Blog about Programming Languages & Coding

Blog about Programming Languages & Coding
Contents for Computer Science, IT, B.Sc. CS & IT, M.Sc. CS & IT, MCA, BE CS & IT, ME CS & IT , Interview Questions, Books and Online Course Recommendations from Udemy, Coursera, etc

Cloud Computing Technologies MCQs Part-1


 Cloud Computing Technologies MCQs

1. Writing parallel programs is referred to as
A.      Parallel computation
B.      Parallel processes
C.      Parallel development
D.     Parallel programming
 
2.      The computer system of a parallel computer is capable of
A.      Decentralized computing
B.      Parallel computing
C.      Distributed computing
D.     Decentralized computing
 
3.      In which application system Distributed systems can run well?
A.      HPC
B.      D. HTC
C.      C. HRC
D.     D. HPC and HTC
 
4.      Type of  HTC applications are-------------
A.      Business
B.      Engineering
C.      Science
D.     Media mass
 
5.      Broader concept offers Cloud computing .to select which of the following.
A.      Parallel computing
B.      Centralized computing
C.      Utility computing
D.     Decentralized computing
 
6.      Uniprocessor computing devices  is called__________.
A.      Grid computing
B.      Centralized computing
C.      Parallel computing
D.     Distributed computing
 
7.      Aberavationn of HPC
A.      High-peak computing
B.      High-peripheral computing
C.      High-performance computing
D.     Highly-parallel computing
 
8.      Type of HPC applications are -------------
A.      Management
B.      Media mass
C.      Business
D.     Science
 
9.      If one site fails in distributed system, ___________
A.      the remaining sites can continue operating
B.      all the sites will stop working
C.      directly connected sites will stop working
D.     none of the mentioned
 
10.  Which amongst the following is not an advantage of Distributed systems?
A.      Resource sharing
B.      Incremental growth
C.      Reliability
D.     transparency
 
11.  The capability of a system to adapt the increased service load is called _________
A.      capacity
B.      tolerance
C.      scalability
D.     none of the mentioned
 
12.  Distributed systems should ?
A.      high security
B.      have better resource sharing
C.      better system utilization
D.     low system overhead
 
13.  Which of the following will be true distributed system ?
A.      tightly-coupled software on loosely-coupled hardware
B.      loosely-coupled software on tightly-coupled hardware
C.      tightly-coupled software on tightly-coupled hardware
D.     loosely-coupled software on loosely-coupled hardware
 
14.  The characteristics of a distributed system are :
A.      Resource sharing, heterogeneity, openness, security
B.      Scalability, fault handling
C.      Concurrency, transparency
D.     ALL are acceptable answers
 
15.  What are design issues in distributed system structure?
A.      Scalability
B.      Fault-tolerance
C.      Flexibility
D.     All of the mentioned
 
16.  In distributed system each processor has its own
A.      local memory
B.      clock
C.      both local memory and clock
D.     none of the mentioned
 
17.  If one site fails in distributed system
A.      the remaining sites can continue operating
B.      all the sites will stop working
C.      directly connected sites will stop working
D.     none of the mentioned
 
18.  The term ______ refers to a Network or Internet.
A.      Cloud Computing
B.      Cloud
C.      Computing
D.     CRM
 
19.  Cloud Computing refers to?
A.      accessing the hardware
B.      configuring the hardware
C.      manipulating the hardware
D.     All of the above
 
20.  Which of the following is true about cloud computing?
A.      Cloud computing is platform dependent
B.      Cloud Computing makes our business applications mobile and collaborative.
C.      Cloud Computing provides us means of accessing the applications as utilities over computer only.
D.     All of the above
 
21.  Which of the following is the working modelsfor cloud computing?
A.      Deployment Models
B.      Configuring Model
C.      Collaborative Model
D.     All of the above
 
22.  The ____________ allows systems and services to be accessible by a group of organizations.
A.      Private cloud
B.      Public cloud
C.      Community cloud
D.     Hybrid cloud
 
23.  The __________ allows systems and services to be accessible within an organization.
A.      Private cloud
B.      Public cloud
C.      Community cloud
D.     Hybrid cloud
 
24.  Which of the following type of virtualization is also characteristic of cloud computing?
A.      Storage
B.      Application
C.      CPU
D.     All of the Above
 
25.  Which of the following is a type of Service Models?
A.      Public-as-a-Service
B.      Platform-as-a-Service
C.      Community-as-a-Service
D.     Public-as-a-Service
 
26.  How many types of Cloud are there in Deployment Models?
A.      2
B.      3
C.      4
D.     5
 
27.  _______ provides the runtime environment for applications, development and deployment tools, etc.
A.      IaaS
B.      PaaS
C.      SaaS
D.     XaaS
 
28.  ________________ is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service.
A.      IaaS
B.      PaaS
C.      SaaS
D.     XaaS
 
29.  When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.
A.      SaaS
B.      PaaS
C.      IaaS
D.     All of the mentioned
 
30.  Which of the following is most refined and restrictive service model ?
A.      IaaS
B.      CaaS
C.      PaaS
D.     All of the mentioned
31.  Which of the following is best known service model ?
A.      SaaS
B.      IaaS
C.      PaaS
D.     All of the mentioned
 
32.  An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party
33.  RPC is used to _________
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and retrieve information by calling a query
d) to secure the client
34.  A remote procedure call is _______
a) inter-process communication
b) a single process
c) a single thread
d) a single stream
35.  RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation

36.  The local operating system on the server machine passes the incoming packets to the ___________
a) server stub
b) client stub
c) client operating system
d) client process

37.  Creating more logical IT resources, within one physical system is called ________.
A.      Load balancing
B.      Hypervisor
C.      Virtualization
D.     None of these
 
38.  What is most commonly used for managing the resources for every virtual system?
A.      Load balancer
B.      Hypervisor
C.      Router
D.     Cloud
 
39.  Which is not a benefit of virtualization?
A.      Flexible and efficient allocation of resources
B.      Lowers the cost of IT infrastructure
C.      Remote access and rapid scalability
D.     Run on single operating system
 
40.  It helps a user to have remote access to an application from a server.
A.      Application virtualization
B.      Network virtualization
C.      Desktop virtualization
D.     Storage virtualization
 
41.  It is an array of servers that are managed by a virtual storage system.
A.      Application virtualization
B.      Network virtualization
C.      Desktop virtualization
D.     Storage virtualization
 
42.  It has the ability to run multiple virtual networks with each has a separate control and data plan.
A.      Application virtualization
B.      Network virtualization
C.      Desktop virtualization
D.     Storage virtualization
 
43.  Identify the correct option: The main benefits of it are user mobility, portability, and easy management of software installation, updates, and patches.
A.      Application virtualization
B.      Network virtualization
C.      Desktop virtualization
D.     Storage virtualization
 
44.  Which is the correct type of full virtualization?
A.      Software assisted
B.      IoT assisted
C.      Hardware-assisted
D.     Software assisted and Hardware-assisted both
45.  Identify virtualizations: It emulates the hardware using the software instruction sets.
A.      Software assisted full virtualizations
B.      IoT assisted full virtualizations
C.      Hardware-assisted full virtualizations
D.     None of these
 
46.  Identify virtualizations: Due to binary translation, it often criticized for performance issues.
A.      Software assisted full virtualizations
B.      IoT assisted full virtualizations
C.      Hardware-assisted full virtualizations
D.     None of these
 
47.  Full form of AMI
A.      Amazon Memory Image
B.      Amazon Memory Instance
C.      Amazon Machine Instance
D.     Amazon Machine Image
 
48.  Which of these is an example of a cloud marketplace?
A.      AWS marketplace
B.      Oracle marketplace
C.      Microsoft Windows Azure marketplace
D.     All of these
 
49.  Which of the following provide system resource access to virtual machines?
A.      VMM
B.      VMC
C.      VNM
D.     All of these
 
50.  What is the need for load balancing in cloud computing?
A.      Increased scalability
B.      Ability to handle sudden traffic spikes
C.      A and B both
D.     None of these
 
51.  In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.
(A) Virtual machine
(B) Virtual computing
(C) Virtual cloud
(D) Load balancer
 
52.  Who invented the term web 2.0
a.      Bill Gates
b.      Yahoo
c.       Google
d.      Tim O'Reilly
 
53.  Which of the following is characteristic of Web 2.0 applications?
A.      They get better as more people use it
B.      Multiple users schedule their time to use it one by one
C.      They provide users with content rather than asking users to create it
D.     Web 2.0 application refers to a new version of a web 1.0 application
 
54.  What web2.0 tool is best for collaboration
A.      Blogs
B.      Podcasts
C.      Wikis
D.     Glogs
 
55.  What is the key characteristic of web 2.0
A.      Better design
B.      Better sound
C.      User generated content
D.     Sharing & openess
 
56.  Web 2.0 means users create the content for a website. Social interaction is involved too.
A.      Cussing at someone because you dont like their post is cool
B.      Commenting on someones video is an example of socializing
C.      Cnn, foxnews.com, espn, and nascar are examples of Web 2.0
D.     Web 2.0 will solve all the education sytems problems

57.  Social networking is
A.      A way for students to share ideas.
B.      Not email.
C.      Fun and it is what students do all the time.
D.     Related to web 2.0
 
58.  ________ serves as a PaaS vendor within the Google App Engine system.
A.      Microsoft
B.      Amazon
C.      Google
D.     Azure
 
59.  Windows Azure is an example of ----
A.      IaaS
B.      SaaS
C.      CaaS
D.     PaaS
 
60.  Which is not a benefit of virtualization?
A.      Flexible and efficient allocation of resources
B.      Lowers the cost of IT infrastructure
C.      Remote access and rapid scalability
D.     Run on single operating system
 
61.  Salesforce.com is an example of -----
A.      IaaS
B.      SaaS
C.      PaaS
D.     HaaS
 
62.  A virtual server is a form of virtualization software that emulates a ------
A.      Physical server
B.      Application Server
C.      Tomcat Server
D.     Database Server
 
63.  Point out the wrong statement
A.      In cloud computing user don’t have to worry about data backup and recovery
B.      Cloud computing can be used by small as well as big organisation
C.      Cloud offers services like storage,network, applications etc
D.     Cloud services are available offline

64.  ................is an operating system or application environment that is installed on software, which reproduces dedicated hardware virtually.
A.      Virtual machine
B.      Virtual computing
C.      Virtual cloud
D.     Virtual I/O
 
65.  Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems?
A.      Vmachines
B.      VirtualBox
C.      ThoughtPolice
D.     Hypervisiors
 
66.  Which of the following is Cloud Platform by Microsoft?
A.      Azure
B.      AWS
C.      Cloudera
D.     Google
 
67.  Point out the wrong statement
A.      The vendor is responsible for all the operational aspects of the service
B.      The customer is responsible only for his interaction with the platform.
C.      Google’s App Engine platform is PaaS offering
D.     Cloud doesn't need internet.
 
68.  Which of the following cloud concept is related to pooling and sharing of resources
A.      Polymorphism
B.      Abstraction
C.      Virtualization
D.     Inheritance
 
69.  Which of the following can be identified as cloud?
A.      Web Applications
B.      Intranet
C.      Hadoop
D.     Desktop application
 
70.  _____________ enables the migration of the virtual image from one physical machine to another.
A.      visualization
B.      virtualization
C.      migration
D.     virtual transfer
 
71.  Creating more logical IT resources, within one physical system is called-----
A.      Load balancing
B.      Hypervisor
C.      Virtualization
D.     Load Splitter
 
72.  An RPC application requires _________
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
 73 .Consider the following statements
1. Cloud providers provide cloud services to the cloud users 
2.Cloud computing has become popular buzzword
a)statement 1 is true
b)statement 2 is true 
c)statement 1 and 2 are true 
d)both statements are false
 
74. Which of the following is not a type of cloud 
a)Private
b)Protected 
c)Public 
d)Hybrid
 
75. In this type of cloud ,an organisation rents cloud services from cloud providers on demand basis
a)Private
b)Protected 
c)Public 
d)Hybrid
 
76. In this type of cloud, cloud is composed of multiple internal or external cloud
a) Private 
b)Protected 
c)Public 
d)Hybrid
77.  Most of the cloud architecture are built on this type of architecture. 
a)grid
b) linear 
c)simple 
d)don’t know
78. Saas stands for 
a)Software as service
b)System as service 
c)stakeholders as service 
d)system software and service
 
79. Iaas stands for 
a)income as a service
b) Infrastructure as a service
c)  income as a software
d) image as a service
 
80. Which of the following are service models 
a)Saas
b)Iaas 
c)Paas
d)All of the above
81. Consider following statement with respect to cloud computing
1.cloud computing refers to application delivered as service over internet
2.Cloud computing has based utility approach
a) All statements are true 
b) statement 1 true and 2 false
 c)both statements are false 
d)statement 2 true and 1 false
 
82. Which of the following cloud concept is related to pooling and sharing of resources
a) Polymorphism 
b)Abstraction 
c)Virtualization
d)none of the above

11. Which of the following is a cloud platform for Amazon a)Azure
b) AWS
c) Casendra
d) All of the above
 
12. Which of the following pricing model used for cloud computing a)Free
b)Subscription c)Pay per use
d)none of the above
13. Consider following statement for cloud computing
1.An internet connection is necessary for cloud computing interactions 2.The term Cloud in Cloud computer represent internet
a) All statements are true ----
b) statement 1 true and 2 false c)both statements are false d)statement 2 true and 1 false
 
14.While defining Cloud computing which of the following     terms are associated
1.No capital investment 2.Virtualization
3.Utility computing 4.Saas
a) all the four terms
b)   terms 1,2 correct and 3,4 wrong
c) terms 1,3 correct and 2,4 wrong
d) none of the above terms are used

15.Following statements help me to summarize views regarding cloud computing
1.  I don’t care where my servers are and who manages them
2.      I don’t no where my documents are stored or where my applications are hosted
a) only statement 1 is true
b) only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
 
16.Following statements help me to summarize views regarding cloud computing
1. Though i am not aware where my application is hosted but it must be available always
2. It must be available from my residence only a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
 
17. Which of the following techniques is vital for creating cloud computing a)Normalization
b)modulation c)virtualization d)none of the above
 
18. Following statements defines cloud computing vision
1.I need to grow my infrastructure ,but I do not know for how long
2.I have a lot of infrastructure but that I will not rent a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong

19. Following statements defines cloud computing vision
1.I can invest in infrastructure as I have just started my business
2.I have infrastructure and middleware and I can host applications a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
 
20. Following statements defines cloud computing vision
1I want to focus on application logic and not maintenance and scalability issues
2.I have a surplus of infrastructure that I want to make use of a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
 
21. Following statements defines cloud computing vision
1.I want to access and edit my documents and photos from anywhere
2.I have infrastructure to provide application services a)only statement 1 is true
b)only statement 2 is true c)statements 1 and 2 are true d)both statements are wrong
 
22. 22.
Google documents, facebook are example of a)Software as a service
b)Platform as a service c)Infrastructure as a service d)All of the above

23. 23.
Windows Azure and Hadoop are example of a)Platform as a service
b)Infrastructure as a service c)Software as a service
d)none of the above
 
24. Amazon,EC2,S3 are examples of a)Infrastructure as a service b)Software as a service
c) Platform as a service
d) can not say
 
25. Cloud computing has has some characteristics which are as follows 1.no upfront commitments
2. On demand access 3.nice pricing
a)   All three statement are correct
b)   Only 1 statement is correct
c)   All three statements are false
d)   Only statement 3 is true
 
26.Cloud computing has has some characteristics which are as follows 1.Scalability
2.Efficient resource allocation 3.energy efficient
a)statement 1,2 are true and statement 3 is false b)statement 1,2,3 are true
c) statement 1,2,3 are false
d) statement 1 is true and statement 2,3 are false

27.Following are few challenges for cloud computing 1.In Iaas how many resources need to be provisioned
2.For how long these resources should be used to maximize the profit a)statement 1,2 are true
b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
 
28.following are technical challenges for cloud computing 1.Management of large computing infrastructure
2.Use of virtualization a)statement 1,2 are true
b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
 
29. following are challenges in terms of security for cloud computing 1.Security in terms of confidentiality, secrecy and protection of data . 2.Cryptography can be used to
a)statement 1,2 are true b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false
 
30. following are Legal issues related to cloud computing
1.American legislation give extreme powers to government agencies 2.European countries protect the right of privacy.
a)statement 1,2 are true b)statement 1 is true and 2 is false c)statement 1,2 are false d)statement 2 is true and 1 is false

31.
While tracking the historical evolution for cloud computing Following technologies played an important
Role they are
1.Distributed system, virtualization 2.Web 2.0
3.Service oriented computing 4.utility computing
a)statement 1,2 correct and 3,4 false b)statement 4 is correct and 1,2,3 are wrong c)statement 3,4 correct and 1,2 are wrong d)All statements are correct
 
32.Consider the following statement
1. Distributed system is collection independent computers
2. all these independent computers appears to its user as a single coherent system
a)statement 1 and 2 defines the distributed system b)statement 2 is wrong and 1 is correct c)statement 1 is wrong and 2 is correct
d)don’t know
 
33. The properties of Distributed system are 1)homogeneous
2)openness 3)Scalability 4)Concurrency
a) all four are correct
b) points 2,3,4 correct and 1 is wrong
c) points 1,2 are correct and 3,4 are wrong
d) points 1,2,3 are correct and 4 is wrong

34.                           computing proposed a new approach to access large computational power, variety of services.
a)cluster b)distributed c)grid
d)all the above
 
35.                           allows the abstraction of some of the fundamental elements for computing like hardware
a)virtualization b)cluster c)network
d) none of the above
 
36.                       is the interface through which cloud computing deliver its services
a)Web 2.0 b)application c)functions
d)all of the above
 
37. Web 2.0 services are obtained by integrating various technologies and standards like
1. XML
2. AJAX
3. Web services 4.none of the above
 
a.points 1,2,3 are correct and 4 is false b.only Points 1 is correct
c.only point 2 is correct d.only point 3 is correct

38. Service oriented computing supports the development of                
systems
a)rapid, low cost, flexible b)interoperable, evolvable application
c)  both a and b
d)only a and not b
 
39. The  idea of providing computing as utility like            has become reality
a)natural gas b)water c)power
d)all the three
 
40. Processing of multiple task simultaneously on multiple processors is called                computing
a)cluster b)parallel c)central d)single
 
41. The full form of SISD is          
a) Single instance single data
b) system instance system data
c) single instruction single data
d) same instruction same data
 
42. The full form of SIMD is                        
a) Single instruction multiple data
b) same data many days
c) system instance multiple data
d) single instruction more data

43. the full form of MISD is                
a) Master instruction single data
b) master instruction system data
c) maximum instruction single data
d) Multiple instruction single data
 
44. The full form of MIMD is            
a) Master instruction master data
b) master instruction master days
c) master instruction multiple data
d) multiple instruction multiple data
 
45.                   system is uniprocessor machine capable of of operating on single data
a)SISD b)SIMD c)MIMD d)MISD
 
46. Sequential computing model and conventional computers are build using                      model
a)SISD b)SIMD c)MIMD d)MISD
 
47. Machines based on               model are well suited for scientific computing
a)SISD b)SIMD----
c)MIMD d)MISD

48. statements such as Ci = Ai*Bi can be executed on             model a)SISD
b)SIMD c)MIMD d)MISD
 
49. statement such as y = sin(x)+ cos(x)+tan(x) can be executed on
                 model a)SISD
b)SIMD c)MIMD d)MISD
 
50The machines based on            model are not commercially available. a)SISD
b)SIMD c)MIMD d)MISD
 
51.                         is multiprocessor system which is executing multiple instruction on multiple data
a) SISD b)SIMD c)MIMD d)MISD
 
52. select the parallel programming approaches a)data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above

53. In                       model divide and conquer technique is used to split data into multiple sets and each data set is processed on different PEs by using same instruction
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) none of the above
 
54. In                           model given operation has multiple activities which can be processed on multiple processors
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above
 
55. In                model job distribution approach is used where one processor is master and other PEs are slaves
a) data parallelism
b) process parallelism
c) Farmer and worker model
d) all the above
 
56.             parallelism within an application can be detected at task level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain
 
 
57.             parallelism within an application can be detected at control level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain

58.             parallelism within an application can be detected at data level a)Large-grain
b)medium grain c)Fine-grain d)Very Fine grain
 
59.             parallelism within an application can be detected at multiple instruction issue
a)Large-grain b)medium grain c)Fine-grain d)Very Fine grain
 
60 Large grain parallelism within an application can be detected at



a) task level
b) Control level
c) data level
d) multiple instruction issue
 
61Medium grain parallelism within an application can be detected at



a) task level
b) Control level
c) data level
d) multiple instruction issue
 
62  Fine grain parallelism within an application can be detected at



a) task level
b) Control level
c) data level
d) multiple instruction issue

63  Very Fine grain parallelism within an application can be detected at



a) task level
b) Control level
c) data level
d) multiple instruction issue
 
64.                       is a architecture where components interact with each other ,where one issues the request and other returns the response a)peer-to -peer
b) client-server
c)  server less
d) client less
 
65.   In                  model the load of data processing and transformation is put on the server side and client has light implementation.
a) Thin client model-----
b) Fat client model
c) server model
d)   no model
 
66. In              model the client component is also responsible for processing and transforming the data before returning it back to the user
a) Thin client model
b) Fat client model--------
c) server model
d)   no model
 
67.                       architecture partitions the system into two tiers,one is located in client component and other in server component.
a)one-tier b)two-tier c)three-tier d)no-tier

68.                       tier separates the presentation of data,application logic,data storage .
a)one-tier b)two-tier c)three-tier d)no-tier
 
69.A                   model which introduces symmetric architecture where role of client and server is interchangeable.
)Thin client model b)Fat client model
c) server model
d)   peer to peer
 
70. Peer-to –Peer model is where a)client and server role is fixed
b) client and server role can be interchange
c) client is not in action
d) Server is not in action
 
71.   Consider the following statement
1.Now a days the normal end users desktop is powerful enough to fulfill all the needs of everyday computing
2At high-end side of PC market, where supercomputers can provide immense computer power which can accommodate the execution of thousands of virtual machines
The above statements defines which of the following phenomenon a)Increased performance and computing capacity
b) Lack of space
c) Greening Initiatives
d) Risk of administrative cost

72Consider the following statement
1. Computers today are so powerful that in most cases only a fraction of their capacity is used by the system
2. If we consider IT infrastructure of enterprise ,there are lot of computers that are partially used
The above statements defines following phenomenon a)Lack of space
b) Greening Initiatives
c) Risk of administrative cost
d) Underutilized hardware and software resources
 
73.Consider the following statement
1.Desktop PC’s used by administrative staff are used during office hours,during night they are completely unused
2.A lot of computers which are partially utilized can be utilized without interruption on 24/7/365 basis
The above statements defines following phenomenon a)Greening Initiatives
b) Risk of administrative cost
c) Underutilized hardware and software resources d)Lack of space
 
74.Consider the following statement
1. Continuous need for additional capacity,is true for storage as well as compute power
2. It helps data centers to grow quickly
The above statements comments on which phenomenon a)Greening Initiatives
b) Risk of administrative cost
c) Underutilized hardware and software resources d)Lack of space

 
 
 
75.Consider the following statement
1. Recently companies looking for ways to reduce the amount of energy they consume and to reduce their carbon footprint.
2. Reducing the number of servers through server consolidation will reduce the impact of cooling and power consumption for data center.
The above statements deals with - a)Risk of administrative cost
b)Underutilized hardware and software resources c)Lack of space
d)Greening Initiatives
 
76.Consider the following statement
1. Servers do not operate all on their own but requires system administrators
2. higher the number of servers that have to be managed Then higher is the administrative costs.
The above statements deals with
a)Underutilized hardware and software resources b)Lack of space
c) Greening Initiatives
d) Risk of administrative cost
 
77.  Virtualization refers to the creation of a virtual version of                     
a)hardware b)storage c)network
d)All of the above
78.                                                                                                                                  In a virtualized environment there are                                             number of major components.
a) 3
b) 2
c) 1
d) 4

 
79.  Virtualized environment contains following components a)guest
b)host c)Virtualization layer d)All the above
 
80.                                                           The       component represents the system component that interacts with the virtualization layer
a)host b)Virtualization layer c)guest
d)target
 
81.                                                The   component represents the original environment where the guest is supposed to be managed.
a)Virtualization layer b)guest
c)target d)host
 
82The                      component is responsible for recreating the same or a different environment where the guest will operate.
a)target b)host
c)Virtualization layer d)guest
 
83. The virtualization layer is also called                            
a)host b)guest c)target
d)Virtual Machine manager

84. Consider the following statement
1. Virtual environment is created by software programs
2. The ability of emulate by a software creates a lot of opportunities . The above statement defines the characteristics of virtualization a)only statement 1 is true
b)only statement 2 is true c)statement 1 and 2 are true d)both statements are false
 
85.Consider the following statement
1. The virtual machine represents an emulated environment in which guest is executed
2. All the operations of the guest are generally performed against the virtual machine
The above statement discusses the                  characteristic of virtualization
a)Increased Security b)Managed Execution c)sharing d)aggregation
 
86. Virtualization of the execution environment
Allows increase security and implementation of other features like ------------



a)sharing b)emulation c)isolation d)all the above
87.                            allows the creation of separate computing environment with the same host
a)virtualization b)hardware c)inserting
d)none of the above

88. The                feature of virtualization helps to reduce the number of active servers and limit power consumption.
a)Managed Execution b)sharing c)aggregation d)Emulation
 
89. When a group of separate host can be tied together and represented to guests as a single virtual host is this feature is termed as ----------------
a)sharing b)aggregation c)Emulation d)isolation
 
90. Guests are executed within an environment that is controlled by virtualization layer is possible due to          feature.
a)sharing b)aggregation c)Emulation d)isolation
 
91.                               feature of virtualization allows multiple guest to run on the same host without each of them interfering with the other.
a)sharing b)aggregation c)Emulation d)isolation
 
92.                       capability is used to control the performance of the guest by finely tuning the properties of the resources exposed through the virtual environment
a)sharing b)aggregation c)Emulation d)performance tuning

 
93. In case of hardware virtualization , the guest is packaged into a virtual image that can be safely moved and executed on top of different virtual machines is define                    feature
a)aggregation b)Emulation c)performance tuning d)Portability
94. The virtualization is used to emulate                        
a)Environment execution b)storage
c) Network
d) All of the above
 
95.                           type of virtualization is categorise into System level and process level
a)Environment execution b)storage
c) Network
d) none of the above
 
96.                  level of techniques are implemented on top of an existing operating system which has full control of hardware.
a) process level
b) System level c)Library d)reference model
 
97.                       level of technique are implemented directly on hardware and do not require or requite minimum support from existing operating system
a) process level
b) System level c)Library d)reference model

 
98. Process level technique can be categorised into other levels which are as       
a)Emulation b)High-Level VM
c)Multiprogramming d)All of the above
 
99. System level technique can be categorised into other levels which are as       
a) Hardware assisted Virtualization
b) Full virtualization c)Paravirtualization d)All the above
 
100.  Partial Virtualization is a sub category of                   level a)System level
b) Process level
c) user level
d) none of the above
101.                          virtualization includes all those techniques whose aim is to emulate an execution environment that is separate from the one hosting the virtualization layer.
a)storage b)network c)Execution d)Application
 
102.  Virtualizing an execution environment at different levels of the computing stack requires a                       model which defines the interface.
a)reference b)contact c)different d)parallel

 
103.  103.
In the Machine reference model at the bottom layer the model for the hardware is expressed in terms of the                    .
a) Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
 
104.                         defines instruction set for the Processor,Registers,Memory and Interrupts management. a)Instruction Set Architecture
b) Application Binary Interface c)Application Programming Interface d)Instruction Set Area
 
105.  ISA is the interface between             and           
a)Hardware ,software b)processor,memory c)hardware,memory d)software,processor
 
106.                                    separates the operating system layer from the applications and libraries, which is managed by the OS.
a)Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
 
107.                        covers details such as low-level data types,alignment,call conventions and defines a format for executable programs.
a) Instruction Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area

 
 
 
108.  The highest level of abstraction is represented by         ,Which interfaces applications to libraries and operating system. a)Instruction Set Architecture
b) Application Binary Interface c)Application Programming Interface d)Instruction Set Area
 
109.  The high-level abstraction is converted into                  instruction to perform the actual operations supported by the processor.
a) Machine level
b) Binary level
c) Assembly level
d) Base level
 
110.  Mention the machine-level resources that are used to perform the operation in the hardware level of CPU.
a) Processor,registers
b)   main memory
c)  a and b both
d) none of the above
 
111.  JVM stands for a)Java Virtual Machine
b) Java very Machine
c) Just Virtual Machine
d) none of the above
 
112.                      instruction can be used without interfering with other task because they do not access shared resources.
a) non-privileged b)privileged c)assembly d)library

 
 
 
113.  non-privileged instruction contains following types of instructions a)all the floating instructions
b) fixed point instruction c)arithmetic instruction
d)All of the above instruction
 
114.                            instructions are those that are executed under specific restrictions and are mostly used for sensitive operations.
a) non-privileged b)privileged c)assembly d)library
 
115.  In the ring based security ring ---is in most privileged level a)1
b) 2
c) 3
d) 0
 
116.  In the ring based security ring----  is in least privileged level a)1
b) 2
c) 3
d) 0
 
 
 
117.  In the ring based security ring    ---   is used by the kernel of the OS a)2
b) 1
c) 3
d) 0

 
118..In the ring based security ring    ---   and  ---      are used by the OS level services.
a) 1 and 2
b) 0 and 1
c) 2 and 3
d) 1 and 4
 
119..In the ring based security ring   ---   is used by the  user. a)3
b) 2
c) 1
d) 0
 
120.  Recent systems support only two levels ring 0 for supervisor mode and ring 3 for          mode.
a)student b)customer c)user d)manager
 
 
121.  In              mode all the instructions can be executed without any restriction.
a) user b)supervisor c)superuser d)manager
 
122.  The supervisor mode is also called            mode or kernel mode. a)user 1
b) high c)master d)main

123.  Kernel level mode is used by the operating system to perform
                   operations on hardware resources. a)sensitive
b)floating c)arithmetic d)special
 
124.  In              mode there are restrictions to control the machine level resources.
a)user b)high c)master d)main
 
125.  When code running in user mode invokes the privileged instructions hardware                occurs and trap the potentially harmful execution of the instruction.
a)call b)interrupts c)abort
d)none of the above
 
126.                        level virtualization is a technique that provides an abstract execution environment in terms of computer hardware.
a) software b)hardware c)network d)data

127.  For Hardware level virtualization
1. Guest is represented by the operating system, host is represented by physical computer hardware
2. Virtual machine by its emulation, VMM by the hypervisor a)both statements are wrong
b) both statements are true c)statement 1 is correct d)statement 2
is correct
 
128. Consider following statements
1.A fundamental element of hardware virtualization is hypervisor
2.It creates a hardware environment , where guest operating systems are installed
a) both statements are true
b) statement 1 is true and statement 2 is false c)statement 2 is true and statement 1 is false d)both statements are false
 
129.  Virtualization is possible due to                
a)system b)hypervisor
c)  user
d)none of the above
 
130.  There are              major types of hypervisors. a)one
b)two c)three d)four
131.                 hypervisor run directly on top of the hardware a)Type I
b) Type II
c) Type 3
d) Type 4

132.  Type I hypervisor is also called            
a)bare metal b)native
c) bare metal or native d)hosted
 
133.  Type II hypervisor is also called                    
a) native
b)   bare metal or native c)hosted
d)bare metal
 
134.                   hypervisors require the support of an operating system to provide virtualization services.
a) Type I
b) Type II
c) Type a
d) Type b
 
135               hypervisors includes ESXI,
Microsoft Hyper -V,citrix xen server a)Type I
b) Type II
c) Type a
d) Type b
 
136.  Examples of                 hypervisors are parallel desktop. a)Type I
b) Type II
c) Type a
d) Type b

137.                        property says a guest running under the control of a virtual machine manager should exhibit the same behavior as when executed directly on the physical host.
a)Equivalence b)Resource Control c)Efficiency d)performance
 
138.                   property says that virtual machine manager should be in complete control of virtualized resources.
a)Equivalence b)Resource Control c)Efficiency d)performance
 
139.                      property defines A statistically dominant fraction of the machine instruction should be executed without intervention from the virtual machine manager.
 
a)Equivalence b)Resource Control c)Efficiency d)performance
 
140.                      virtualization refers to a case where hardware provides architectural support for building a virtual machine manager able to run a guest operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial

141.                             virtualization refers to the ability of running a program, most likely an operating system ,on top of virtual machine and without any modification as it is running on raw hardware
a) full
b) hardware assisted c)paravirtualization d)partial
 
142.  The aim of                      virtualization is to provide the capability to demand the execution of performance critical operation directly on host,preventing performance losses due to managed execution.
a) full
b) hardware assisted c)paravirtualization d)partial
 
143.                          virtualization provides a partial emulation of the underlying hardware, not allowing the complete execution of the guest operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial
 
144.                        level virtualization offers the opportunity to create different and separated execution environment for applications that are managed concurrently.
a) full
b) hardware assisted c)paravirtualization d)operating system

145.                          level virtualization is used for achieving ease of deployment of applications, managed execution and portability across different platforms and operating system.
a) full
b) hardware assisted c)partial
d)Programming -Language
 
146.                          virtualization allows application to run on runtime environments which do not natively support all the features required by such application.
a) full
b) Application-Level c)partial
d)Programming -Language
 
147.  By using                   virtualization users do not have to be worried about the specific location of their data, which can be identified by using logical path.
a) partial
b) hardware assisted c)Storage
d)Programming -Language
 
148.                        virtualization combines hardware appliances and specific software for the creation and management of virtual network
a)Network b)hardware assisted c)Storage
d)Programming -Language

149.                          virtualization abstracts the desktop environment available on a personal computer in order to provide access to it by using a client-server approach
a)Desktop b)hardware assisted c)Storage
d)Programming -Language
 
150.  KVM stands for                  
a) kernel via machine
b) kernel based virtual machine
c) kernel based virus machine
d) kernel based various machine 151.Identify the logo
 
 
 

175.                                                                                                                            The Deployment models for cloud are                                                          
a)public b)private c)hybrid
d)All the above
 
176.                                      The        cloud is third party multitenant cloud infrastructure and services and available on subscription basis to all
a) public b)private c)hybrid d)permanent
 
177.                           cloud model within company’s own datacenter for internal use. a)public
b) private c)hybrid d)permanent
 
178.                                                                                                                                      Mixed type of cloud is termed as                                                                           
a)public b)private c)hybrid d)permanent
 
179.                                             solutions deliver infrastructure on demand in the form of virtual hardware, storage, networking
a) Software as a Service
b) Platform as a Service c)Infrastructure as Service d)none of the above

180.                           solutions deliver scalable and classic runtime environments on demand .
a) Software as a Service
b) Platform as a Service c)Infrastructure as Service d)none of the above
 
181                       solutions provide applications and services on demand. a)Software as a Service
b)Platform as a Service c)Infrastructure as Service d)none of the above
 
182.  Following are the examples of Web2.0 applications a)Google document, google maps
b)Facebook, Twitter c)Blogger Wikipedia
d)All of the above
183.  RSS indicates                       
a) Really simple syndication
b) Rare simple system
c) Rare Simple Syndication
d) Really Simple System
 
184.  Service Oriented computing introduces        concepts Which are also fundamental to cloud computing
a)One b)Two c)Three d)Four

185.                      identifies a set of functional and non functional attributes that can be used to evaluate the behavior of a service from different perspective
a)Quality of Service b)SLA
c) Software as a Service
d) quantity of service
 
186.  QoS requirements are established between the client and provide via
                           which identifies the minimum value. a)Service level agreement
b) Software as a Service
c) quantity of service
d) none of the above
 
187.  EC2 stands for                
a) Elastic Compute Cloud
b) Elastic Cloud Compute
c) Elastic comute count
d) Electric Compute cloud
 
188.  S3 stands for a)Simple Storage service
b) Single Storage Service
c) Simple Storage sector
d) Simple Storage System
 
189.                   is an implementation of mapreduce. a)Hadoop
b)Azure c)Force.com d)App engine

190.                   is a cloud computing platform for developing social enterprise application.
a)Hadoop b)Azure c)Force.com d)App engine
 

191.Bar metal is                of HyperVisor
a) Type I
b) Type II
c) Type a
d) Type b

192. CRM Stands for………………………. 
A. Consumer Relationship Management 
B. Client Relationship Management 
C. Company Relationship Management 
D. Customer Relationship Management 
 
 

Cloud Computing Technologies MCQs Part-1  Cloud Computing Technologies MCQs Part-1 Reviewed by Asst. Prof. Sunita Rai, Computer Sci.. Dept., G.N. Khalsa College, Mumbai on December 20, 2020 Rating: 5

1 comment:

Powered by Blogger.