Solutions For CC-Oct 2023
Solutions For CC-Oct 2023
Cloud Computing
Assignment-Week 1
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Which of the following is a common property of distributed computing?
A) Centralized control
B) Fault tolerance
C) Single point of failure
D) Limited scalability
Correct Answer: B
Detailed Solution: Distributed systems are designed to be resilient, incorporating fault tolerance
mechanisms to avoid single points of failure.
QUESTION 2:
Peer-to-Peer computing resembles truly distributed applications.
A) True
B) False
Correct Answer: A
Detailed Solution: Refer to slide-13 of Week-1 (Distributed applications)
QUESTION 3:
Which of the following application(s) uses grid computing?
A) Reactor Applications
B) Air conditioning
C) Crystallography
D) Steganography
QUESTION 4:
Which of the following is(are) a key component(s) of cluster computing?
QUESTION 5:
Utility computing is a _______________ model, in which a service provider makes computing
resources and _____________ available to the customer.
A) service-provisioning, infrastructure management
B) infrastructure management,service-provisioning
C) cloud computing, resource management
D) service-provisioning, resource management
Correct Answer: A
Detailed Solution: Utility computing is a service-provisioning model, in which a service provider
makes computing resources and infrastructure management available to the customer.
QUESTION 6:
Utility computing encapsulates the following characteristic(s)
A) Mobility amalgamation
B) Pay-per-use pricing business model
C) No impact on resource utilization
D) None of above
Correct Answer: B
QUESTION 7:
In utility computing, the payment model differs for different customers based on scale and payment
frequency alone.
A) True
B) False
Correct Answer: B
Detailed Solution: In utility computing, the payment model differs with the customers based on
many factors like scale, payment frequency, and commitments.
QUESTION 8:
What are the different characteristic(s) of cloud computing?
A) Virtualization
B) Service disagreement
C) Service orientated
D) Scalability
QUESTION 9:
Google Spreadsheet is an example of :
Correct Answer: B
Detailed Solution: Google Workspace (previously known as G Suite) is a collection of productivity
tools that includes Google Spreadsheet, a web-based spreadsheet application. Users can create,
edit, and collaborate on spreadsheets online without the need for local software installation. Users
can access the application through their web browsers, and Google is responsible for managing
the underlying infrastructure and software. Therefore, Google Spreadsheet falls under the
category of Software as a Service (SaaS).
NPTEL Online Certification Courses
QUESTION 10:
In the case of the client-server model: Statement (i) Virtualization is a core concept; Statement (ii)
system can scale infinitely
A) Only Statement (i) is correct
B) Only Statement (ii) is correct
C) Both Statements (i) and (ii) are correct
D) None of the statements is correct
Correct Answer: D
Detailed Solution: In the case of the client-server model: there is no concept of virtualization; the
system can scale up to a certain extent.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 2
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Public cloud has ____________ and _________ service level agreements(SLAs).
A) loosely coupled, default
B) restrictive, customized
C) customized, default
D) default, restrictive
Correct Answer: D
Detailed Solution: Public cloud has default and restrictive service level agreements(SLAs).
QUESTION 2:
In the XML parser processing model, the parser should not stop processing even if the data is not
well-formed.
A) True
B) False
Correct Answer: B
Detailed Solution: In the XML parser processing model, the parser must stop processing and throw an
exception if the data is not well-formed.
QUESTION 3:
The on-site private cloud's network capacity restricts on-demand bulk data import or export.
A) True
B) False
Correct Answer: A
Detailed Solution: On-demand bulk data import or export is limited by the network capacity of the on-site
private cloud, and real-time processing may be problematic due to networking limitations.
QUESTION 4:
Electronic Data Interchange (EDI) has _______ errors and ________ accuracy.
A) low, medium
NPTEL Online Certification Courses
B) medium, low
C) high, medium
D) low, high
Correct Answer: D
Detailed Solution: EDI is computer to computer exchange of business data and documents between
companies using standard formats recognized both nationally and internationally. EDI has low errors and
high accuracy.
QUESTION 5:
Web services provide capabilities similar to EDI but are ________ expensive to implement.
A) more
B) less
C) not applicable
D) equal
Correct Answer: B
Detailed Solution: Web services provide capabilities similar to EDI but are simpler and
less expensive to implement.
QUESTION 6:
In XML, a special ‘xmlsn’ attribute is used to define the namespace.
A) True
B) False
Correct Answer: B
Detailed Solution: In XML, a special ‘xmlns’ attribute is used to define the namespace.
QUESTION 7:
Following is(are) example(s) private cloud
A) Amazon VPC
B) Eucalyptus
C) Microsoft Azure
D) Oracle Cloud
QUESTION 8:
What is(are) goal(s) for a virtual machine architecture?
A) Equivalence
B) Resource control
C) Efficiency
D) None of these
Detailed Solution: Virtual machine architecture has three goals: equivalence, resource control, and
efficiency.
QUESTION 9:
Within a cluster manager, _______ manager is connected via high-speed network.
A) grid
B) cloud
C) computer
D) Node
Correct Answer: C
Detailed Solution: Within a cluster manager the computer manager is connected via high-speed network.
QUESTION 10:
Which statement(s) is(are) application to Data Object Storage (DOS) ?
Statement(i) DOS stores user credentials; Statement(ii)DOS is usually single for a cloud.
A) Only Statement (i) is correct
B) Only Statement (ii) is correct
C) Both Statements (i) and (ii) are correct
D) None of the statements is correct
Correct Answer: C
Detailed Solution: Data Object Storage (DOS) stores user credentials and is usually single for a cloud.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 3
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
In the context of aggregated demand in resource provisioning in the cloud, how does adding n
independent demands affect the coefficient of variation (Cv)?
A) Increases the Cv
B) Decreases the Cv
C) Does not change the Cv
D) Inversely proportional to the mean
Correct Answer: B
Detailed Solution: Adding n independent demands reduces the Cv by 1/√n
QUESTION 2:
What does the term "biasness towards vendors" imply in the context of SLA monitoring?
A) Vendor-driven selection of monitoring parameters
B) Customer-driven selection of monitoring parameters
C) Balanced approach in monitoring parameters
D) Lack of active monitoring on the customer's side
Correct Answer: A
Detailed Solution: Biasness towards vendors means measurement of parameters is mostly
established according to vendor advantage or in other words vendor-driven selection of monitoring
parameters
QUESTION 3:
In the Openstack storage concept, ______ storage persists until the VM is terminated and is
managed by _______.
A) Nova, Cinder
B) Ephemeral, Cinder
C) Cinder, Ephemeral
D) Ephemeral, Nova
NPTEL Online Certification Courses
Correct Answer: D
Detailed Solution: In the Openstack storage concept, ephemeral storage persists until the VM
terminates and is managed by Nova.
QUESTION 4:
What condition makes periodic provisioning acceptable in the presence of linear demand?
A) High resource utilization
B) Non-linear demand
C) Instantaneous demand
D) Flat demand
Correct Answer: D
Detailed Solution: If demand is flat, it is linear and periodic provisioning is acceptable.
QUESTION 5:
What is(are) the key factor(s) to consider in a hybrid model for utility pricing?
A) Reliability and accessibility
B) Network cost and usage costs
C) Peak to average demand ratio
D) Interoperability overhead
Correct Answer: C
Detailed Solution: The key factor to consider in a hybrid model for utility pricing is ratio of peak
to average demand.
QUESTION 6:
What architecture is used in a parallel database for the efficient execution of SQL queries?
Correct Answer: C
Detailed Solution: For shared-nothing architecture in the parallel database, tables are partitioned
and distributed across multiple processing nodes and SQL optimizer handles distributed joins.
NPTEL Online Certification Courses
QUESTION 7:
What type of environment benefits from utility pricing?
A) Environments with fixed demand levels
B) Environments with limited resource scalability
C) Environments with variable demand levels
D) Environments with prepaid resource allocation
Correct Answer: C
Detailed Solution: Utility pricing or pay-per-use pricing benefits apply in environments with
variable demand levels.
QUESTION 8:
What is the role of Neutron in the provisioning flow in OpenStack?
Correct Answer: C
Detailed Solution: Refer to slide 18 of OpenStack
QUESTION 9:
How does the master node in the Google File System maintain communication with chunk servers?
A) Command messages
B) Update messages
C) Query messages
D) Heartbeat messages
Correct Answer: D
Detailed Solution: In GFS, master maintains regular communication with chunk servers by
Heartbeat messages
NPTEL Online Certification Courses
QUESTION 10:
What does the ‘availability’ metric represent in the monitoring and auditing of SLAs?
A) The speed at which a service responds
B) The percentage of uptime for a service
C) How often the service is available
D) The ability for a resource to grow infinitely
Correct Answer: B
Detailed Solution: Availability is represented as a percentage of uptime for a service in a given
observation period.
NPTEL Online Certification
Courses
Cloud Computing
Assignment-Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Fabrication is an attack on:
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability
Correct Answer: C
Detailed Solution: Fabrication is an attack on authenticity.
QUESTION 2:
Reliability and efficiency are basic components of security.
A) True
B) False
Correct Answer: B
Detailed Solution: Confidentiality (Keeping data and resources hidden), Integrity and Availability
(Enabling access to data and resources) are the major components of security. Refer to slide-2
slide of Cloud
Security-I.
QUESTION 3:
Spoofing threat on cloud security is an example of.
A) Deception
B) Disruption
C) Usurpation
D) Disclosure
Correct Answer: A, C
Detailed Solution: Spoofing results in deception and usurpation. Refer to slide 6 of Cloud Security - I.
NPTEL Online Certification
Courses
QUESTION 4:
Statement I:: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when
suspected scans/attacks are in progress.
Statement II: Authentication is the determination of whether or not an operation is allowed by a certain
user.
Correct Answer: A
QUESTION 5:
Which of the following is/are hypervisor risks associated with rough hypervisor rootkits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized cod
code.
D) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
Correct Answer: B, C
Detailed Solution: Hypervisor risks associated with rough hypervisor rootkits consist of hypervisors that
hide themselves from normal malware detection systems and hypervisors that create a covert channel to
dump unauthorized code. Refer slide 20 of Cloud Security - II.
QUESTION 6:
In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical
locations to maintain consistency.
A) True
B) False
NPTEL Online Certification
Courses
Correct Answer: A
QUESTION 7:
In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of
requests to a certain service, causing denial of service?
A) Injection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack
Correct Answer: B
Detailed Solution: Flooding is the attack where the attacker sends huge amounts of requests to a certain
service, causing
using denial of service. Refer to slide 23 of Cloud Security
Security-II.
QUESTION 8:
When is it better to switch cloud providers?
Correct Answer: B, C
QUESTION 9:
Which of the following Open-source
source tools is/are used to perform TCP SYN traceroutes on the Amazon EC2
platform?
A) wget
B) nmap
C) ipconfig
D) hping
Correct Answer: D
NPTEL Online Certification
Courses
QUESTION 10:
In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False
Correct Answer: B
Detailed Solution: In risk-based
based access control (RAC), computing security uncertainty is not addressed.
Hence, the statement is false. Refer to slide 18 of Cloud Security - IV.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 7
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
_________ ensures the ability to exchange / obtain the information to be
“consumed”.
a) Data Level Interoperability
b) Security Level Interoperability
c) Service Level Interoperability
d) None of the above
Correct Answer: c
Detailed Solution: Service Level Interoperability ensures the ability to exchange
/ obtain the information to be “consumed”. So, the correct option is (c). Lecture
35, 32:00
QUESTION 2:
a. Virtualization
b. Big data
c. Service oriented architecture
d. None of these
Correct Answer: a, c
Detailed Solution: Fog computing enablers are Virtualization, Service oriented architecture.
QUESTION 3:
Consider the following statements:
Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end data
services.
NPTEL Online Certification Courses
Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial
Cloud.
Detailed Solution: Both statements are correct regarding Geospatial Cloud concept. So, the correct
option is (c). Refer to Lecture 35.
QUESTION 4:
Which of the following statements is false about Code offloading using cloudlet?
Statement 1: The architecture reduces latency by using multi-hop network.
Statement 2: It potentially lowers battery consumption by using short range radio.
a. Statement 1 is correct but Statement 2 is incorrect
b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.
Correct Answer: b
Detailed Solution: The architecture reduces latency by using a single-hop network and potentially
lowers battery consumption by using Wi-Fi or short range radio. So, the correct option is (b).
Lecture 32, 20:40.
QUESTION 5:
Correct Answer: a, c
Detailed Solution: Mobile cloud computing features are: Facilitates the quick development,
delivery and management of mobile apps. Uses fewer device resources because applications are
cloud-supported. Mobile devices connect to services delivered through an API architecture.
Improves reliability with information backed up and stored in the cloud. So, the correct options are
(a) and (c). Lecture 31, 13:14.
QUESTION 6:
Which of the following statement(s) is/are FALSE about Fog Computing?
Correct Answer: c, d
Detailed Solution: Fog nodes present near to the end-user, Fog computing use for real-time
applications, Fog nodes’ response time is much lower than cloud server, network routers, WiFi
Gateways will be capable of running applications. So, the correct options are (c), (d).
QUESTION 7:
Which of the following options is correct about geographic information?
Statement 1: Geographic information could be static or dynamic.
Statement 2: Geographic information varies in scale.
Statement 3: Population of a city/town is a static geographic information
a. Statement 1 & 2 are True, but Statement 3 is False.
b. Statement 2 & 3 are True, but Statement 1 is False.
c. Statement 1& 3 are True, but Statement 2 is False.
d. All the statements are True.
Correct Answer: a
Detailed Solution: Population of a city is a dynamic geographic information. Lecture 35, 5:54.
NPTEL Online Certification Courses
QUESTION 8:
Benefits of Fog Computing is/are:
a. Immobility
b. Low latency and location-aware.
c. Homogeneity
d. Widespread geographical distribution.
Correct Answer: b, d
Detailed Solution: Benefits of Fog Computing are (i) Very large number of nodes are involved, (ii)
Low latency and location-aware, (iii) Heterogeneity and (iv) Widespread geographical distribution.
So, the correct options are (b) and (d).
QUESTION 9:
Distance between the client and server in Cloud Computing is of _________ and Fog computing is
_______.
Correct Answer: c
Detailed Solution: Distance between the client and server in Cloud Computing is of multiple hop
and Fog computing is one hop. Refer Lecture 34.
QUESTION 10:
Match the following tables related to Mobile Cloud Computing key components:
Table – I Table – II
Table – I Table – II
Detailed Solution:
Profiler monitors application execution to collect data about the time to execute, power
consumption, network traffic. Solver has the task of selecting which parts of an app runs on
mobile and cloud. Task of synchronizer modules is to collect results of split execution and
combine, and make the execution details transparent to the user. So, the correct option is (a).
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 9
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Statement I: Fog computing supports real-time interactions which is not the case in cloud computing.
Statement II: Fog computing reduces latency compared to cloud computing.
Select the correct option.
A) Statement I is TRUE and Statement II is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.
Correct Answer: B
Detailed Solution: Statement II is correct. In Statement I, both fog and cloud computing support real-time
interactions. So Statement I is false. Hence, the correct answer is B.
QUESTION 2:
In the Cloud-Fog-Edge Computing paradigm, Cellular base stations, Network routers and WiFi Gateways
can run applications.
A) True
B) False
Correct Answer: A
Detailed Solution: In the Cloud-Fog-Edge Computing paradigm, Cellular base stations, Network routers
and WiFi Gateways are capable of running applications. Hence, the statement is correct.
QUESTION 3:
Which of the following statement(s) are true regarding the cloud-fog environment model?
A) The cloud–fog environment model consists of three layers: a client layer (edge), a fog layer, and a
cloud layer.
B) Virtual machines (VMs) operate for the cloud data server, process them, and then deliver the results
to the cloud server manager.
C) If there is no/limited availability of resources in the fog layer, then the request is passed to the cloud
layer.
NPTEL Online Certification Courses
D) Fog servers contain fog server manager and virtual machines to manage requests by using container
virtualization technique.
Correct Answer: A, C
Detailed Solution: Regarding the cloud-fog environment model, Virtual machines (VMs) operate for the fog
data server, process them, and then deliver the results to the fog server manager. The fog servers contain fog
server manager and virtual machines to manage requests by using server virtualization technique. The other
statements are correct. Hence, the answers are A and C.
QUESTION 4:
Which of the following algorithms used in resource management in cloud-fog-edge computing is used to
capture the performance (of entities like, CPU, storage, network, etc.) of a computing system?
A) Discovery
B) Load Balancing
C) Placement
D) Benchmarking
Correct Answer: D
QUESTION 5:
According to the service placement taxonomy in fog-edge computing, which of the following can be
classified as online vs offline?
A) Control plan design
B) Placement characteristic
C) System dynamicity
D) Mobility support
Correct Answer: B
Detailed Solution: According to the service placement taxonomy in fog-edge computing, placement
characteristic can be classified as online vs offline.
QUESTION 6:
Select the correct statement(s) regarding offloading.
A) Offloading is a technique in which a server, an application, and the associated data are moved from the
edge to the cloud.
Correct Answer: B, C, D
Detailed Solution: Offloading is a technique in which a server, an application, and the associated data are
moved onto the edge of the network. Hence, A is false. All the other statements are correct. Refer to slide-12
of Resource Management - II.
QUESTION 7:
Different Cloud Service Providers join together to form a federation.
A) True
B) False
Correct Answer: A
Detailed Solution: Refer to slide 7 of Cloud Federation.
QUESTION 8:
Which of the following are NOT benefits of cloud federation?
Correct Answer: A, C
Detailed Solution: The benefits of cloud federation are: Maximize resource utilization; Minimize
power consumption; Load balancing; Global utility; Expand CSP’s global footprints. A and C are not
benefits, hence are the correct options.
QUESTION 9:
In which of the following cloud federation architectures, creation of cross‐site networks and cross‐site
migration of VMs are used?
Correct Answer: C
NPTEL Online Certification Courses
Detailed Solution: Advanced features like creation of cross‐site networks and cross‐site migration of VMs
are found in tightly coupled federation.
QUESTION 10:
In which of the following architectures, two or more partner clouds interoperate to aggregate their resources
and provide users with a larger virtual infrastructure?
A) Hybrid/Bursting Architecture
B) Aggregated Architecture
C) Broker Architecture
D) Multiplier Architecture
Correct Answer: B
Detailed Solution: In aggregated cloud federation architecture, two or more partner clouds interoperate to
aggregate their resources and provide users with a larger virtual infrastructure.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 12
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
In which computing environment is latency fixed due to the location of application modules at the
Area Gateway?
A) Fog computing
B) Cloud computing
C) Serverless Computing
D) None of the above
Correct Answer: A
Detailed Solution: In fog computing environment is latency fixed due to the location of application
modules at the Area Gateway
QUESTION 2:
What does spatial cloud support in terms of resource pooling?
A) Individual resource allocation for participating organizations
B) Exclusive resource ownership for each organization
C) Shared resource pooling for participating organizations
D) Restricted access to network, servers, apps, services, storages, and databases
Correct Answer: C
Detailed Solution: Spatial cloud supports shared resource pooling which is useful for participating
organizations with common or shared goals
QUESTION 3:
Dew computing is an on premises computer software-hardware organization paradigm where
on‐premises computers provide functionality that is ___________ of cloud services and is also
________ with cloud services.
NPTEL Online Certification Courses
A) independent, serverless
B) dependant, collaborative
C) independent, collaborative
D) serverless, collaborative
Correct Answer: C
Detailed Solution: Dew computing is an on premises computer software-hardware organization
paradigm where on‐premises computers provide functionality that is independent of cloud services
and is also collaborative with cloud services.
QUESTION 4:
Fog-Edge computing leads to increased network congestion
A) True
B) False
Correct Answer: B
Detailed Solution: Fog-Edge computing leads to less network congestion
QUESTION 5:
A Cyber‐Physical Cloud Computing (CPCC) architectural framework is a ________environment
that can rapidly build, modify and provision cyber‐physical systems composed of a set
of__________ based sensor, processing, control, and data services.
Correct Answer: A
Detailed Solution: A Cyber‐Physical Cloud Computing (CPCC) architectural framework can be
defined as “a system environment that can rapidly build, modify and provision cyber‐physical
systems composed of a set of cloud computing based sensor, processing, control, and data
services.”
QUESTION 6:
What is(are) the key feature(s) of Mobile Cloud computing for 5G networks?
A) Increased resource consumption by mobile applications
B) Improved reliability due to data storage in the cloud
C) Sharing resources for mobile applications
D) None of these
Detailed Solution: Key features of MCC for 5G networks include sharing resources for mobile
applications and improved reliability as data is backed up and stored in the cloud.
QUESTION 7:
The key aspect of the intelligent transportation system is efficient _____________.
A) cost
B) mobility
C) speed
D) delivery
Correct Answer: B
Detailed Solution: The key aspect of the intelligent transportation system is efficient mobility.
QUESTION 8:
In conjunction with 5G and cloud computing, what should service providers focus on in the
evolving computing paradigm?
Correct Answer: D
Detailed Solution: In evolving cloud computing paradigm with 5G, service providers should look
to provide full end‐to‐end orchestration, with a defined service layer agreements, in a self‐service
and automated way.
QUESTION 9:
Mobility Analytics utilizes the cloud platform for computation and storage.
A) True
B) False
Correct Answer: A
Detailed Solution: Mobility Analytics utilizes a Cloud platform for computation and storage.
NPTEL Online Certification Courses
QUESTION 10:
What is(are) the benefit(s) of 5G technology for enhanced mobile broadband?
A) Slower data rates
B) Higher latency
C) Lower cost-per-bit
D) Limited device compatibility
Correct Answer: C
Detailed Solution: In addition to making our smartphones better, 5G mobile technology can
usher in new immersive experiences such as VR and AR with faster, more
uniform data rates, lower latency, and lower cost per bit.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 10
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Given the VM memory size of 1024 GB and the transmission rate of 16 MB/sec
What are the total migration time and downtime for non-live VM migration? Choose the most
appropriate option.
a. 20 hours, 25 hours
b. 18 hours,18 hours
c. 16 hours, 16 hours
d. 24 hours,20 hours
Correct Answer: b
Detailed Solution: Total Migration time = VM memory size/ transmission rate
=(1024x2^30)/(16x2^20)=65536 secs= 18 hours.
For non-live migration, overall migration time is the same as overall downtime.
QUESTION 2:
Which of the following is (are) true in the case of Docker architecture?
Correct Answer: c
Detailed Solution: Private Docker registry is a service that stores Docker images.
Moreover, Docker on the host machine is split into two parts- a daemon with RESTful API and a
client who talks with the daemon.
QUESTION 3:
NPTEL Online Certification Courses
a. Facilitating microservices
b. Modeling networks.
c. Packaging software
d. None of these
QUESTION 4:
What is(are) the reason(s) to opt for VM migration in the cloud computing paradigm?
QUESTION 5:
A Kubernetes cluster consists of a set of worker machines called _________ .
a. Pods
b. Nodes
c. Control plane
d. Centers
Correct Answer: b
Detailed Solution: A Kubernetes cluster consists of set of worker machines , called nodes.
QUESTION 6:
Docker builds are more reproducible and and replicable than traditional software building methods.
NPTEL Online Certification Courses
a. True
b. False
Correct Answer: a
Detailed Solution: Docker builds are more reproducible and and replicable than traditional
software building methods. This makes implementing CD much easier.
QUESTION 7:
VM migration is the process of moving running applications or VMs from one physical host to
another host.
a. True
b. False
Correct Answer: a
Detailed Solution: VM migration is a process to move running applications or VMs from one
physical host/server to another host. So option (a) is correct.
QUESTION 8:
In Docker utility, ___________ is a collection of filesystem layers and some metadata that, if taken
together, can be spun up as Docker containers.
a. Operating System
b. Microservice
c. Virtual Machine
d. Image
Correct Answer: d
Detailed Solution: In Docker utility, an image is a collection of filesystem layers and some
metadata which if taken together, they can be spun up as Docker containers.
QUESTION 9:
Post-copy and Pre-copy migration approaches are followed in :
a. Live Migration process
NPTEL Online Certification Courses
Correct Answer: a
Detailed Solution: Both Post-copy and Pre-copy are approaches for live migration process.
QUESTION 10:
Kubernetes operates at the hardware level.
a. True
b. False
Correct Answer: b
Detailed Solution: Kubernetes operates at the container level.
NPTEL Online Certification Courses
Cloud Computing
Assignment-Week 11
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Serverless covers a wide range of technologies that can be grouped into two categories
a. BaaS and YaaS
b. FaaS and BaaS
c. FaaS and YaaS
d. None of these
Correct Answer: b
Detailed Solution: Serverless covers a wide range of technologies that can be grouped into two
categories Faas and BaaS. So, the correct option is ( b).
QUESTION 2:
BigQuery is a fully-managed, serverless data warehouse by _____________.
a. AWS
b. Google
c. Microsoft
d. IBM
Correct Answer: b
Detailed Solution: BigQuery is a fully-managed, serverless data warehouse that enables scalable
analysis over petabytes of data by Google. So, the correct option is ( b).
QUESTION 3:
Which of the following statements is/are false ?
a. Serverless computing allows the users with more control over the deployment environment
compared to PaaS.
b. Serverless computing is a form of cloud computing that allows users to run event driven
granular applications.
NPTEL Online Certification Courses
Correct Answer: a
Detailed Solution: In PaaS the developer has more control over the deployment environment. So,
the correct option is (a).
QUESTION 4:
Which of the following options is most appropriate for FaaS ?
Statement 1: Each function in the FaaS platform gets unlimited execution time.
Statement 2: Functions are always active and ready for execution.
a. Statement 1 is correct but Statement 2 is incorrect.
b. Statement 2 is correct but Statement 1 is incorrect.
c. Both the statements are correct.
d. Both the statements are incorrect.
Correct Answer: d
Detailed Solution: A function in FaaS typically has limited execution time. Functions are not
constantly active. FaaS platform listens for the events that instantiate the functions. So, the correct
option is (d).
QUESTION 5:
Runtimes allows you to annotate your function code with custom logging statements which helps
you to analyze the execution flow and performance of your AWS Lambda functions.
a. True
b. False
Correct Answer: b
Detailed Solution: Log stream allows you to annotate your function code with custom logging
statements which helps you to analyze the execution flow and performance of your AWS Lambda
functions. . So, the correct option is (b).
QUESTION 6:
Which of the following is not a category of a research initiative on sustainable cloud computing?
a. Renewable Energy
b. Capacity planning
NPTEL Online Certification Courses
c. Environment Sandboxing
d. None of these
Correct Answer: c
Detailed Solution: Environment Sandboxing is not a category of research initiative on sustainable
cloud computing. The other two options are. So, the correct option is (c ).
QUESTION 7:
VMs can be migrated to a remote CDC to balance the load effectively as per sustainable cloud
computing model.
a. True
b. False
Correct Answer: a
Detailed Solution: VMs and workloads can be migrated to a remote CDC to balance the load
effectively as per sustainable cloud computing model.
QUESTION 8:
The focus of cloud computing was _________ and the serverless is __________.
Correct Answer: b
Detailed Solution: The focus of cloud computing was system administrators and the serverless is
programmers.
QUESTION 9:
Cloud Data Centers(CDCs) consist of a chassis and racks to place the servers to process the IT
workloads.
a. True
b. False
Correct Answer: a
Detailed Solution: CDCs consist of a chassis and racks to place the servers to process the IT
workloads. So, the correct option is (a).
QUESTION 10:
NPTEL Online Certification Courses
_________are an important distribution mechanism for libraries and custom runtimes in AWS
serverless ecosystem.
a. Runtimes
b. Lambda Layers
c. Log streams
d. None of these
Correct Answer: b
Detailed Solution: Lambda layers are an important distribution mechanism for libraries, custom
runtimes and other imp function dependencies in AWS serverless ecosystem. So, the correct option
is (b).