cloud computing practice questions for engineering

Cloud Computing

Cloud Computing Practice Questions

Cloud Computing: हेलो साथियों आज हम आपको Cloud Computing के कुछ प्रश्न देने जा रहे हैं ,जोकि आपकी सेमेस्टर एग्जाम, कॉम्पिटेटिव एग्जाम्स या अदर एग्जाम के लिए भी बहुत हेल्प करेंगे | इन प्रश्नों को हमने Mostly इंजीनियरिंग जैसे डिप्लोमा या डिग्री वालों को केंद्रित कर डिजाइन किया है, क्योंकि इस कोरोनावायरस महामारी में स्टूडेंट्स परेशान है ,और मार्केट में बुक्स आई नहीं है तो यह सब देखते हुए हमने सोचा कि आप सभी की कुछ सहायता की जाए आप यदि इन प्रश्नों को ध्यानपूर्वक और नोट डाउन कर पूरा पढ़ लेते हैं, तो यकीन मानिए आपके एग्जाम में यह बहुत सहायता करेंगे धन्यवाद

तो आइए चलते हैं उन प्रश्नों पर

Unit-1 Introduction

Introduction to Cloud Computing

  1. __________computing refers to applications and services that run on a distributed network using virtualized resources
    i ) Cloud
    ii ) Distributed
    iii ) Soft
    iv ) Parallel

Ans. : Cloud
Explanation : Cloud Computing applications are accessed by common Internet protocols and networking standards.

2. __________ as a utility is a dream that dates from the beginning of the computing industry itself.

i ) Computing
ii ) Model
iii ) Software
iv ) All of the mentioned

Ans : Computing
Explanation : Cloud Computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility.

3. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a_________resource.
i ) cloud
ii ) virtual
iii ) real
iv ) none of the mentioned
Ans. : virtual
Explanation : Cloud Computing is a new model for provisioning resources, for staging applications, and for platform-independent user access to services.

4. The service FreeDrive is storage that allows__________users to view the content of others.
i ) Whatsapp
ii ) Twitter
iii ) Facebook
iv ) None of the mentioned
Ans : Facebook
Explanation : FreeDrive is a personal storage and file sharing service designed for users of social networks, such as Facebook, MySpace and Bebo

5. _________has many of the characteristics of what is now being called cloud computing.
i ) Softwares
ii ) Internet
iii ) Web Service
iv ) All of the mentioned
Ans. : Internet
Explanation : The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.

6. These cloud services are of the form of utility computing ex. the________uses these services pay-as-you-go model.
i ) Cloud providers
ii ) Clients
ii ) End users
iv ) Cloud users

Ans. : d
Explanation : The cloud users use these services pay-as-you-go model. The cloud users develop their product using these services and deliver the product to the end users.

6 . Network operating system runs on ______________.

i ) server
ii ) every system in the network
iii ) both server and every system in the network
iv ) none of the mentioned

Ans. : server

Explanation : None

7. In distributed system, each processor has its own______________.

i) local memory.
ii ) clock.
iii ) both local memory and clock.
iv ) none of the mentioned .

Ans. : both local memory and clock.

Explanation : None.

8. If one site fails in distributed system then____________.

i) the remaining sites can continue operating
ii ) all the sites will stop working
iii ) directly connected sites will stop working
iv ) none of the mentioned.

Ans. : the remaining sites can continue operating
Explanation : No.

9. Logical extension of computation migration is__________.

i ) system migration
ii ) process migration
iii ) data migration
iv ) thread migration

Ans. : process migration
Explanation: NaN

10. In distributed systems, link and site failure is detected by__________.

i ) polling
ii ) token passing
iii ) Handshaking
iv ) none of the mentioned

Ans. : Handshaking
Explanation : None.

11. Which of the following is essential concept related to Cloud?

i ) Reliability
ii ) Abstraction
iii ) Productivity
iv ) All of the mentioned

Ans. : Abstraction
Explanation : Cloud computing abstracts the details of system implementation from users and developers.

12. Point out the wrong statement.

i ) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
ii ) With cloud computing, you can start very small and become big very fast
iii) All applications benefit from deployment in the cloud

iv ) NaN

Ans. : All applications benefit from deployment in the cloud
Explanation : Issues with latency, transaction control, and in particular security and regulatory compliance are of particular concern

13. Cloud providers provide cloud services to the cloud users.

i ) True
ii ) False

Ans. : a

14. Which of the following is not a cloud stakeholder?
i ) Clients
ii ) Cloud providers
ii ) Cloud users
iv ) End users
Ans. : Clients

15. Which of the following is not a type of cloud?
i ) Public
ii ) Private
iii ) Protected
iv ) Hybrid
Ans.: Protected

16. In this type of cloud, an organization rents cloud services from cloud providers ondemand basis.
i ) Protected
ii ) Public
iii ) Private

Ans. : Public
Explanation: This happens in public cloud. Services are provided to the users using utility computing model.

17. In this type of cloud, the cloud is composed of multiple internal or external cloud.
i ) Private
ii ) Protected
iii ) Hybrid
iv .) Public
Answer: Hybrid

18. Which of the following is not a type of cloud?
i ) Private
ii ) Public
iii ) Protected

Ans. : Protected

19. Most of the cloud architectures are built on this type of architecture.
i ) grid
ii) skeleton
iii) template
iv) linear
Ans. : grid

20. Saas stands for?
i ) Software as a service
ii ) System Software and services
iii ) Software as a system
iv ) System as a service

Ans. : Software as a service
Explanation : SAAS is Software as a service.
It delivers a single application through the
web browser to thousands of customers using
a multitenant architecture.
21. In this type of cloud, the organization hires
cloud services from cloud providers on a regular basis.
i ) Confidential
ii ) Public
iii ) Protected
iv ) Hybrid
Ans. : Public
Explanation : This occurs in the public domain.Services are provided to users who usecomputer usage model.
22. In this type of cloud, a cloud is formed
many internal or external cloud.
i ) Confidential
ii ) Public
iii ) Protected
iv ) Hybrid
Ans : Hybrid
Explanation : A hybrid cloud is formed of many internal or external clouds. This a situation in which an organization travels Public cloud computing in public from inner private cloud.
23. _________ makes migration to a visual image from a single portable machine to another.
i ) visual perception
ii ) to do good
iii ) migration
iv ) visual transmission

Ans. : to do good
Explanation : Virtualization enables visual image migration from another the body machine goes to another. This feature says useful in the cloud in terms of local data doing well is possible.
24. Which of the following is the plan for creating block-level storage devices can used by Amazon Machine Instances in EC2?
i ) CloudWatch
ii ) Amazon Elastic Block Store
iii ) Import / export of AWS
iv ) All that has been said

Ans : Amazon Elastic Block Store
Explanation : The Load Measurement Feature can see when the model fails again restore the road to a healthy state, or for example in some parts of AWS.
25. Which of the following features is used EC2 site rating?
i ) Auto Replica
ii ) Automatic measurement
iii ) Automated Governance
iv ) All that has been said
Ans. : Automatic measurement
Description: Autoscaling is part of Amazon Cloudwatch is also no longer available to charge.
26. Which of the following metrics were used to support Heavy Load Measurement?
i ) CloudWatch
ii ) Amazon Elastic Block Store
iii ) Import / export of AWS
iv ) All that has been said
Ans. : CloudWatch
Description : Amazon Machine Instances
(AMIs) in EC2 can be loaded moderately using
Elastic Load Balancing.
27. Which of the following is online storage and storage system?
i ) Amazon Elastic Compute Cloud
ii ) Amazon Simple Line Service
iii ) Amazon Simple Notification Service
iv ) Amazon Simple Storage Program
Ans. : Amazon Simple Storage Program
Definition: Data transfer at high speed a feature called AWS Import / Export can transfer data to or from AWS using Amazon’s internal mobile network storage devices.
28. Identify the incorrect statement.
i ) Real standalone servers can provide visuals private clouds connected via virtual private networks
ii ) Amazon Web Services is based on SOA levels
iii ) Since 2012, Amazon.com has done it Web service platform is available for developers by model of use
iv ) All that has been said

Ans. :Since 2012, Amazon.com has done it Web service platform is available for developers by model of use
Definition : With hardware power of Xen hypervisors, Amazon.com has made it possible to create
private servers that you can use all around the world.
29. Which of the following is central application in the AWS portfolio?
i ) Amazon Elastic Compute Cloud
ii ) Amazon Simple Line Service
iii ) Amazon Simple Notification Service
iv ) Amazon Simple Storage Program

Ans. : Amazon Elastic Compute Cloud
Description : Amazon Elastic Compute The cloud enables the creation, use, and management of virtual private servers uses Linux or Windows system over Xen hypervisor.
30. Which of the following is the message line or an online marketing program for applications?
i ) Amazon Elastic Compute Cloud
ii ) Amazon Simple Line Service
iii ) Amazon Simple Notification Service
iv ) Amazon Simple Storage Program

Ans. : Amazon Simple Line Service
Definition : In a freely integrated SOA system, activity manager is required make sure messages are not lost when a part not found.

31. Identify the correct statement.
i ) Service Oriental Architecture (SOA) describes the standard request method services from distributed items as well to manage the results
ii ) SOA provides translation as well a layer of management in the art of removes the barrier to finding a client demanded services
iii ) With SOA, clients and elements can be written in different languages ​​and can use multiple messaging protocols
iv ) All that has been said
Answer : All that has been said
Definition: You do not need SOA if you exist to create a monolithic cloud application do some work like backup, email, access to a Web page, or instantly texting.
32. Which of the following can you repeat? within the business process?
i ) service
ii ) bus
iii ) methods
iv ) all that is said
Ans. : service
Definition: The function of a business is job creation.
33. Identify the correct statement.
i ) Cloud storage can be broadly divided with the last four major stages
ii ) In uncontrolled storage, storage service provider makes storage capacity available at users
iii ) In managed storage, storage service provider makes storage capacity available at users
iv ) All that has been said
Ans. : In uncontrolled storage, storage service provider makes storage capacity available at users
Description : Unmanaged storage defines a file of storage environment, how to use it, and what applications.
34. in these type of uncontrolled cloud storage?
i ) XDrive
ii ) OmniDrive
iii ) iDrive
iv ) All that has been said
Ans. : All that has been said
Description: It is a storage that can be controlled on hear that the storage is pre-configured you, you cannot format the way you want.
35. Identify the incorrect statement.
i ) Uncontrolled storage is reliable
ii ) Controlled storage is cheaper to use
iii ) Most user-based applications cloud storage operation is not managed type
iv ) None of this is stated
Ans.: Controlled storage is cheaper to use
Description: Storage that can be controlled by cheap to use.
36. Which of the following has led you to the death of many early SSPs and many managed services?
i ) Dot.com explosion in 2000
ii ) Failure of file holding companies to make money successfully from online storage
iii ) Continued sales of capital goods disk drives
iv ) All that has been said
Ans. : All that has been said
Description: SSP stands for Service Service Provider.
37. Which of the following is the easiest uncontrolled cloud storage device?
i ) Use of file transfer
ii ) Use of antivirus
iii ) Online image use
iv ) nothing is mentioned
Ans. : Use of file transfer
Definition: File transfer services are possible shared with other users you allow, and files the uploads can be found for other services.
38. FreeDrive storage service that allows__________users to view content of others.
i ) Facebook
ii ) Twitter
iii ) Whatsapp
iv ) None of this is stated
Ans. : Facebook
Description : FreeDrive is personal storage and a file sharing service designed for users of social networking, such as Facebook, MySpace and Bebo.
39. Which is the next end of the cloud especially designed for engineers and support applications built using Web services?
i ) Managed
ii ) Not managed
iii ) Disk
iv ) All that has been said
Ans. : Managed
Description: Cloud storage managed by provided and provided as a green disk

40. Which of the following is used for file transfers creates a metaphor for a shared folder using the Web service?
i ) Warehouse
ii ) Skype
iii ) Drive
iv ) All that has been said
Ans. : Warehouse
Description : Dropbox is a storage service your files are secure, synced, and easy to share.

Unit-2

Cloud Enabling Technologies

  1. Which of the following describes a a tax that conveys a message based on an object that provides services to clients on demand?
    a) SOA
    b) EBS
    c) GEC
    d) All that has been said
    Answer: a
    Definition: Clients access the object complies with SOA by conveying the message containing metadata to be taken from standard format.
  1. Identify the correct statement.
    a) Service Oriental Architecture (SOA) describes the standard request method services from distributed items as well to manage the results
    b) SOA provides translation as well a layer of management in the art of removes the barrier to finding a client demanded services
    c) With SOA, clients and elements can be written in different languages ​​and can use multiple messaging protocols
    d) All that has been said
    Answer: d
    Definition: You do not need SOA if you exist to create a monolithic cloud application do some work like backup, email, access to a Web page, or instantly texting.
  2. Which of the following can you repeat? within the business process?
    a) service
    b) bus
    c) methods
    d) all that is said
    Answer: a
    Definition: The function of a business is job creation.
  3. What is the next SOA module shown in the following picture?
    a) Definition
    b) Messaging
    c) Business Process
    d) QOS
    Answer: d
    Definition: QoS is being established, too service installed
  4. Which of the following is used to describe it part of the service that performs service?
    a) WSDL
    b) SCDL
    c) XML
    d) None of this is stated
    Answer : b
    Description: SCDL stands for Service Language of Descriptive Object.
  5. Which of the following is most used to define a service interface, how to bind details, and type of service or end point?
    a) WSDL
    b) SCDL
    c) XML
    d) None of this is stated
    Answer: a
    Definition: Widely used Extensible message transfer format Markup Language (XML) using Simple Object Access Protocol (SOAP).
  6. Which of the following offers instructions for explaining comprehension using conditional statements?
    a) XML
    b) WS-BPEL
    c) JSON
    d) None of this is stated
    Answer: b
    Definition: A business process that collects of work graphs.
  7. Which of the following is used as layer of middleware in the following figure?
    a) XML
    b) ESB
    c) UDDI
    d) None of this is stated
    Answer: b
    Definition: ESB can be part of system operating system or possibly made using a set of middleware products.
  8. Publish the REST app in the spring.
    a) publishing app data as REST
    app
    b) access to data from a third party REST
    services
    c) none of this is stated
    d) all that is said
    Answer: d
    Definition: One involves publishing i application data as a REST service, the others include access to data from third-party REST services that will be used in the application.
  9. Publish app data as REST service requires.
    a) @RequestMapping
    b) @PathVariable
    c) All that has been said
    d) None of this is stated
    Answer: c
    Definition: Publishing application data as a service REST focuses on the use of Spring MVC annotations @RequestMapping and @PathVariable.
  10. Spring supports a series of methods produce REST service payload.
    a) Of course
    b) False
    Answer: a
    Description: This recipe will look at the file a simple, inclusive method of the Spring’s MarshallingView class.
  11. Annotation added as input parameter to management system.
    a) @PathVariable
    b) @How
    c) @IendlelaLocale
    d) None of this is stated
    Answer: a
    Description: Annotation for @PathVariable can be heard as the input parameter in the holder way, according to the MVC Spring Agreements, to order to be used within the holder physical approach.
  12. Notice to define REST end locations.
    a) {}
    b) *
    c) All that has been said
    d) None of this is stated
    Answer: c
    Description: In addition to supporting {} notation, it is also possible to use a wild card notation to define REST storage locations.
  13. A general purpose category that allows a feedback will be provided using a marshaller.
    a) Watching Marshalling
    b) Strengthening
    c) Remember
    d) All that has been said
    Answer: a
    Description: The view of the membertemplate template is by described as a type of MarshallingView, which is a general objective category that allows for response to be provided using a marshaller.
  14. Marshalling conversion process item memory presentation on data format.a
    a) Of course
    b) False
    Answer: a
  15. A marshaller used by MarshallingView belongs to one of the XML series vendors.
    a) Jaxb2Marshaller
    b) XmlBeansMarshaller
    c) CastorMarshalle
    d) All that has been said
    Answer: d
    Definition:
    A marshaller used by MarshallingView is one of the series XML Traders Issued Spring— Jaxb2Marshaller. Other market vendors have been provided in the spring including CastorMarshaller, JibxMarshaller, XmlBeansMarshaller, and XStreamMarshaller.
  16. Setting up Jaxb2Marshaller marshaller we need.
    a) ClassesToBeBound
    b) Roadmap
    c) All that has been said
    d) None of this is stated
    Answer: c
    Description:
    Jaxb2Marshaller the marshaller needs to be repaired with it can be an asset namedToBeBound classes or contextMode.
  17. In the case of ToBeBound classes, classes assigned to this place, show class (i.e., object) will be converted to XML.
    a) Of course
    b) False
    Answer: a
    Description:
    Jaxb2Marshaller the marshaller needs to be repaired with it can be an asset namedToBeBound classes or contextMode.
  18. Annotation that allows Jaxb2Marshaller marshaller to find category (e.g., object’s) fields.
    a) @XmlRootElement
    b) @XmlRoot
    c) @NotNull
    d) None of this is stated
    Answer: a
    Description:
    This annotation allows the file for Jaxb2Marshaller marshaller to find category (i.e., object’s) fields and convert them into XML data.
  19. Obtaining third party service REST within the spring app.
    a) Template Stage Stage
    b) ViewResolver
    c) InternalViewResolver
    d) Remember
    Answer: a
    Definition:
    Access to the third party REST service within the spring application around the use of the Spring RestTemplate section.
  20. The end point of the service consists of i address.
    a) starts with http: // and ends with?
    b) starts with http: // and ends with &
    c) no specific URL specified
    d) depending on the speaker used
    Answer: a
    Definition:
    REST structure service end point has an address, starting with http: // and ending with ?, as and the series of parameters it starts with? and separated by &, each represented by key and value separated by =.

22 . RestTemplate class class method which enable HTTP HEAD functionality.
a) headForHeaders (String, Object…)
b) GetForObject (String, Class, Object…)
c) postForLocation (String, Object, Object…)
d) postForObject (String, Object, Class,Into…)
Answer: a
Definition
: headforHeaders () is a The RestTemplate class method is based on HTTP procedures for requesting legal process.

23. service contract is defined using: –
a) Language Description of Web Services
b) Description of Web Services
c) All that has been said
d) None of this is stated
Answer: a
Description:
In the final agreement, you disclose existing service interface as a web service made by the contract of his service automatically.

24. There are two ways to build a web service, depending on you describe the contract first or last.
a) Of course
b) False
Answer: a
Definition:
The contract for web service is defined using the Web Services Description Language (WSDL). In the final agreement, you display an existing interface as a web service contract service performed automatically. In the first contract, you plan to service according to XML and then write the code to complete it.

25. In contrast, the original method of contract encourages you to think about this service contract starts with: –
a) XML
b) XML Schema (.xsd)
c) WSDL
d) All that has been said
Answer: d
Definition:
In contrast, the original contract approach encourages you to think through The first service, according to XML, uses XML schema (.xsd) and WSDL.

26. In some cases, it is also difficult to put a map on contradict XML (e.g., graph of an object with circular indicators) because they actually exist Impedance difference between an object XML model and model.
a) Of course
b) False
Answer: a
Definition:
The state of being in the middle of something model and relationship model.Service providers who can export beans remote service based on: –
a) RMI
b) Hessian
c) Explosion
d) All that has been said
Answer: d
Definition
: Spring comes with several service providers who can send beans as remote service according to RMI, Hessian, Renlation of Burlap, or HTTP technology.

Unit-3

Cloud Architecture Service and Storage

  1. Which of the following is wrong?
    a) The layered style plan is divided into list of modules or layers
    b) Each layer provides services in the layer “Below” also uses the resources provided with a “top” layer
    c) All that has been said
    d) None of this is stated
    Answer: b
    Description:
    Each layer provides services to layer “more” and uses resources given the layer “below”.
  2. Which of the following is correct?
    a) The flexible structure of the Art style to divide software units into modular layers
    b) Stable structure of style Articulated by there is nothing more than a barrier to sharing between layers
    c) All that has been said
    d) None of this is stated
    Answer: d
    Definition:
    The vertical structure of The default style is to separate the software units into modular layers and dynamic the composition of the embossed style is nothing more there is an obstacle to sharing in the middle layers.
  3. What is the Free Style?
    a) Each layer can be restricted to use only lay directly under it
    b) Sometimes this barrier is loosened slowly allow each layer to use all the files layers under it
    c) All that has been said
    d) None of this is stated
    Answer: b
    Definition:
    Each layer can be blocked use only a layer directly under it – this Strictly Organized style and Sometimes this The border is slightly free to allow for each layer to apply all the layers below it -this is Free style.
  4. Which of the following is correct?
    a) Part A uses Module B when appropriate Type B must be available for A to use it well
    b) Module A costs (or pleads) module B if
    B causes the formation of A
    c) All that has been said
    d) None of this is stated
    Answer: a
    Definition:
    Module A uses Module B if
    The correct type of B should be present in A to
    works well with Module A (orinvokes) module B if A causes the creation of B.
  5. in these following is true with respect in selected architecture?
    a) Each layer is allowed to rely on the layer above it is present and precise
    b) The layer can cost more layers as well under it, as long as you use them
    c) All that has been said
    d) None of this is stated
    Answer: d
    Description:
    Each layer is allowed to lean
    it’s in the bottom layer of being there again
    right. The layer can be called other layers above
    and under it, as long as we don’t use them.
  6. What is an onion drawing?
    a) Indicates the link between layers in communication protocols, such as International Standards Organization Open Systems Interconnection (ISO OSI) model, or layers in the user interface as well window installation programs, such as X Window The program
    b) It usually shows application layers, and a bullet in the hole
    c) All that has been said
    d) None of this is stated
    Answer: d
    Definition:
    A drawing of onions shows operating system layers, and kernel in essence.
  7. In particular, the layers have any of tracking features?
    a) Lists by definition are very intertwined, thus satisfying the Solidarity Principle
    b) Lists do not correspond to encryption
    c) Lists are limited to overuse only layers
    d) All that has been said
    Answer: a
    Definition:
    Lists by definition
    meets, thus satisfying the Principle of
    Cohesion. Lists support encryption
    Lists are limited to low usage
    layers.
  8. Which of the following is wrong?
    a) The selected properties are excellent it changes, so this pattern can be used there flexibility is an important quality attribute
    b) Uploaded style programs are easy to modify because changes can be made to the background with the independence of the whole system
    c) All that has been said
    d) None of this is stated
    Answer: d
    Definition:
    All of these statements exist right.
  9. What are the layers of the Layer?
    a) It is often necessary to pass on information many layers, which can reduce performance
    remarkably
    b) Lists may support encryption
    c) Multi-line programs can be difficult to implement to correct an error because tasks tend to be beim
  10. Which of the following is unique the benefits of Cloud Computing?
    a) type of delivery service
    b) durability
    c) low entry barrier
    d) all that is said
    Answer: d
    Definition :
    How do these qualities change applications are created, priced, and brought.
  11. Identify the correct statement.
    a) Service Level Agreements (SLAs) are small computer feature
    b) Cloud computing has no results software license
    c) Cloud computing provides innovation opportunities for users and developers
    d) All that has been said
    Answer: c
    Description:
    Because it is based on the file
    a condition of use shared by many employers.
  12. Cloud-based applications low-grade computer and frequency low risk is__________
    a) high touch
    b) low touch
    c) moderate touch
    d) all that is said
    Answer: b
    Definition:
    Applications for “high impact” comes with the top jeans you need we are committed and at great risk.
  13. Hardware-focused service follows_________as a service model.
    a) IaaS
    b) CaaS
    c) PaaS
    d) All that has been said
    Answer: a
    Description:
    The Amazon web service is following PaaS model.
  14. Identify the incorrect statement.
    a) A cloud is defined as a combination of data archive infrastructure and the ability to provide hardware and software
    b) High-impact applications are made more efficient
    c) Google App Engine follows IaaS
    d) None of this is stated
    Answer: c
    Description:
    Google App Engine follows PaaS.
  15. When installing a software stack, such as applications and applications on file service, model moving to________model.
    a) SaaS
    b) PaaS
    c) IaaS
    d) All that has been said
    Answer: a
    Description:
    Microsoft Windows Azure The platform is better defined right now SaaS model.
  16. Which of the following is most refined and a blocking service model?
    a) IaaS
    b) CaaS
    c) PaaS
    d) All that has been said
    Answer: c
    Definition:
    When a service requires that client use complete hardware / software / application stack, of course using a highly refined and restricted service model.
  17. __________ is a paid role play resources you should always need.
    a) Materials
    b) Strength
    c) Low barrier to entry
    d) All that has been said
    Answer: a
    Definition:
    This removes waste and rains additional risk risk switching from client.
  18. _________feature allows you to use it properly your program and capture all possible transactions.
    a) decline
    b) honesty
    c) firmness
    d) nothing is mentioned
    Answer: c
    Definition:
    The ability to make resources as needed.
  19. ________it speeds up high processing applications.
    a) Variety
    b) Honesty
    c) Extension
    d) Materials
    Answer: a
    Definition:
    This feature removes the need planning and provision.
  20. Identify the correct statement.
    a) Cloud construction can pair software works on most virtual viruses demand service points
    b) Cloud computing depends on the set of protocols required to manage the process communication
    c) Platforms used to create more complex software
    d) All that has been said
    Answer: d
    Definition:
    Widely used services uses a retrieval set agreements defined in WSDL.
  21. From the perspective of_______it it makes no sense to donate uncommonly machine conditions for customers.
    a) CaaS
    b) AaaS
    c) PaaS
    d) IaaS
    Answer: d
    Definition:
    Because such customers are probably by installing built-in applications on standard operating systems like Linux, Windows, Solaris, or other known operating system.
  22. Identify the incorrect statement.
    a) The cloud cannot be built within the organization’s own infrastructure or sent to another person who keeps records
    b) The integrated component must be a module.
    c) The assembled part must be empty.
    d) None of this is stated.
    Answer: a
    Definition:
    While the resources in the cloud can
    they have become real sources, often
    are resources that have been created because they are displayed
    resources are easy to change and use.
  23. Which construction layer is used as pre-computer end
    a) client
    b) cloud
    c) soft
    d) all that is said
    Answer: a
    Definition:
    Cloud computing divided into older models by explaining the details included
    a generally controlled technical service through the Application Process Identifier (API).
  24. Which of the following providers you rely on real mechanical delivery technology servers?
    a) CaaS
    b) AaaS
    c) PaaS
    d) IaaS
    Answer: d
    Description:
    Larger infrastructure such as Service providers (IaaS) rely on invisibility mechanical technology that can use systems.
  25. Identify the correct statement.
    a) Visible equipment containers provided with certain resources
    b) Applications do not have to remember how they use cloud resources
    c) When a builder makes a plan using a cloud service, an engineer cannot attach to the appropriate service
    d) All that has been said
    Answer: a
    Definition:
    Software that works in a file visual equipment is what defines the use of cloud computing program.

Unit-4

Resource Management & Security In Cloud

  1. Features needed to ensure i reliable transactions in information and others applications are called__________
    a) FOUNDATION
    b) ACID
    c) ATOM
    d) All that has been said
    Answer: b
    Definition:
    In computer science, ACID (Atomicity, Consistency, Isolate, Strength) a collection of structures confirmation that the data transaction is worked honestly.
  2. Identify the incorrect statement.
    a) In theory, any app can work either completely or partially in the cloud
    b) Location of the application or service plays an important role in i The request must be in writing
    c) Application or procedure applicable to a desktop or server is made interactive, such as unit, under integrated control system
    d) None of this is stated
    Answer: d
    Definition:
    An action that sets out the plan call, code is issued, and the result is restored and can be done.
  3. Which of the following ACID items says the system must be different a known condition in another and that system must integrity be maintained?
    a) Atomic energy
    b) Consistency
    c) Isolation
    d) Strength
    Answer: b
    Definition:
    ACID rules were in place developed by Jim Gray to use database technology in the late 1970s.
  4. Which of the following content is required for online and local data access on hybrid use?
    a) local
    b) cloud
    c) both local and cloud
    d) nothing is mentioned
    Answer: c
    Description:
    If the application was required access data only when the client is online, then access to cloud-based storage will be the case the only data store your app will do it is necessary.
  5. Which of the following features can be removed the cost of offline access to the hybrid applications?
    a) decline
    b) costs
    c) universal access
    d) all that is said
    Answer: d
    Definition:
    These things form a cloud it is more attractive.
  6. Request Required___________storage alone may not benefit from the cloud shipping at all.
    a) online
    b) offline
    c) material
    d) all that is said
    Answer: b
    Definition:
    You can safely conclude that the app that gets the most value in cloud deployment is another that uses the internet storage without the need to keep offline.
  7. ________goods say the system must have a recovery mode from the obligatory duties if it should be so it is necessary.
    a) Atomic energy
    b) Consistency
    c) Isolation
    d) Strength
    Answer: d
    Definition:
    A division of property says that the system can have no other action use existing data processed by transaction.
  8. Which of the following structures is described a transactions as something that cannot be separated and should be completed either abandoned as a unit?
    a) Atomic energy
    b) Consistency
    c) Isolation
    d) Strength
    Answer: a
    Definition:
    A division of property says that the system can have no other action use existing data
    processed by transaction.
  9. Identify the correct statement.
    a) Eucalyptus and Rackspace both use Services for Amazon EC2 and S3
    b) The RightScale user interface provides real-time estimates for each server conditions
    c) RightScale server templates once Lungelocript technology is very advanced adjustable and can be run under batch control
    d) All that has been said
    Answer: d
    Definition:
    Eucalyptus is also an open source portable.
  10. In these following is an industry an organization that develops an industrial system platform management standards collaboration?
    a) DMTF
    b) DMS
    c) EBS
    d) All that has been said
    Answer: a
    Definition:
    DMTF stands for distribution Project Managers.
  11. In these following is used to extend CIM is a virtual computer system management?
    a) OVF
    b) VMAN
    c) OCSI
    d) None of this is stated
    Answer: b
    Description:
    VMAN led to the creation of an Open Virtualization format (OVF), which describes the standard method in construction, packaging, and supply visual equipment.
  12. Identify the incorrect statement.
    a) The Cloudkick Insight module is powerful and especially easy to use
    b) Both Cloudkick and RightScale are known to make it easier to use with virtual Window servers and so it is with Linux scenarios
    c) All types of services are sponsored monitoring solutions
    d) All that has been said
    Answer: b
    Description:
    Cloudkick and RightScale are
    known as easy-to-use Linux interface
    server and very little about Windows events.
  13. In These following do you try to do? provide a way to measure cloud computing services in terms of cost?
    a) CCE
    b) OCCI
    c) SMI
    d) All that has been said
    Answer: c
    Definition:
    SMI stands for Service Measurement Index.
  14. In these following is open and both hypervisor and processor-architectureagnostic?
    a) Dell Gift
    b) CloudKick
    c) Elastra
    d) All that has been said
    Answer: a
    Definition:
    OVF is actually a vessel
    and file format.
  15. In these of the following is a workflow automatic control and policy service via CA?
    a) CA Cloud Configuration
    b) CA Cloud Orchestrate
    c) CA Cloud Insight
    d) CA Cloud Writing
    Answer: b
    Definition:
    CA Cloud Insight is a cloud metric measurement service.
  16. Which of the following monitors large screen based performance real-time services at Cloud Commons?
    a) CloudWatch
    b) CloudSensor
    c) CloudMetrics
    d) All that has been said
    Answer: b
    Definition:
    Cloud Commons is a new phenomenon an online community established by CA to promote exchange of information on cloud services as well SMI standard.
  17. Which of the following service providers offers a minimum built-in security?
    a) SaaS
    b) PaaS
    c) IaaS
    d) All that has been said
    Answer: c
    Description:
    You get a small amount of built securely with Infrastructure such as Service provider, and most with Software as a service provider.
  18. Identify the correct statement.
    a) Different types of computer service models offer different levels of security services
    b) Synchronize your local systems the cloud model requires you to determine what safety measures are also required mapping those controls in your file selected cloud service provider
    c) Data must be transferred to and stored in encrypted encryption for security purposes
    d) All that has been said
    Answer: d
    Definition:
    When you point out that there is none cloud security features, which you can use to create a performance map to close the gap.
  19. The following flowchart is intended check ______________on any cloud.
    a) danger
    b) errors
    c) incompatibility
    d) nothing is mentioned
    Answer: a
    Definition:
    Your dangers in any cloud Posting depends on something selected cloud service model and type of cloud where you install your apps.
  20. Identify the incorrect statement.
    a) You can use proxy and commercial services to separate clients from direct access to shared cloud storage
    b) Any distributed application has more a large area of attack has a request for is held near the Local Area Network
    c) Cloud computing does not Internet-related vulnerability applications
    d) All that has been said
    Answer: c
    Definition:
    An additional height appears from integrated, improved, and hired resources.

Unit-5

Cloud Technologies & Advancements

  1. IBM and_________announced a a big step to using Hadoop to support university courses on distributed computer programs.
    a) Google Latitude
    b) Android (operating system)
    c) Google variations
    d) Google
    Answer: d
    Description:
    Announcement by Google and IBM Initiative University to address InternetScale.
  2. Under which license was Hadoop distributed?
    a) Apache 2.0 license
    b) Mozilla Public License
    c) Shareware
    d) Commercial
    Answer: a
    Definition:
    Hadoop is an open source, issued under an Apache 2 license.
  3. The Sun also has a line-Hadoop Live CD ________ a project, which allows to run a fully functional Hadoop collection using live CD.
    a) OpenOffice.org
    b) OpenSolaris
    c) GNU
    d) Linux
    Answer: b
    Description:
    OpenSolaris Hadoop The LiveCD project has built a compact CD-ROM picture.
  4. What was Hadoop written about?
    a) Java (software platform)
    b) Perl
    c) Java (programming language)
    d) Lua (programming language)
    Answer: c
    Definition:
    The Hadoop framework itself is especially written in the Java system language, with a specific native code in C no Command line resources labeled as shellscript.
  5. Which of these platforms do it Hadoop continues?
    a) Stainless steel
    b) Debian
    c) The cross
    d) Similar to Unix
    Answer: c
    Description:
    Hadoop has crossplatform application support.
  6. Above the file settings comes the file_________ Engine, containing one Job Tracker, which includes customer requests Map Download tasks.
    a) Minimize Map
    b) Google
    c) Operating systems
    d) Facebook
    Answer: a
    Definition:
    The MapReduce engine uses to spread the work around the collection.
  7. Hadoop list includes HBase database, Apache Mahout ________system, and matrix function.
    a) Machine learning
    b) Pattern recognition
    c) Mathematical division
    d) Artificial intelligence
    Answer: a
    Description:
    Apache Mahout Project the goal is to build a unique learning machine tool.
  8. Which of the following features access to the VM allocation of resources?
    (a) the VMM
    (b) CENTRE
    (c) VNM
    (d) All of the above
    Answer: a
    Note: the VMM has a different name The hypervisor at a time.
  9. Which of the following shapes 1 The hypervisor?
    (a) Simics River and the Wind
    (b) to the Virtual server 2005 R2
    (c) KVM
    (d) LynxSecure
    Answer: d
    Note: the Type 1, the vm’s don’t have to an operating system is the host, if they are installed on in an open system.
  10. Which of the following VMs of Type 2 mean?
    (a) VirtualLogix VLX
    (b) to a VMware ESX
    (c) This
    (d) LynxSecure
    Answer: c
    Note:
    This is being used by Amazon, Web, Amazon Machine In Case Of Delivery Of Services Volume (MAS).
  11. Which one of the following the operating systems will have to be the most important thing for a Windows Server.
    (a) VirtualLogix VLX
    (b) to the Microsoft Hyper-V
    (c) This
    (d) All of the above
    Answer: b
    Note:
    (VMs) are a type 2 to be installed on the main system.
  12. Do any of these things will have to be placed another layer to the next in the figure below?
    (a) in the Host Os
    (b) any software
    (c) to the VIRTUAL machine
    (d) none of the above
    Answer: a
    Note:
    some Examples of the Type of the 2 virtual machines Machine to monitor the Containers, KMMS, Microsoft Hyper-V, Parallels Desktop for Mac Os X Users.
  13. these of the following algorithms is used Google to determine the relevance of an or on the other side?
    (a) the sniper rifle
    (b) Hence,
    (c) a memory Card
    (d) All of the above
    Answer: b
    Note:
    the content of the sites, The site is scanned up to a certain number of words, which is located in the the indicator.
  14. Give the correct explanation.
    (a) in Purple, and the goal is to create a highly scalable applications which will be used in the In the program-as-a-service model
    (b) Applications that are built with a Purple-based programs should do the following: based on the standards
    (c) In the Wolf of data and transaction management compliant in order for the business rules.
    (d) All of the above
    Answer: d
    Note:
    the Wolf allows you to work with the Adobe Flash, Flex и Microsoft Silverlight.
  15. Which of the following are protocols that allow you to create a list from the web the pages in an XML file?
    (a) List
    (b) software applications, (c) Hash-tags
    (d) All of the above
    Answer: a
    Note:
    the web Site of the cards can be useful for search not available to view
    .
  16. Do any of these things, it is not “Deep Web”?
    (a) in the web pages provided by the databases
    (b) a Private or restricted access to the web-page
    (c) that the Website, no links
    (d) All of the above
    Answer: d
    Note:
    the Online content that was not get indexed by search engines, which belongs to the the so-called “Deep Web”.
  17. For dynamic content, Google__________scanning is, in general, is not indicated.
    (a) AJAX
    b) Java
    (c) in Javascript
    (d) All of the above
    Answer: a
    Note:
    Google now, it is a process of this helps the engine in Google’s index, it information.
  18. Which of the following is a Google product it sends periodic e-mail messages, depending on your have any questions?
    (a) Notices
    (b) the Blogger
    (c) Schedule
    (d) All of the above
    Answer: a
    Note:
    when you create a Google alert you can also receive email notifications at any time.
  19. Which of the following protocols shall not apply? By default, the target audience of the Internet.
    (a) in A SIP
    (b) a SIMPLE
    (c) XMPP
    (d) the DEMONS
    Answer: d
    Note:
    IMPS, is a communication standard, THEN
  20. Which of the following MESSENGERS the user to connect to various home pages Instant messaging services?
    (a) Language
    (b) the Miranda IM
    (c) Trillian
    (d) All of the above
    Answer: d
    Note:
    Trillian is running on Windows The Macintosh operating system, IOS (apple iPhone), Android, A Blackberry and an internal web browser.

Cloud Computing practice Questions: आपको यह हमारा ब्लॉग आसानी से समझ में आया है, यदि आपको यह मेरी द्वारा दी गई जानकारी आपके लिए हेल्पफुल  रही है तो प्लीज आप एक कमेंट करके हमें जरूर बताएं धन्यवाद..

 ………हमारे अन्य संबंधित  ब्लॉग ……….

  • Cloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice QuestionsCloud Computing practice Questions

16 thoughts on “Cloud Computing

  1. |Schluesseldienst Wolfsburg (38444) – 24/7 Tueroeffnung – Schluesseldienst Muenchen [Url=https://schluesseldienst-service24h.de/wolfsburg-38444/]Schluesseldienst Wolfsburg (38444) – Tueroeffnung Schluesselnotdienst[/url] Schluesseldienst Wolfsburg (38444) – Tueroeffnung Schluesselnotdienst Ausgesperrt? Schluesseldienst service 24/7 Wolfsburg hilft schnell & zuverlassig bei Tueroeffnungen: 0157 9246 5509 ✓ Wir kommen sofort! Ihr Spezialist fuer Schluesselnotdienst in 38444 Wolfsburg.

  2. Schluesseldienst 24h in Hahnbach Irlbach – Tueroeffnung Service 24/7 [Url=https://eu-schluesseldienst.de/by/hahnbach-16559/irlbach-16964/]Schluesseldienst Hahnbach Irlbach[/url] Schluesseldienst Hahnbach Irlbach Unserer Schluesseldienst Service in der Naehe 24h in Hahnbach Irlbach
    hilft effektiv & schnell bei Tueroeffnungen ? 24/7 Schluesselnotdienst ? ? Notruf 0157 9246 5509 (gebuehrenfrei) ?ab 59,- €”

Leave a Reply

Your email address will not be published. Required fields are marked *

Open chat