computing
C. Parallel computing
D. Distributed computing
7. Aberavationn of HPC
A. High-peak computing
B. High-peripheral computing
C. High-performance computing
D. Highly-parallel computing
8. Type of HPC applications are -------------
A. Management
B. Media mass
C. Business
D. Science
9. If one site fails in distributed system, ___________
A. the remaining sites can continue operating
B. all the sites will stop working
C. directly connected sites will stop working
D. none of the mentioned
10. Which amongst the following is not an advantage of Distributed systems?
A. Resource sharing
B. Incremental growth
C. Reliability
D. transparency
11. The capability of a system to adapt the increased service load is called _________
A. capacity
B. tolerance
C. scalability
D. none of the mentioned
12. Distributed systems should ?
A. high security
B. have better resource sharing
C. better system utilization
D. low system overhead
13. Which of the following will be true distributed system ?
A. tightly-coupled software on loosely-coupled hardware
B. loosely-coupled software on tightly-coupled hardware
C. tightly-coupled software on tightly-coupled hardware
D. loosely-coupled software on loosely-coupled hardware
14. The characteristics of a distributed system are :
A. Resource sharing, heterogeneity, openness, security
B. Scalability, fault handling
C. Concurrency, transparency
D. ALL are acceptable answers
15. What are design issues in distributed system structure?
A. Scalability
B. Fault-tolerance
C. Flexibility
D. All of the mentioned
16. In distributed system each processor has its own
A. local memory
B. clock
C. both local memory and clock
D. none of the mentioned
17. If one site fails in distributed system
A. the remaining sites can continue operating
B. all the sites will stop working
C. directly connected sites will stop working
D. none of the mentioned
18. The term ______ refers to a Network or Internet.
A. Cloud Computing
B. Cloud
C. Computing
D. CRM
19. Cloud Computing refers to?
A. accessing the hardware
B. configuring the hardware
C. manipulating the hardware
D. All of the above
20. Which of the following is true about cloud computing?
A. Cloud computing is platform dependent
B. Cloud Computing makes our business applications mobile and collaborative.
C. Cloud Computing provides us means of accessing the applications as utilities over computer only.
D. All of the above
21. Which of the following is the working modelsfor cloud computing?
A. Deployment Models
B. Configuring Model
C. Collaborative Model
D. All of the above
22. The ____________ allows systems and services to be accessible by a group of organizations.
A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
23. The __________ allows systems and services to be accessible within an organization.
A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
24. Which of the following type of virtualization is also characteristic of cloud computing?
A. Storage
B. Application
C. CPU
D. All of the Above
25. Which of the following is a type of Service Models?
A. Public-as-a-Service
B. Platform-as-a-Service
C. Community-as-a-Service
D. Public-as-a-Service
26. How many types of Cloud are there in Deployment Models?
A. 2
B. 3
C. 4
D. 5
27. _______ provides the runtime environment for applications, development and deployment tools, etc.
A. IaaS
B. PaaS
C. SaaS
D. XaaS
28. ________________ is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service.
A. IaaS
B. PaaS
C. SaaS
D. XaaS
29. When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.
A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
30. Which of the following is most refined and restrictive service model ?
A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
31. Which of the following is best known service model ?
A. SaaS
B. IaaS
C. PaaS
D. All of the mentioned
32. An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party
33. RPC is used to _________
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and retrieve information by calling a query
d) to secure the client
34. A remote procedure call is _______
a) inter-process communication
b) a single process
c) a single thread
d) a single stream
35. RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation
36. The local operating system on the server machine passes the incoming packets to the ___________
a) server stub
b) client stub
c) client operating system
d) client process
37. Creating more logical IT resources, within one physical system is called ________.
A. Load balancing
B. Hypervisor
C. Virtualization
D. None of these
38. What is most commonly used for managing the resources for every virtual system?
A. Load balancer
B. Hypervisor
C. Router
D. Cloud
39. Which is not a benefit of virtualization?
A. Flexible and efficient allocation of resources
B. Lowers the cost of IT infrastructure
C. Remote access and rapid scalability
D. Run on single operating system
40. It helps a user to have remote access to an application from a server.
A. Application virtualization
B. Network virtualization
C. Desktop virtualization
D. Storage virtualization
41. It is an array of servers that are managed by a virtual storage system.
A. Application virtualization
B. Network virtualization
C. Desktop virtualization
D. Storage virtualization
42. It has the ability to run multiple virtual networks with each has a separate control and data plan.
A. Application virtualization
B. Network virtualization
C. Desktop virtualization
D. Storage virtualization
43. Identify the correct option: The main benefits of it are user mobility, portability, and easy management of software installation, updates, and patches.
A. Application virtualization
B. Network virtualization
C. Desktop virtualization
D. Storage virtualization
44. Which is the correct type of full virtualization?
A. Software assisted
B. IoT assisted
C. Hardware-assisted
D. Software assisted and Hardware-assisted both
45. Identify virtualizations: It emulates the hardware using the software instruction sets.
A. Software assisted full virtualizations
B. IoT assisted full virtualizations
C. Hardware-assisted full virtualizations
D. None of these
46. Identify virtualizations: Due to binary translation, it often criticized for performance issues.
A. Software assisted full virtualizations
B. IoT assisted full virtualizations
C. Hardware-assisted full virtualizations
D. None of these
47. Full form of AMI
A. Amazon Memory Image
B. Amazon Memory Instance
C. Amazon Machine Instance
D. Amazon Machine Image
48. Which of these is an example of a cloud marketplace?
A. AWS marketplace
B. Oracle marketplace
C. Microsoft Windows Azure marketplace
D. All of these
49. Which of the following provide system resource access to virtual machines?
A. VMM
B. VMC
C. VNM
D. All of these
50. What is the need for load balancing in cloud computing?
A. Increased scalability
B. Ability to handle sudden traffic spikes
C. A and B both
D. None of these
51. In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.
(A) Virtual machine
(B) Virtual computing
(C) Virtual cloud
(D) Load balancer
52. Who invented the term web 2.0
a. Bill Gates
b. Yahoo
c. Google
d. Tim O'Reilly
53. Which of the following is characteristic of Web 2.0 applications?
A. They get better as more people use it
B. Multiple users schedule their time to use it one by one
C. They provide users with content rather than asking users to create it
D. Web 2.0 application refers to a new version of a web 1.0 application
54. What web2.0 tool is best for collaboration
A. Blogs
B. Podcasts
C. Wikis
D. Glogs
55. What is the key characteristic of web 2.0
A. Better design
B. Better sound
C. User generated content
D. Sharing & openess
56. Web 2.0 means users create the content for a website. Social interaction is involved too.
A. Cussing at someone because you dont like their post is cool
B. Commenting on someones video is an example of socializing
C. Cnn, foxnews.com, espn, and nascar are examples of Web 2.0
D. Web 2.0 will solve all the education sytems problems
57. Social networking is
A. A way for students to share ideas.
B. Not email.
C. Fun and it is what students do all the time.
D. Related to web 2.0
58. ________ serves as a PaaS vendor within the Google App Engine system.
A. Microsoft
B. Amazon
C. Google
D. Azure
59. Windows Azure is an example of ----
A. IaaS
B. SaaS
C. CaaS
D. PaaS
60. Which is not a benefit of virtualization?
A. Flexible and efficient allocation of resources
B. Lowers the cost of IT infrastructure
C. Remote access and rapid scalability
D. Run on single operating system
61. Salesforce.com is an example of -----
A. IaaS
B. SaaS
C. PaaS
D. HaaS
62. A virtual server is a form of virtualization software that emulates a ------
A. Physical server
B. Application Server
C. Tomcat Server
D. Database Server
63. Point out the wrong statement
A. In cloud computing user don’t have to worry about data backup and recovery
B. Cloud computing can be used by small as well as big organisation
C. Cloud offers services like storage,network, applications etc
D. Cloud services are available offline
64. ................is an operating system or application environment that is installed on software, which reproduces dedicated hardware virtually.
A. Virtual machine
B. Virtual computing
C. Virtual cloud
D. Virtual I/O
65. Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems?
A. Vmachines
B. VirtualBox
C. ThoughtPolice
D. Hypervisiors
66. Which of the following is Cloud Platform by Microsoft?
A. Azure
B. AWS
C. Cloudera
D. Google
67. Point out the wrong statement
A. The vendor is responsible for all the operational aspects of the service
B. The customer is responsible only for his interaction with the platform.
C. Google’s App Engine platform is PaaS offering
D. Cloud doesn't need internet.
68. Which of the following cloud concept is related to pooling and sharing of resources
A. Polymorphism
B. Abstraction
C. Virtualization
D. Inheritance
69. Which of the following can be identified as cloud?
A. Web Applications
B. Intranet
C. Hadoop
D. Desktop application
70. _____________ enables the migration of the virtual image from one physical machine to another.
A. visualization
B. virtualization
C. migration
D. virtual transfer
71. Creating more logical IT resources, within one physical system is called-----
A. Load balancing
B. Hypervisor
C. Virtualization
D. Load Splitter
72. An RPC application requires _________
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
73 .Consider the following statements
1. Cloud providers provide cloud services to the cloud users
2.Cloud computing has become popular buzzword
a)statement 1 is true
b)statement 2 is true
c)statement 1 and 2 are true
d)both statements are false
74. Which of the following is not a type of cloud
a)Private
b)Protected
c)Public
d)Hybrid
75. In this type of cloud ,an organisation rents cloud services from cloud providers on demand basis
a)Private
b)Protected
c)Public
d)Hybrid
76. In this type of cloud, cloud is composed of multiple internal or external cloud
a) Private
b)Protected
c)Public
d)Hybrid
77. Most of the cloud architecture are built on this type of architecture.
a)grid
b) linear
c)simple
d)don’t know
78. Saas stands for
a)Software as service
b)System as service
c)stakeholders as service
d)system software and service
79. Iaas stands for
a)income as a service
b) Infrastructure as a service
c) income as a software
d) image as a service
80. Which of the following are service models
a)Saas
b)Iaas
c)Paas
d)All of the above
81. Consider following statement with respect to cloud computing
1.cloud computing refers to application delivered as service over internet
2.Cloud computing has based utility approach
a) All statements are true
b) statement 1 true and 2 false
c)both statements are false
d)statement 2 true and 1 false
82. Which of the following cloud concept is related to pooling and sharing of resources
a) Polymorphism
b)Abstraction
c)Virtualization
d)none of the above
11. Which of the following is a cloud platform for Amazon a)Azure
b) AWS
c) Casendra
d) All of the above
12. Which of the following pricing model used for cloud computing a)Free
b)Subscription c)Pay per use
d)none of the above
13. Consider following statement for cloud computing
1.An internet connection is necessary for cloud computing interactions 2.The term Cloud in Cloud computer represent internet
a) All statements are true ----
b) statement 1 true and 2 false c)both statements are false d)statement 2 true and 1 false
14.While defining Cloud computing which of the following terms are associated
1.No capital investment 2.Virtualization
3.Utility computing 4.Saas
a) all the four terms
b) terms 1,2 correct and 3,4 wrong
c) terms 1,3 correct and 2,4 wrong
d) none of the above terms are used
15.Following statements help me to summarize views regarding cloud computing
1. I don’t care where my servers are and who manages them
2. I don’t no where my documents are stored or where my applications are hosted
a) only statement 1 is true
b) only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
16.Following statements help me to summarize views regarding cloud computing
1. Though i am not aware where my application is hosted but it must be available always
2. It must be available from my residence only a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
17. Which of the following techniques is vital for creating cloud computing a)Normalization
b)modulation c)virtualization d)none of the above
18. Following statements defines cloud computing vision
1.I need to grow my infrastructure ,but I do not know for how long
2.I have a lot of infrastructure but that I will not rent a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
19. Following statements defines cloud computing vision
1.I can invest in infrastructure as I have just started my business
2.I have infrastructure and middleware and I can host applications a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
20. Following statements defines cloud computing vision
1I want to focus on application logic and not maintenance and scalability issues
2.I have a surplus of infrastructure that I want to make use of a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
21. Following statements defines cloud computing vision
1.I want to access and edit my documents and photos from anywhere
2.I have infrastructure to provide application services a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
22. 22.
Google documents, facebook are example of a)Software as a service
b)Platform as a service c)Infrastructure as a service d)All of the above
23. 23.
Windows Azure and Hadoop are example of a)Platform as a service
b)Infrastructure as a service c)Software as a service
d)none of the above
24. Amazon,EC2,S3 are examples of a)Infrastructure as a service b)Software as a service
c) Platform as a service
d) can not say
25. Cloud computing has has some characteristics which are as follows 1.no upfront commitments
2. On demand access 3.nice pricing
a) All three statement are correct
b) Only 1 statement is correct
c) All three statements are false
d) Only statement 3 is true
26.Cloud computing has has some characteristics which are as follows 1.Scalability
2.Efficient resource allocation 3.energy efficient
a)statement 1,2 are true and statement 3 is false b)statement 1,2,3 are true
c) statement 1,2,3 are false
d) statement 1 is true and statement 2,3 are false
27.Following are few challenges for cloud computing 1.In Iaas how many resources need to be provisioned
2.For how long these resources should be used to maximize the profit a)statement 1,2 are true
b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
28.following are technical challenges for cloud computing 1.Management of large computing infrastructure
2.Use of virtualization a)statement 1,2 are true
b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
29. following are challenges in terms of security for cloud computing 1.Security in terms of confidentiality, secrecy and protection of data . 2.Cryptography can be used to
a)statement 1,2 are true b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
30. following are Legal issues related to cloud computing
1.American legislation give extreme powers to government agencies 2.European countries protect the right of privacy.
a)statement 1,2 are true b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
31.
While tracking the historical evolution for cloud computing Following technologies played an important
Role they are
1.Distributed system, virtualization 2.Web 2.0
3.Service oriented computing 4.utility computing
a)statement 1,2 correct and 3,4 false b)statement 4 is correct and 1,2,3 are wrong c)statement 3,4 correct and 1,2 are wrong d)All statements are correct
32.Consider the following statement
1. Distributed system is collection independent computers
2. all these independent computers appears to its user as a single coherent system
a)statement 1 and 2 defines the distributed system b)statement 2 is wrong and 1 is correct c)statement 1 is wrong and 2 is correct
d)don’t know
33. The properties of Distributed system are 1)homogeneous
2)openness 3)Scalability 4)Concurrency
a) all four are correct
b) points 2,3,4 correct and 1 is wrong
c) points 1,2 are correct and 3,4 are wrong
d) points 1,2,3 are correct and 4 is wrong
34. computing proposed a new approach to access large computational power, variety of services.
a)cluster b)distributed c)grid
d)all the above
35. allows the abstraction of some of the fundamental elements for computing like hardware
a)virtualization b)cluster c)network
d) none of the above
36. is the interface through which cloud computing deliver its services
a)Web 2.0 b)application c)functions
d)all of the above
37. Web 2.0 services are obtained by integrating various technologies and standards like
1. XML
2. AJAX
3. Web services 4.none of the above
a.points 1,2,3 are correct and 4 is false b.only Points 1 is correct
c.only point 2 is correct d.only point 3 is correct
38. Service oriented computing supports the development of
systems
a)rapid, low cost, flexible b)interoperable, evolvable application
c) both a and b
d)only a and not b
39. The idea of providing computing as utility like has become reality
a)natural gas b)water c)power
d)all the three
40. Processing of multiple task simultaneously on multiple processors is called computing
a)cluster b)parallel c)central d)single
41. The full form of SISD is
a) Single instance single data
b) system instance system data
c) single instruction single data
d) same instruction same data
42. The full form of SIMD is
a) Single instruction multiple data
b) same data many days
c) system instance multiple data
d) single instruction more data
43. the full form of MISD is
a) Master instruction single data
b) master instruction system data
c) maximum instruction single data
d) Multiple instruction single data
44. The full form of MIMD is
a) Master instruction master data
b) master instruction master days
c) master instruction multiple data
d) multiple instruction multiple data
45. system is uniprocessor machine capable of of operating on single data
a)SISD b)SIMD c)MIMD d)MISD
46. Sequential computing model and conventional computers are build using model
a)SISD b)SIMD c)MIMD d)MISD
47. Machines based on model are well suited for scientific computing
a)SISD b)SIMD----
c)MIMD d)MISD
48. statements such as Ci = Ai*Bi can be executed on model a)SISD
b)SIMD c)MIMD d)MISD
49. statement such as y = sin(x)+ cos(x)+tan(x) can be executed on
model a)SISD
b)SIMD c)MIMD d)MISD
50The machines based on model are not commercially available. a)SISD
b)SIMD c)MIMD d)MISD
51. is multiprocessor system which is executing multiple instruction on multiple data
a) SISD b)SIMD c)MIMD d)MISD
52. select the parallel programming approaches a)data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above
53. In model divide and conquer technique is used to split data into multiple sets and each data set is processed on different PEs by using same instruction
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) none of the above
54. In model given operation has multiple activities which can be processed on multiple processors
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above
55. In model job distribution approach is used where one processor is master and other PEs are slaves
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above
56. parallelism within an application can be detected at task level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain
57. parallelism within an application can be detected at control level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain
58. parallelism within an application can be detected at data level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain
59. parallelism within an application can be detected at multiple instruction issue
a)Large-grain b)medium grain c)Fine-grain d)Very Fine grain
60 Large grain parallelism within an application can be detected at
a) task level
b) Control level
c) data level
d) multiple instruction issue
61Medium grain parallelism within an application can be detected at
a) task level
b) Control level
c) data level
d) multiple instruction issue
62 Fine grain parallelism within an application can be detected at
a) task level
b) Control level
c) data level
d) multiple instruction issue
63 Very Fine grain parallelism within an application can be detected at
a) task level
b) Control level
c) data level
d) multiple instruction issue
64. is a architecture where components interact with each other ,where one issues the request and other returns the response a)peer-to -peer
b) client-server
c) server less
d) client less
65. In model the load of data processing and transformation is put on the server side and client has light implementation.
a) Thin client model-----
b) Fat client model
c) server model
d) no model
66. In model the client component is also responsible for processing and transforming the data before returning it back to the user
a) Thin client model
b) Fat client model--------
c) server model
d) no model
67. architecture partitions the system into two tiers,one is located in client component and other in server component.
a)one-tier b)two-tier c)three-tier d)no-tier
68. tier separates the presentation of data,application logic,data storage .
a)one-tier b)two-tier c)three-tier d)no-tier
69.A model which introduces symmetric architecture where role of client and server is interchangeable.
)Thin client model b)Fat client model
c) server model
d) peer to peer
70. Peer-to –Peer model is where a)client and server role is fixed
b) client and server role can be interchange
c) client is not in action
d) Server is not in action
71. Consider the following statement
1.Now a days the normal end users desktop is powerful enough to fulfill all the needs of everyday computing
2At high-end side of PC market, where supercomputers can provide immense computer power which can accommodate the execution of thousands of virtual machines
The above statements defines which of the following phenomenon a)Increased performance and computing capacity
b) Lack of space
c) Greening Initiatives
d) Risk of administrative cost
72Consider the following statement
1. Computers today are so powerful that in most cases only a fraction of their capacity is used by the system
2. If we consider IT infrastructure of enterprise ,there are lot of computers that are partially used
The above statements defines following phenomenon a)Lack of space
b) Greening Initiatives
c) Risk of administrative cost
d) Underutilized hardware and software resources
73.Consider the following statement
1.Desktop PC’s used by administrative staff are used during office hours,during night they are completely unused
2.A lot of computers which are partially utilized can be utilized without interruption on 24/7/365 basis
The above statements defines following phenomenon a)Greening Initiatives
b) Risk of administrative cost
c) Underutilized hardware and software resources d)Lack of space
74.Consider the following statement
1. Continuous need for additional capacity,is true for storage as well as compute power
2. It helps data centers to grow quickly
The above statements comments on which phenomenon a)Greening Initiatives
b) Risk of administrative cost
c) Underutilized hardware and software resources d)Lack of space
75.Consider the following statement
1. Recently companies looking for ways to reduce the amount of energy they consume and to reduce their carbon footprint.
2. Reducing the number of servers through server consolidation will reduce the impact of cooling and power consumption for data center.
The above statements deals with - a)Risk of administrative cost
b)Underutilized hardware and software resources c)Lack of space
d)Greening Initiatives
76.Consider the following statement
1. Servers do not operate all on their own but requires system administrators
2. higher the number of servers that have to be managed Then higher is the administrative costs.
The above statements deals with
a)Underutilized hardware and software resources b)Lack of space
c) Greening Initiatives
d) Risk of administrative cost
77. Virtualization refers to the creation of a virtual version of
a)hardware b)storage c)network
d)All of the above
78. In a virtualized environment there are number of major components.
a) 3
b) 2
c) 1
d) 4
79. Virtualized environment contains following components a)guest
b)host c)Virtualization layer d)All the above
80. The component represents the system component that interacts with the virtualization layer
a)host b)Virtualization layer c)guest
d)target
81. The component represents the original environment where the guest is supposed to be managed.
a)Virtualization layer b)guest
c)target d)host
82The component is responsible for recreating the same or a different environment where the guest will operate.
a)target b)host
c)Virtualization layer d)guest
83. The virtualization layer is also called
a)host b)guest c)target
d)Virtual Machine manager
84. Consider the following statement
1. Virtual environment is created by software programs
2. The ability of emulate by a software creates a lot of opportunities . The above statement defines the characteristics of virtualization a)only statement 1 is true
b)only statement 2 is true c)statement 1 and 2 are true d)both statements are false
85.Consider the following statement
1. The virtual machine represents an emulated environment in which guest is executed
2. All the operations of the guest are generally performed against the virtual machine
The above statement discusses the characteristic of virtualization
a)Increased Security b)Managed Execution c)sharing d)aggregation
86. Virtualization of the execution environment
Allows increase security and implementation of other features like ------------
a)sharing b)emulation c)isolation d)all the above
87. allows the creation of separate computing environment with the same host
a)virtualization b)hardware c)inserting
d)none of the above
88. The feature of virtualization helps to reduce the number of active servers and limit power consumption.
a)Managed Execution b)sharing c)aggregation d)Emulation
89. When a group of separate host can be tied together and represented to guests as a single virtual host is this feature is termed as ----------------
a)sharing b)aggregation c)Emulation d)isolation
90. Guests are executed within an environment that is controlled by virtualization layer is possible due to feature.
a)sharing b)aggregation c)Emulation d)isolation
91. feature of virtualization allows multiple guest to run on the same host without each of them interfering with the other.
a)sharing b)aggregation c)Emulation d)isolation
92. capability is used to control the performance of the guest by finely tuning the properties of the resources exposed through the virtual environment
a)sharing b)aggregation c)Emulation d)performance tuning
93. In case of hardware virtualization , the guest is packaged into a virtual image that can be safely moved and executed on top of different virtual machines is define feature
a)aggregation b)Emulation c)performance tuning d)Portability
94. The virtualization is used to emulate
a)Environment execution b)storage
c) Network
d) All of the above
95. type of virtualization is categorise into System level and process level
a)Environment execution b)storage
c) Network
d) none of the above
96. level of techniques are implemented on top of an existing operating system which has full control of hardware.
a) process level
b) System level c)Library d)reference model
97. level of technique are implemented directly on hardware and do not require or requite minimum support from existing operating system
a) process level
b) System level c)Library d)reference model
98. Process level technique can be categorised into other levels which are as
a)Emulation b)High-Level VM
c)Multiprogramming d)All of the above
99. System level technique can be categorised into other levels which are as
a) Hardware assisted Virtualization
b) Full virtualization c)Paravirtualization d)All the above
100. Partial Virtualization is a sub category of level a)System level
b) Process level
c) user level
d) none of the above
101. virtualization includes all those techniques whose aim is to emulate an execution environment that is separate from the one hosting the virtualization layer.
a)storage b)network c)Execution d)Application
102. Virtualizing an execution environment at different levels of the computing stack requires a model which defines the interface.
a)reference b)contact c)different d)parallel
103. 103.
In the Machine reference model at the bottom layer the model for the hardware is expressed in terms of the .
a) Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
104. defines instruction set for the Processor,Registers,Memory and Interrupts management. a)Instruction Set Architecture
b) Application Binary Interface c)Application Programming Interface d)Instruction Set Area
105. ISA is the interface between and
a)Hardware ,software b)processor,memory c)hardware,memory d)software,processor
106. separates the operating system layer from the applications and libraries, which is managed by the OS.
a)Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
107. covers details such as low-level data types,alignment,call conventions and defines a format for executable programs.
a) Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
108. The highest level of abstraction is represented by ,Which interfaces applications to libraries and operating system. a)Instruction Set Architecture
b) Application Binary Interface c)Application Programming Interface d)Instruction Set Area
109. The high-level abstraction is converted into instruction to perform the actual operations supported by the processor.
a) Machine level
b) Binary level
c) Assembly level
d) Base level
110. Mention the machine-level resources that are used to perform the operation in the hardware level of CPU.
a) Processor,registers
b) main memory
c) a and b both
d) none of the above
111. JVM stands for a)Java Virtual Machine
b) Java very Machine
c) Just Virtual Machine
d) none of the above
112. instruction can be used without interfering with other task because they do not access shared resources.
a) non-privileged b)privileged c)assembly d)library
113. non-privileged instruction contains following types of instructions a)all the floating instructions
b) fixed point instruction c)arithmetic instruction
d)All of the above instruction
114. instructions are those that are executed under specific restrictions and are mostly used for sensitive operations.
a) non-privileged b)privileged c)assembly d)library
115. In the ring based security ring ---is in most privileged level a)1
b) 2
c) 3
d) 0
116. In the ring based security ring---- is in least privileged level a)1
b) 2
c) 3
d) 0
117. In the ring based security ring --- is used by the kernel of the OS a)2
b) 1
c) 3
d) 0
118..In the ring based security ring --- and --- are used by the OS level services.
a) 1 and 2
b) 0 and 1
c) 2 and 3
d) 1 and 4
119..In the ring based security ring --- is used by the user. a)3
b) 2
c) 1
d) 0
120. Recent systems support only two levels ring 0 for supervisor mode and ring 3 for mode.
a)student b)customer c)user d)manager
121. In mode all the instructions can be executed without any restriction.
a) user b)supervisor c)superuser d)manager
122. The supervisor mode is also called mode or kernel mode. a)user 1
b) high c)master d)main
123. Kernel level mode is used by the operating system to perform
operations on hardware resources. a)sensitive
b)floating c)arithmetic d)special
124. In mode there are restrictions to control the machine level resources.
a)user b)high c)master d)main
125. When code running in user mode invokes the privileged instructions hardware occurs and trap the potentially harmful execution of the instruction.
a)call b)interrupts c)abort
d)none of the above
126. level virtualization is a technique that provides an abstract execution environment in terms of computer hardware.
a) software b)hardware c)network d)data
127. For Hardware level virtualization
1. Guest is represented by the operating system, host is represented by physical computer hardware
2. Virtual machine by its emulation, VMM by the hypervisor a)both statements are wrong
b) both statements are true c)statement 1 is correct d)statement 2
is correct
128. Consider following statements
1.A fundamental element of hardware virtualization is hypervisor
2.It creates a hardware environment , where guest operating systems are installed
a) both statements are true
b) statement 1 is true and statement 2 is false c)statement 2 is true and statement 1 is false d)both statements are false
129. Virtualization is possible due to
a)system b)hypervisor
c) user
d)none of the above
130. There are major types of hypervisors. a)one
b)two c)three d)four
131. hypervisor run directly on top of the hardware a)Type I
b) Type II
c) Type 3
d) Type 4
132. Type I hypervisor is also called
a)bare metal b)native
c) bare metal or native d)hosted
133. Type II hypervisor is also called
a) native
b) bare metal or native c)hosted
d)bare metal
134. hypervisors require the support of an operating system to provide virtualization services.
a) Type I
b) Type II
c) Type a
d) Type b
135 hypervisors includes ESXI,
Microsoft Hyper -V,citrix xen server a)Type I
b) Type II
c) Type a
d) Type b
136. Examples of hypervisors are parallel desktop. a)Type I
b) Type II
c) Type a
d) Type b
137. property says a guest running under the control of a virtual machine manager should exhibit the same behavior as when executed directly on the physical host.
a)Equivalence b)Resource Control c)Efficiency d)performance
138. property says that virtual machine manager should be in complete control of virtualized resources.
a)Equivalence b)Resource Control c)Efficiency d)performance
139. property defines A statistically dominant fraction of the machine instruction should be executed without intervention from the virtual machine manager.
a)Equivalence b)Resource Control c)Efficiency d)performance
140. virtualization refers to a case where hardware provides architectural support for building a virtual machine manager able to run a guest operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial
141. virtualization refers to the ability of running a program, most likely an operating system ,on top of virtual machine and without any modification as it is running on raw hardware
a) full
b) hardware assisted c)paravirtualization d)partial
142. The aim of virtualization is to provide the capability to demand the execution of performance critical operation directly on host,preventing performance losses due to managed execution.
a) full
b) hardware assisted c)paravirtualization d)partial
143. virtualization provides a partial emulation of the underlying hardware, not allowing the complete execution of the guest operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial
144. level virtualization offers the opportunity to create different and separated execution environment for applications that are managed concurrently.
a) full
b) hardware assisted c)paravirtualization d)operating system
145. level virtualization is used for achieving ease of deployment of applications, managed execution and portability across different platforms and operating system.
a) full
b) hardware assisted c)partial
d)Programming -Language
146. virtualization allows application to run on runtime environments which do not natively support all the features required by such application.
a) full
b) Application-Level c)partial
d)Programming -Language
147. By using virtualization users do not have to be worried about the specific location of their data, which can be identified by using logical path.
a) partial
b) hardware assisted c)Storage
d)Programming -Language
148. virtualization combines hardware appliances and specific software for the creation and management of virtual network
a)Network b)hardware assisted c)Storage
d)Programming -Language
149. virtualization abstracts the desktop environment available on a personal computer in order to provide access to it by using a client-server approach
a)Desktop b)hardware assisted c)Storage
d)Programming -Language
150. KVM stands for
a) kernel via machine
b) kernel based virtual machine
c) kernel based virus machine
d) kernel based various machine 151.Identify the logo
175. The Deployment models for cloud are
a)public b)private c)hybrid
d)All the above
176. The cloud is third party multitenant cloud infrastructure and services and available on subscription basis to all
a) public b)private c)hybrid d)permanent
177. cloud model within company’s own datacenter for internal use. a)public
b) private c)hybrid d)permanent
178. Mixed type of cloud is termed as
a)public b)private c)hybrid d)permanent
179. solutions deliver infrastructure on demand in the form of virtual hardware, storage, networking
a) Software as a Service
b) Platform as a Service c)Infrastructure as Service d)none of the above
180. solutions deliver scalable and classic runtime environments on demand .
a) Software as a Service
b) Platform as a Service c)Infrastructure as Service d)none of the above
181 solutions provide applications and services on demand. a)Software as a Service
b)Platform as a Service c)Infrastructure as Service d)none of the above
182. Following are the examples of Web2.0 applications a)Google document, google maps
b)Facebook, Twitter c)Blogger Wikipedia
d)All of the above
183. RSS indicates
a) Really simple syndication
b) Rare simple system
c) Rare Simple Syndication
d) Really Simple System
184. Service Oriented computing introduces concepts Which are also fundamental to cloud computing
a)One b)Two c)Three d)Four
185. identifies a set of functional and non functional attributes that can be used to evaluate the behavior of a service from different perspective
a)Quality of Service b)SLA
c) Software as a Service
d) quantity of service
186. QoS requirements are established between the client and provide via
which identifies the minimum value. a)Service level agreement
b) Software as a Service
c) quantity of service
d) none of the above
187. EC2 stands for
a) Elastic Compute Cloud
b) Elastic Cloud Compute
c) Elastic comute count
d) Electric Compute cloud
188. S3 stands for a)Simple Storage service
b) Single Storage Service
c) Simple Storage sector
d) Simple Storage System
189. is an implementation of mapreduce. a)Hadoop
b)Azure c)Force.com d)App engine
190. is a cloud computing platform for developing social enterprise application.
a)Hadoop b)Azure c)Force.com d)App engine
191.Bar metal is of HyperVisor
a) Type I
b) Type II
c) Type a
d) Type b
192. CRM Stands for……………………….
A. Consumer Relationship Management
B. Client Relationship Management
C. Company Relationship Management
D. Customer Relationship Management
Cloud Computing Technologies MCQs Part-1
Reviewed by Asst. Prof. Sunita Rai, Computer Sci.. Dept., G.N. Khalsa College, Mumbai
on
December 20, 2020
Rating:
bhai answer toh add kar de the sath me
ReplyDelete