Cloud Computing Practice Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

JULY-2019

Cloud Computing Week 1 Assignment


Solution
one or more options may be correct.

Sl Question
No
1 Uniprocessor computing is known as
(a) Centralized computing
(b) Distributed computing
(c) None of the above
Ans: a (Hint: From the definition of uniprocessor computing.)
2 Which of the following is/are distributed system?
(a) Internet
(b) Workgroups
(c) Both a and b
(d) None of these
Ans: c (Hint: Both Internet and Workgroups are distributed system.)
3 The basic building blocks of clusters are
(a) Nodes
(b) Network
(c) Network characterization
(d) All of these
Ans: d (Hint: Nodes, network as well as network characterization are all basic building
blocks of cluster.)
4 Utility computing is a model where service provider
(a) makes computing resources available to the customer as needed
(b) makes computing resources available to the customer for some amount of time
(c) Can’t say – implementation dependent
Ans: a (Hint: Service provider makes computing resources available to the customer as
needed in utility computing.)
5 In utility computing model, the service provider charges the customer
(a) at a flat rate
(b) based on the usage
(c) None of these
Ans: b (Hint: Service provider charges the customer based on the usage in utility
computing.)
6 Which is/are true regarding cloud computing?
(a) It does not provide ubiquitous access
(b) It provides on-demand network access
(c) Resources can be released with no management effort
(d) None of these
Ans: b (Hint: Cloud computing provides network access when demanded by the client.)
7 Which are essential characteristics of cloud computing?
(a) On-demand self service
(b) Resource pooling
(c) Rapid elasticity
(d) None of these
Ans: a,b,c (Hint: On-demand self service, resource pooling as well as rapid elasticity are
features of cloud computing.)
8 Cloud computing is a distributed computing model.
JULY-2019

(a) True (b) False


Ans: a (Hint: Cloud computing is a distributed computing model.)
9 Amazon Web Services is an example of
(a) SaaS
(b) PaaS
(c) IaaS
(d) None of these
Ans: c (Hint: Amazon web services is an example of IaaS.)
10 The service provider gives the capability to the consumer to deploy onto the cloud in
(a) SaaS
(b) PaaS
(c) IaaS
(d) None of these
Ans: b (Hint: From the characteristics of platform as a service model.)
11 Email service on cloud is an example of
(a) SaaS (b) PaaS (c) None of these
Ans: a (Hint: Email service pn cloud is an example of a.)
12 Cloud Bursting for load balancing between clouds is an example of
(a) Community cloud
(b) Public cloud
(c) Private cloud
(d) Hybrid cloud
Ans: d (Hint: Cloud Bursting for load balancing between clouds is a hybrid cloud.)
13 Virtual machine supports migration from one host to another host.
(a) True (b) False
Ans: a (Hint: From the characteristics of virtual machine.)
14 Customer’s computer does not need the processing power or hard disk space demanded by the
application running in the cloud.
(a) True (b) False
Ans: a (Hint: From the characteristics of cloud computing.)
15 What is the disadvantage of cloud computing?
(a) It requires constant internet connection.
(b) It does not support group collaboration.
(c) It provides limited storage.
(d) None of these.
Ans: a (Hint: Cloud computing requires constant internet connection.)
16 Virtual machines are example of
(a) SaaS (b) PaaS (c) IaaS (d) None of these
Ans: c (Hint: Virtual machine is an infrastructure as a service.)
17 Adding more resources to a single computation unit is known as
(a) Vertical scale up (b) Horizontal scale out (c) None of these
Ans: a (Hint: From the definition of virtual scale up.)
18 Google docs is an example of
(a) SaaS (b) PaaS (c) IaaS
Ans: a (Hint: Google docs is an example of software as a service.)
19 Google App Engine is an example of
(a) SaaS (b) PaaS (c) IaaS
Ans: b (Hint: Google App Engine is a platform as a service.)
20 Client server application is load balanced.
(a) True (b) False (c) Can’t say
Ans: c (Hint: It depends on the scenario. Not every client server application is load
balanced.)
21 Which among the following is/are IaaS?
(a) Load balancer (b) Data storage (c) CRM (d) Office suites
JULY-2019

Ans: a,b (Hint: Load balancer and data storage services are infrastructure as a service.)
22 SaaS is useful in case of applications where extremely fast processing of real time data is needed.
(a) True (b) False
Ans: b (Hint: It is not true.)
23 Which of these is/are managed by the user in PaaS?
(a) Data (b) Application (c) Runtime (d) All of these
Ans: a,b (Hint: Data and application are managed by the user in platform as a service.)
JULY-2019

Cloud Computing Assignments for Week 2

[One or more options may be correct]

Sl Question
No
1
Point out the wrong statement.
(a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
(b) Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be assigned on
demand to users
d) None of the above

Ans: c
Solution: Several important cloud computing approaches use a strictly hardware-based
approach to abstraction.
2
The technology used to distribute service requests to resources is referred to as :
a) load performing
b) load scheduling
c) load balancing
d) None of the above
Ans: c
Explanation: Load balancing is an optimization technique.

3 Which of the following type of virtualization is also characteristic of cloud computing ?


a) Storage
b) Application
c) CPU
d) None of the above
Ans: a,b,c
Solution: To enable these characteristics, resources must be highly configurable and flexible.

4
Point out the correct statement :
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based on
conditions
c) Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
d) None of the above
Ans: a,b,c
Solution: Alternatively, systems can be virtualized through load-balancing technologies.

5 XML with correct syntax is "_________" XML


(a) Well Parametarized
(b) Well Formed
JULY-2019

(c) Mature
(d) None of these
Ans: b
Solution: An XML document is called well-formed if it satisfies certain rules, specified by the
W3C. These rules are: A well-formed XML document must have a corresponding end tag for all
of its start tags. Nesting of elements within each other in an XML document must be proper.

6
W3C supports an XML-based alternative to DTD, called _______.
(a) XML Schema
(b) HTML DOM
(c) XML Parser
(d) None of these

Ans: a
Solution: XML Schema is commonly known as XML Schema Definition (XSD). It is used to
describe and validate the structure and the content of XML data. XML schema defines the
elements, attributes and data types. Schema element supports Namespaces. It is similar to a
database schema that describes the data in a database.

7
UDDI Stands for ______________________.
(a) Universal Description, Development and Integration
(b) Universal Description, Discovery and Integration
(c) Universal Development, Design and Integration
(d) Universal Description, Discovery and Interaction

Ans: b
Solution: UDDI is an XML-based standard for describing, publishing, and finding web services.
UDDI stands for Universal Description, Discovery, and Integration. UDDI is a specification for a
distributed registry of web services.

8 The basic Web services platform is combination of _____________ and _____________.


(a) CSS+HTTP
(b) XML+JAVA
(c) XML+HTTP
(d) XML+HTML

Ans: (c)
Solution: XML stands for eXtensible Markup Language. XML was designed to store and transport
data.XML was designed to be both human- and machine-readable. HTTP means HyperText
Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this
protocol defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
9
Which of the following is/are type(s) of deployment model of cloud?
(a) IaaS
(b) PaaS
(c) Hybrid Cloud
(d) Community Cloud
JULY-2019

Ans: (c),(d)
Solution: A cloud deployment model is a “configuration” of certain cloud environment
parameters such as the storage size, accessibility and proprietorship. There are four main
cloud deployment models that differ significantly and for which most of the companies opt: a
public, private, hybrid and a community one.
10 XML Metadata Interchange (XMI) helps in
a) Integration of different data models, generated using the Unified Modeling Language (UML)
b) Exchanging information about data warehouses
c) Express a set of rules to which an XML document must conform
d) None of the above
Ans: a,b

Solution: Refer the definition of XMI


JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur
Cloud Computing
Assignment- Week 3
One or more options may be correct.
Number of questions: 10 Total mark: 10 X 1 = 10
______________________________________________________________________________

QUESTION 1:
In cloud, service uptime is 50 minutes and downtime is 10 minutes. What is the
availability of the service?

a. 0.25
b. 0.2
c. 0.8
d. 0.75

Correct Answer: c

Detailed Solution: Availability = 1 – (downtime/uptime) = 1- (10/50) = 4/5 = 0.8

______________________________________________________________________________

QUESTION 2:
Which of the following is/are QoS Parameters of Cloud SLA?

a. Security
b. Privacy
c. Trust
d. None of the above

Correct Answer: a,b,c

Detailed Solution: Security, Privacy and Trust are the QoS Parameters of Cloud SLA.

______________________________________________________________________________

QUESTION 3:
What is the parallel efficiency(Eff) of an algorithm? Where a task takes time T in uniprocessor
system, P is number of processors, M is time taken by each processor.

a. Eff = (T*P)/M
b. Eff = T*(M/P)
c. Eff = T/(P*M)
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

d. Eff = T*P*M

Correct Answer: c

Detailed Solution: Eff = T/(P*M) is the parallel efficiency(Eff) of an algorithm.

______________________________________________________________________________

QUESTION 4:
Which of the following is/are correct?

a. SLA contains SLO


b. SLO contains SLA
c. Multiple SLAs are aggregated to KPI
d. KPIs are aggregated to SLO

Correct Answer: a,d

Detailed Solution: The correct statements are: (a) SLA contains SLO. (d) KPIs are
aggregated to SLO.

______________________________________________________________________________

QUESTION 5:
Distributed Computing is inefficient over parallel computing in which of the following
scenario(/s)?

a. Processors synchronization
b. Imbalance work distribution to processor
c. Message communication overhead between processors
d. None of the above

Correct Answer: a,b,c

Detailed Solution: Distributed Computing is inefficient over parallel computing in


the following scenarios: (a) Processors synchronization, (b) Imbalance work
distribution to processor and (c) Message communication overhead between
processors

______________________________________________________________________________

QUESTION 6:
Independent server clusters share storage through high-speed network storage in -
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

a. Shared memory architecture


b. Shared nothing architecture
c. Shared disk architecture
d. None of the above

Correct Answer: c

Detailed Solution: Independent server clusters share storage through high-speed


network storage in shared disk architecture.

______________________________________________________________________________

QUESTION 7:
Which of the following OpenStack component is used for networking services?

a. Swift
b. Keystone
c. Neutron
d. Cinder

Correct Answer: c

Detailed Solution: Neutron is used for networking services in OpenStack.

______________________________________________________________________________

QUESTION 8:
Which of the following is/are managed by Swift?

a. Object storage
b. Block storage
c. Ephemeral storage
d. All of the above

Correct Answer: a

Detailed Solution: Object storage is managed by Swift in OpenStack.

______________________________________________________________________________
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

QUESTION 9:
Image URI is looked up through _______
a. Swift
b. Keystone
c. Glance
d. Cinder

Correct Answer: c

Detailed Solution: Image URI is looked up through Glance in OpenStack.

______________________________________________________________________________

QUESTION 10:
Which of the following is/are follow(s) Quorum protocol for a large number of concurrent reads &
writes.

a. Google File System (GFS)


b. BigTable
c. Dynamo
d. None of the above

Correct Answer: c

Detailed Solution: Dynamo follows Quorum protocol for a large number of


concurrent reads & writes.

______________________________________________________________________________

************END*******
JULY-2019

Cloud Computing Assignments for Week 4

[One or more options may be correct]

Sl Question
No
1 Which component of OpenStack is responsible for providing persistent block storage to running
instances?
(a) Neutron
(b) Nova
(c) Swift
(d) Cinder
Ans: d
Solution: Cinder is a Block Storage service for OpenStack. It's designed to present storage
resources to end users that can be consumed by the OpenStack Compute Project.

2 Which of the following OpenStack component is/are responsible for on demand scheduling of virtual
machines?
(a) Cinder
(b) Nova
(c) Swift
(d) Glance

Ans: b
Solution: OpenStack Nova is a component within the OpenStack open source cloud computing
platform developed to provide on-demand access to compute resources by provisioning and
managing large networks of virtual machines (VMs).

3 Neutron is a computing component of OpenStack.


(a) True
(b) False

Ans: b
Solution: Neutron allows you to create virtual routers and manage routing.

4 Google App Engine is:


(a)PaaS
(b) IaaS
(c)SaaS
(d) Storage-as-a-Service

Ans: a
Google App Engine is a Platform as a Service and cloud computing platform for developing and
hosting web applications in Google-managed data centers. Applications are sandboxed and run
across multiple servers.

5 Azure App Service plan defines:


a) Region
b) Instance Size
JULY-2019

c) Security
d) None of the above

Ans: a,b

Solution: Refer https://docs.microsoft.com/en-us/azure/app-service/overview-hosting-plans

6 GCP: Match the following pairs:


A)GoogleAppEngine
B)Google CloudEndPoints
C)Google ComputeEngine
1) You can create and run virtual machines on Google infrastructure
2) You can migrate your web app to Google Cloud Platform for better performance
3) You can scale your app according to the demand/ service requests

a)A-2,B-3,C-1
b)A-3,B-1,C-2
c)A-3,B-2,C-1
d)None

Ans: a
Solution: GoogleAppEngine: PaaS, used to run applications;
GoogleCloudEndPoints: Scale your application;
GoogleComputeEngine: Create/ run VMs;

7 OpenStack: Different components of Nova (e.g. scheduler, Compute, api etc.) communicates via

(a) Message Queues


(b) Neutron
(c) Conductor
(d) Swift
Ans: a

Solution: Message queuing services facilitate inter-process communication in OpenStack.

8
OpenStack: Security groups-
(a) Are quick alternative to Firewall
(b) Prevent Virus and Spams
(c) Prioritize VMs from low to high security
(d) None of the above
Ans: a

Solution: Security group acts as a virtual firewall for servers and other resources on a network.
It is a container for security group rules which specify the network access rules.

9
OpenStack: Which IP use is preferred for transferring data to a VM from
(i) Another VM in the same cloud (ii) Your organization's network-
(a) i. Floating IP ii. Private IP
JULY-2019

(b) i. Private IP ii. Floating IP


(c) Floating IP in both cases
(d) Private IP in both cases

Ans: b

Solution: The private IP address is likely to be used for accessing the instance by other
instances in private networks while the floating IP address would be used for accessing the
instance from public networks

10 OpenStack: When a VM is terminated, which of the following resources are freed-


(a) Ephemeral and persistent storage, All IPs, RAM and vCPUs
(b) Ephemeral and persistent storage only
(c) Ephemeral storage, All IPs, RAM and vCPUs
(d) None

Ans: c

Solution: Once the VM is terminated, all the resources including the Ephemeral storage, all IPs,
RAM and vCPUs are freed. Because, the VM controls the entire OS. Ephemeral storage, all IPs,
RAM and vCPUs run in the OS memory. So, upon termination of the VM all the resources are
freed.
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur
Cloud Computing
Assignment- Week 5
One or more options may be correct.
Number of questions: 10 Total mark: 10 X 1 = 10
______________________________________________________________________________

QUESTION 1:
Which of the following indicates that cloud is costlier than owning of computer infrastructures?
Where U is Utility Premium, P is Peak Demand, and A is Average Demand

a. U < P/A
b. U > P/A
c. U = A/P
d. U>P

Correct Answer: b

Detailed Solution: When U > P/A, the cloud is costlier than owning of computer
infrastructures.

______________________________________________________________________________

QUESTION 2:
Which of the following part of the MapReduce is responsible for processing one or more
chunks of data and producing the output results?

a. Map Task

b. Task execution

c. Reduce Task

d. All of the above

Correct Answer: a

Detailed Solution: Map Task of the MapReduce is responsible for processing one
or more chunks of data and producing the output results.

______________________________________________________________________________

QUESTION 3:
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

Which of the following is/are TRUE for Map phase?

a. Files are sorted by a key and stored to the local file system

b. Each mapper writes computation results in one file per reducer

c. Each mapper reads approximately 1/M of the input from the global file
system

d. None of these

Correct Answer: a,b,c

Detailed Solution: The followings are true for Map phase: (a) Files are sorted by a
key and stored to the local file system, (b) Each mapper writes computation
results in one file per reducer and (c) Each mapper reads approximately 1/M of
the input from the global file system

______________________________________________________________________________

QUESTION 4:
Which of the following function is responsible for consolidating the results produced by
each of the Map() functions/tasks?

a. Map

b. Reducer

c. Reduce

d. None of these

Correct Answer: c

Detailed Solution: Reduce is responsible for consolidating the results produced


by each of the Map() functions/tasks.

______________________________________________________________________________

QUESTION 5:
For service availability, the KPI can be

a. Uptime
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

b. Downtime

c. None of these

Correct Answer: a,b

Detailed Solution: For service availability, the KPI can be uptime and downtime.

______________________________________________________________________________

QUESTION 6:
Which of the following is/are the objective(s) of Resource Management?

a. Reduce throughput

b. Reduce latency

c. Reduce overheads

d. Increase latency

Correct Answer: b,c

Detailed Solution: The objectives of resource management are (b) reduce latency
and (c) reduce overheads.

______________________________________________________________________________

QUESTION 7:
When load increases, VM management can be done by

a. Schedule new VMs to new nodes

b. Shutdown unused nodes

c. All of these

d. None of these

Correct Answer: a

Detailed Solution: When load increases, VM management can be done by – a)


Schedule new VMs to new nodes.

______________________________________________________________________________
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

QUESTION 8:
In hadoop, which of the following stores metadata?

a. Data node

b. Name node

c. Client node

d. None of these

Correct Answer: b

Detailed Solution: In hadoop, name node stores metadata.

______________________________________________________________________

QUESTION 9:
Performance metrics for resource management are
a. Ease of deployment

b. QoS

c. Delay

d. None of these

Correct Answer: a,b,c

Detailed Solution: Performance metrics for resource management are (a) ease of
deployment, (b) QoS and (c) delay.
______________________________________________________________________________

QUESTION 10:
Statement 1: The relationship between the number of processes used and power
consumption is non-linear.

Statement 2: Network throughput is a logical resource.

a. Both statements are true

b. Both statements are false

c. Statement 1 is true and Statement 2 is false


JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

d. Statement 1 is false and Statement 2 is true

Correct Answer: a

Detailed Solution: The relationship between the number of processes used and
power consumption is non-linear. Network throughput is a logical resource.
______________________________________________________________________________

************END*******
JULY-2019

Cloud Computing Assignments for Week 6


[One or more options may be correct]

Sl Question
No
1 Which of the options is/are the basic component(s) of security?
(a) Confidentiality
(b) Integrity
(c) Reliability
(d) Efficiency

Ans: a,b
Solution: Refer to def. of Security.

2 In para-virtualization, VMs run on hypervisor that interacts with the hardware.


a) True
b) False

Ans: b
Solution: In computing, para-virtualization is a virtualization technique that presents a
software interface to the virtual machines which is similar, yet not identical to the underlying
hardware–software interface.

3 Spoofing is an example of

(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption

Ans: a,c
Solution: In the context of information security, and especially network security, a spoofing
attack is a situation in which a person or program successfully masquerades as another by
falsifying data, to gain an illegitimate advantage

4 In cloud, “Recovery Time Objective” (RTO) depicts –

(a) The period of time allowed for recovery


(b) Percentage of data recovered
(c) Maximum amount of data recovered
(d) None of the above

Ans: a
Solution: The Recovery Time Objective (RTO) is the targeted duration of time and a service level
within which a business process must be restored after a disaster (or disruption) in order to
avoid unacceptable consequences associated with a break in business continuity.

5 Fabrication security attack is an attack on


JULY-2019

(a) Confidentiality
(b) Availability
(c) Integrity
(d) Authenticity

Ans: d
Solution: An unauthorized party inserts counterfeit objects into the system and basically
attacks the authenticity of the system.

6 Point out the wrong statement(s):

(a) You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
(b) Any distributed application has a much greater attack surface than an application that is
closely held on a Local Area Network
(c) Cloud computing don’t have vulnerabilities associated with Internet applications
(d) None of the mentioned

Ans: c
Solution: Cloud environments run software, software has vulnerabilities, and adversaries try to
exploit those vulnerabilities.

7 Choose the option(s) which is/are not a passive attack?

a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay

Ans: c,d

Solution: A passive attack is a network attack in which a system is monitored and sometimes scanned
for open ports and vulnerabilities. The purpose is solely to gain information about the target and no
data is changed on the target.

8 Access policy control refers to

a) Cyclic Inheritance Control


b) Virus Attack
c) Violation of SoD Constraint
d) Man in the middle attack

Ans: a,c

Solution: Access control is a security technique that regulates who or what can view or use
resources in a computing environment

9
Interception security attack is an attack on

a) Confidentiality
JULY-2019

b) Availability
c) Integrity
d) Authenticity

Ans: a

Solution: An interception means that some unauthorized party has gained access to an asset. The
outside party can be a person, a program, or a computing system. Examples of this type of failure are
illicit copying of program or data files, or wiretapping to obtain data in a network.

10
Which of the following service(s) that need(s) to be negotiated in Service Level Agreements?

(a) Logging
(b) Auditing
(c) Regulatory compliance
(d) None of the mentioned

Ans: a,b,c

Solution: Refer the definition of SLA


JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur
Cloud Computing
Assignment- Week 7
One or more options may be correct.
Number of questions: 10 Total mark: 10 X 1 = 10
______________________________________________________________________________

QUESTION 1:
Cloudlet is a trusted, resource-rich computer or cluster of computers

a. which is not connected through internet


b. which is well connected through internet
c. which is unavailable for use by nearby mobile devices
d. which is available for use by nearby mobile devices

Correct Answer: b,d

Detailed Solution: Cloudlet is a trusted, resource-rich computer or cluster of


computers (b) which is well connected through internet. (d) which is available for
use by nearby mobile devices.

______________________________________________________________________________

QUESTION 2:
Which of the following is correct about code offloading

a. It offloading the code to the remote server and executing it


b. It increases latency by using multi-hop network
c. It decreases latency by using a single-hop network
d. It decreases battery consumption by using Wi-Fi or short-range radio

Correct Answer: a,c,d

Detailed Solution: The followings are correct about code offloading (a) It
offloading the code to the remote server and executing it, (c) It decreases latency
by using a single-hop network and (d) It decreases battery consumption by using
Wi-Fi or short-range radio.

______________________________________________________________________________

QUESTION 3:
Offloading is beneficial when
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

a. Large computation are required with relatively large numbers of communication


b. Small computation are required with relatively small numbers of communication
c. Large computation are required with relatively small numbers of communication
d. Small computation are required with relatively large numbers of communication

Correct Answer: c

Detailed Solution: Offloading is beneficial when large computation are required


with relatively small numbers of communication.

______________________________________________________________________________

QUESTION 4:
Challenges in Mobile Cloud Computing are

a. High bandwidth, Heterogeneity


b. Service availability, Homogeneity
c. Low bandwidth, Heterogeneity
d. Low bandwidth, Service availability

Correct Answer: c,d

Detailed Solution: Challenges in Mobile Cloud Computing are (c) low bandwidth,
heterogeneity and (d) low bandwidth, service availability.

______________________________________________________________________________

QUESTION 5:
Which of the following statement(s) is/are True?

a. Fog computing enables some of transactions and resources at the edge of the
cloud
b. Fog computing enables all of transactions and resources at the edge of the cloud
c. Fog computing decreases the need for bandwidth by sending every bit of
information over cloud channels
d. Fog computing increases the need for bandwidth by sending every bit of
information over cloud channels

Correct Answer: a
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

Detailed Solution: Fog computing enables some of transactions and resources at


the edge of the cloud.

______________________________________________________________________________

QUESTION 6:
Statement 1: Geospatial cloud ease the sharing of geospatial data among organizations.
Statement 2: Geospatial cloud make GIS decision easily.

a. Statement 1 is True and Statement 2 is False


b. Statement 2 is True and Statement 1 is False
c. Both statements are True
d. Both statements are False

Correct Answer: c

Detailed Solution: Geospatial cloud ease the sharing of geospatial data among
organizations. Geospatial cloud make GIS decision easily.

______________________________________________________________________________

QUESTION 7:
How resources are managed in Fog network?

a. Perform less parallel operations


b. Perform efficient load balancing
c. Use less scalable system
d. Meet the delay requirements of real-time applications

Correct Answer: b,d

Detailed Solution: Resources are managed in Fog network by (b) perform efficient
load balancing and (d) meet the delay requirements of real-time applications.

______________________________________________________________________________

QUESTION 8:
Statement 1: Deficit of effective handoff mechanisms in WiFi decreases the number of packet
losses in mobile communication.
JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

Statement 2: Increment of physical distance between the user and the cloud resources
increases delay in mobile communication.

a. Statement 1 is True and Statement 2 is False


b. Statement 2 is True and Statement 1 is False
c. Both statements are True
d. Both statements are False

Correct Answer: b

Detailed Solution: Increment of physical distance between the user and the cloud
resources increases delay in mobile communication.

______________________________________________________________________

QUESTION 9:
Mobile cloud computing (MCC) is the combination of ___________, __________ and
___________.
a. Grid computing, Mobile computing, Wireless networks.
b. Cloud computing, Mobile computing, Wireless networks.
c. Cloud computing, Mobile computing, Wired networks.
d. Cloud computing, Grid computing, Wired networks.

Correct Answer: b

Detailed Solution: Mobile cloud computing (MCC) is the combination of Cloud


computing, Mobile computing and Wireless networks.
______________________________________________________________________________

QUESTION 10:
Which of the following is/are the need(s) of Geospatial Cloud?

a. Sharing of geospatial data among organizations

b. Lack of GIS expertise in the organizations

c. Make GIS decision easily

d. None of the above

Correct Answer: a,b,c


JULY-2019

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur

Detailed Solution: The needs of Geospatial Cloud are (a) Sharing of geospatial
data among organizations, (b) Lack of GIS expertise in the organizations and (c)
Make GIS decision easily.
______________________________________________________________________________

************END*******
JULY-2019

Cloud Computing Assignments for Week 8


One or More options may be correct.

Sl Question
No
1 Docker containers take more space than VMs
(a) True (b) False
Ans: b
2 A single kernel can be shared by more than one containers
(a) True (b) False
Ans: a
3 In 3-tier cloud data centers, following layers are present:.
(a) Core (b) Access (c) Storage (d) Aggregation
Ans:a, b, d
4 Popular connectivity protocols of IoT is/are
a) MQTT (b) HTTP (c) SNMP (d) All
Ans: a, b
5 Docker container is having following major features
(a) ship (b) develop (c) run anywhere (d) Compile
Ans: a, b, c
6 In the context of Green Cloud Computing, the Power Usage Effectiveness value lies between
(a) [0, 1] (b) [1, ∞] (c) [-1, 1] (d) None
Ans: b
7 In one-to-many Virtual Sensors, many physical sensors correspond to one virtual sensor
(a) True (b) False
Ans: b
8 A typical IoT-based vehicular data cloud offers a variety of cooperative information services, like traffic
information, parking availability etc., which can be termed as
a) Network-as-a-Service b)Platform-as-a-Service c)Storage-as-a-Service d)None
Ans: b

You might also like