0% found this document useful (0 votes)
107 views18 pages

IOTA Unit Wise Objective Questions

Uploaded by

Tejashwi tejuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views18 pages

IOTA Unit Wise Objective Questions

Uploaded by

Tejashwi tejuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

IOTA MCQ’s

UNIT-1
1. What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
Answer: a
Explanation: The Internet of Things (IoT) is a network of physical objects embedded with sensors,
software, and other technologies for exchanging data with other devices over the internet.

2. Which of the following is not an IoT device?


a) Table
b) Laptop
c) Arduino
d) Tablet
Answer: a
Explanation: IoT devices are embedded with sensors, microprocessors, actuators, etc. Laptop,
Arduino, and Tablet are embedded systems and they can be operated with the internet, thus they are
IoT devices.

3. Which of the following is false about IoT devices?


a) IoT devices use the internet for collecting and sharing data
b) IoT devices need microcontrollers
c) IoT devices use wireless technology
d) IoT devices are completely safe
Answer: d
Explanation: IoT devices are wireless devices and they use the internet for collecting and sharing
data. They are not completely safe because they store data and sometimes hackers access them.

4. Which of the following is not an IoT platform?


a) Amazon Web Services
b) Microsoft Azure
c) Salesforce
d) Flipkart
Answer: d
Explanation: Amazon Web Services, Microsoft Azure, and Salesforce provide cloud computing
IoT services. But Flipkart is an e-commerce website that provides marketing facilities.

5. Which of the following is not an application of IoT?


a) BMP280
b) Smart home
c) Smart city
d) Self-driven cars
Answer: a
Explanation: Smart homes, smart cities, and self-driven cars are applications of IoT. BMP280 is a
sensor that is used to measure air pressure. It is a component of IoT devices.

6.What are the key components of a M2M system?


a) Vortex DDS
b) Smart Homes
c) Sensors and Wi-Fi
d) Protocols

Answer: c
Explanation: Following are the key components of a M2M system.
Sensors
RFID (Radio Frequency Identification)
Wi-Fi
Autonomic Computing.

7. MQTT is mainly used for __________


a) M2M communication
b) Device communication
c) Internet communication
d) Wireless communication
Answer: a
Explanation: MQTT is a public messaging protocol designed for lightweight M2M communication.
It was originally developed by IBM and is now an open standard.

8. What is the role of Cloud in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: b
Explanation: Cloud to edge Middleware: manage data and edge devices, data streaming and event
processing, control authorized access.

9. What is the role of Gateway in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: c
Explanation: Gateway: collects data from sensors, abstract protocols, perform local autonomous
decision, transfer information.

10. IoT devices are naturally vulnerable to ________ threats.


a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
Answer: c
Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of
transparency and privacy issues with IoT.

11. Which challenge comes under securing the information?


a) Signaling
b) Security
c) Presence detection
d) Power consumption
Answer: b
Explanation: Security is a huge umbrella, but it’s paramount in Internet of Things connectivity.

12. Which challenge comes when we use many devices on the same network?
a) Signaling
b) Security
c) Presence detection
d) Power consumption
Answer: d
Explanation: You need minimal battery drain and low power consumption. You can’t afford to use
up 100% of an IoT devices small and expensive embedded CPU power.

14. Which of the following issues are considered in IoT?


a) Security Issue
b) Reliablity Issue
c) Standard Issue
d) All issues
Answer: d
Explanation: We should be very careful while building IoT as it has the following issues:
Security Issue
Reliablity Issue
Standard Issue.

15._______ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
Answer: b
Explanation: Heterogeneity in IoT as one of the key characteristics, devices have different
hardware platforms and networks. And can interact with other devices or services platforms
through different networks.

UNIT-2
1. What is Arduino?
a) Programming language
b) Image editing software
c) Open-source electronics platform
d) Text editor
Answer: c
Explanation: Arduino is an open-source hardware and software platform that is easy to use.
Arduino boards are capable of reading analog or digital input signals from various sensors.

2. How many types of Arduino do we have?


a) 4
b) 8
c) 12
d) 16
Answer: b
Explanation: There are 4 Arduino boards and 4 Arduino shields that fit on top of Arduino
compatible boards to provide additional capability like connecting to the internet, motor controller,
LCD screen controlling, etc..

3. What language is a typical Arduino code based on?


a) Assembly Code
b) Python
c) Java
d) C/C++
Answer: d
Explanation: The Arduino code is basically a lightly modified version of the C++ programming
language. It includes certain functions or modules that are specific to the development of the
Arduino platform and was preinstalled in the language by the developers.

4. Which of the following is not a feature of the Raspberry PI model B IoT device?
a) It has 256 MB SDRAM
b) It has a single USB connector
c) It has its own operating system
d) It has an Ethernet port

Answer: a
Explanation: Raspberry PI model B has a single 2.0 USB connector and an on-board 10/100
Ethernet RJ45 jack. It has its own operating system and 512 MB SDRAM memory.

5. Which of the following processor is used in the Raspberry PI 3 IoT device?


a) Broadcom BCM2711
b) Broadcom BCM2837
c) Broadcom BCM2838
d) Intel 8085
Answer: b
Explanation: Raspberry PI 3 has Broadcom BCM2837 microprocessor. It is a 64-bit Quad-core
microprocessor. Broadcom BCM2711 is the microprocessor of Raspberry PI 4 Model B.

6. ARM stands for _____________


a) Advanced Rate Machines
b) Advanced RISC Machines
c) Artificial Running Machines
d) Aviary Running Machines
Answer: b
Explanation: ARM is a type of system architecture.

7. The main importance of ARM micro-processors is providing operation with ______


a) Low cost and low power consumption
b) Higher degree of multi-tasking
c) Lower error or glitches
d) Efficient memory management
Answer: a
Explanation: The Stand alone feature of the ARM processors is that they’re economically viable.
8. ARM processors where basically designed for _______
a) Main frame systems
b) Distributed systems
c) Mobile systems
d) Super computers
Answer: c
Explanation: These ARM processors are designed for handheld devices.

9.RISC stands for _________


a) Restricted Instruction Sequencing Computer
b) Restricted Instruction Sequential Compiler
c) Reduced Instruction Set Computer
d) Reduced Induction Set Computer
Answer: c
Explanation: This is a system architecture, in which the performance of the system is improved by
reducing the size of the instruction set.

10. In the ARM, PC is implemented using ___________


a) Caches
b) Heaps
c) General purpose register
d) Stack

Answer: c
Explanation: PC is the place where the next instruction about to be executed is stored.

11. All instructions in ARM are conditionally executed.


a) True
b) False
Answer: a
Explanation: None.

12. The addressing mode where the EA of the operand is the contents of Rn is ______
a) Pre-indexed mode
b) Pre-indexed with write back mode
c) Post-indexed mode
d) None of the mentioned
Answer: c
Explanation: None.

13. The effective address of the instruction written in Post-indexed mode, MOVE [Rn]+Rm is
_______
a) EA = [Rn]
b) EA = [Rn + Rm]
c) EA = [Rn] + Rm
d) EA = [Rm] + Rn
Answer: a
Explanation: Effective address is the address that the computer acquires from the current
instruction being executed.
14. The instructions which are used to load or store multiple operands are called as ________
a) Banked instructions
b) Lump transfer instructions
c) Block transfer instructions
d) DMA instructions
Answer: c
Explanation: These instructions are generally used to perform memory transfer operations.

15. The Instruction, LDM R10!, {R0,R1,R6,R7} ______


a) Loads the contents of R10 into R1, R0, R6 and R7
b) Creates a copy of the contents of R10 in the other registers except for the above mentioned ones
c) Loads the contents of the registers R1, R0, R6 and R7 to R10
d) Writes the contents of R10 into the above mentioned registers and clears R10
Answer: a
Explanation: The LDM instruction is used to load data into multiple locations.

UNIT-3
1. What type of communication is used in a commercial walkie talkie?
a) Simplex
b) Full duplex
c) Half duplex
d) Multiplex
Answer: c
Explanation: a walkie talkie the communication is two way but at a given time only one way
communication is allowed. This type of communication is called as half duplex communication.

2. In this method of wireless communication, communication happens only in one direction:


a) Simplex
b) Duplex
c) Half duplex
d) None of the mentioned
Answer: a
Explanation: In simplex systems, communication happens only in one direction that is from the
transmitter to the receiver. Examples for this type of communication include radio, television and
paging systems.

3.Which of the following is not a fundamental component of an IoT system?


a) Sensors
b) Connectivity and data processing
c) User interface
d) Transformer
Answer: d
Explanation: Sensors are required to collect data, network connectivity is required for data
processing and to interface with the user. Transformers are not required as they are used for voltage
transformation.
4. Which of the following is false about the IoT components?
a) A light sensor (photoresistor) is an analog sensor
b) A microphone is a digital sensor
c) A push button is a digital sensor
d) A keyboard is a digital sensor

Answer: b
Explanation: A light sensor is an analog sensor because it senses light intensity. A microphone is
also an analog sensor because it senses sound. Push buttons and keyboards are operated digitally
so, they are digital sensors.

5.Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
Answer: a
Explanation: Sensors are used to capture data from the physical world. Microprocessors and
microcontrollers are used to control the operations and actuators are for outputs of IoT devices.

6. MQTT is mainly used for __________


a) M2M communication
b) Device communication
c) Internet communication
d) Wireless communication
Answer: a
Explanation: MQTT is a public messaging protocol designed for lightweight M2M communication.
It was originally developed by IBM and is now an open standard.

7. Which is an open standard?


a) CoAP
b) MQTT
c) XMPP
d) HTTP
Answer: b
Explanation: IoT needs standard protocols. Two of the most promising for small devices are MQTT
and CoAP. Both ate standard protocols.

8. MQTT is _________ oriented.


a) Data
b) Message
c) Network
d) Device
Answer: b
Explanation: MQTT is message oriented. Every message is a discrete chunk of data, opaque to the
broker

9. CoAP is specialized in ___________


a) Internet applications
b) Device applications
c) Wireless applications
d) Wired applications
Answer: a
Explanation: Constrained Application Protocol (CoAP) is a specialized Internet Application
Protocol for constrained devices, as defined in RFC 7228.

10.CoAP is designed for use between devices on the same constrained network.
a) True
b) False
Answer: a
Explanation: CoAP is designed for use between devices on the same constrained network (e.g.,
low-power, lossy networks), between devices and general nodes on the internet, and between
devices on different constrained networks both joined by an internet.

11.Which layer is CoAP?


a) Control layer
b) Transport layer
c) Service layer
d) Application layer
Answer: d
Explanation: The CoAP is an application layer and web-based protocol designed for constrained
devices like sensors.

12. CoAP provides which of the following requirements?


a) Multicast support and simplicity
b) Low overhead and multicast support
c) Simplicity and low overhead
d) Multicast support, Low over head, and simplicity
Answer: d
Explanation: CoAP is designed to easily translate to HTTP for simplified integration with the web,
while also meeting specialized requirements such as multicast support, very low overhead, and
simplicity.

13. Bluetooth is the wireless technology for __________


a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
Answer: b
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for
data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for
transmission.

14. Bluetooth uses __________


a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
Answer: a
Explanation: Frequency hopping spread spectrum is a method of transmitting radio signals by
rapidly changing the carrier frequency and is controlled by the codes known to the sender and
receiver only.

15. Unauthorised access of information from a wireless device through a bluetooth connection is
called _________
a) bluemaking
b) bluesnarfing
c) bluestring
d) bluescoping
Answer: b
Explanation: Unauthorised access of information from a wireless device through a bluetooth
connection is called Bluesnarfing. It is done through exploiting the vulnerabilities of the Bluetooth
device to steal the transmitted information.

16. What is A2DP (advanced audio distribution profile)?


a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) a bluetooth profile for file management

17. In a piconet, one master device ________


a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) can be master in another piconet
Answer: b
Explanation: In a scatternet, a slave node of one piconet may act as a master in a piconet that is part
of the scatternet. The scatternet uses this property to connect many piconets together to create a
larger network.

18. Bluetooth transceiver devices operate in ______ band.


a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
Answer: a
Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for transmission. It is used to
create a wireless personal area network for data transfer up to a distance of 10 meters.

19. Bluetooth supports _______


a) point-to-point connections
b) point-to-multipoint connection
c) both point-to-point connections and point-to-multipoint connection
d) multipoint to point connection
Answer: c
Explanation: In Bluetooth, each slave node communicates with the master of the piconet
independently i.e. each master-slave connection is independent. The slave is not allowed to
communicate with other slaves directly.

20.Which bluetooth version enables low energy?


a) Bluetooth 3.0
b) Bluetooth 4.0
c) Bluetooth 2.0
d) Bluetooth 1.0
Answer: b
Explanation: With the development of Bluetooth 4.0, it became the ability to implement low energy
features that conserve power more effectively.

UNIT-4
1. Data acquisition can be done on qualitative quantities.
a) True
b) False
Answer: b
Explanation: Data acquisition cannot be done on qualitative quantities. It can be only done on
quantitative quantities. Data acquisition is a process of sampling physical signals that can be
represented in the form of digital numeric values.

2. DAQ (Data acquisition system) cannot be controlled using C++ programming.


a) True
b) False
Answer: b
Explanation: DAQ (Data acquisition system) can be controlled using C++ programming. C++
programming is generally used for coding in DAQNavi. Other software such as JAVA, BASIC,
LabVIEW can also be used for this purpose.

3. What type of interface does a DAQ (Data acquisition) hardware creates?


a) Interface between two similar signals
b) Interface between a computer and signal
c) Interface between two dissimilar signals
d) Interface between two similar hardware
Answer: b
Explanation: A DAQ (Data acquisition) hardware creates an interface between a computer and
signal. These signals are collected from the outside world. They are set of physical values that can
be sampled and is collected using different sensors.

4. DAQ (Data acquisition) system can be controlled using LabVIEW.


a) True
b) False
Answer: a
Explanation: DAQ (Data acquisition) system can be controlled using LabVIEW. LabVIEW
provides an interface in which a user can manually enter one or many sample sets and can convert
it into graphical form or manipulate it to give reasonable meanings.

5.Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of
objects, through which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP
Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not
only physical devices but in general any abstract or concrete entity that observes features of any
kind.

6._________ Services are the way in which the IoT is connected to data.
a) Cloud
b) Bigdata
c) Internet
d) Network
Answer: a
Explanation: Cloud based services are the way in which the IoT is connected to data. Just like
World Wide Web runs over the Internet, so does the IoT.

7.What is the role of Bigdata in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: a
Explanation: Bigdata stores time series data, unstructured data, provided context for analytics, API
for enterprise applications.

8. What is the role of Cloud in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: b
Explanation: Cloud to edge Middleware: manage data and edge devices, data streaming and event
processing, control authorized access.

9. What is the role of Gateway in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: c
Explanation: Gateway: collects data from sensors, abstract protocols, perform local autonomous
decision, transfer information.

10. What is the role of Sensor in smart grid architecture of IoT?


a) Store data
b) Manage data
c) Collect data
d) Security
Answer: a
Explanation: Sensors and Actuators are connected, send data when needed, secure and low power,
easy to install and configure.

11. IoT gateway must provide __________


a) Simple and fast installation
b) Security with hardware
c) Data storage
d) Protocol abstraction
Answer: d
Explanation: IoT gateway must provide:
Protocol abstraction, Computing and I/O performance,Integration communication capability.

12. Which of the following is IoT device manageability?


a) Protocol abstraction
b) Simple and fast installation
c) Security with hardware
d) Data storage
Answer: b
Explanation: IoT Device Manageability:
Simple and fast Installation and configuration, Enable deployment of new application, Remote
administration of gateways.

13. IoT security management includes ________


a) Protocol abstraction
b) Simple and fast installation
c) Security with hardware
d) Data storage
Answer: c
Explanation: IoT security management :
Improves security with hardware, Enable secure communication to sensors, End to End Security
from Sensor to Cloud.

14. IoT data scalability includes ________


a) Protocol abstraction
b) Simple and fast installation
c) Security with hardware
d) Data storage
Answer: d
Explanation: IoT Data Scalability:
Data and Event processing at the edge, Data storage at the edge,Hierarchical clouds.

UNIT-5

1.What is Cloud Computing?


a) Cloud Computing means providing services like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
c) Cloud Computing is a tool used to create an application
d) None of the mentioned
Answer: a
Explanation: Cloud computing means providing services like storage, servers, database,
networking, etc. over the internet without the user managing it directly. The data stored can be
accessed by an authorized user anywhere anytime provided the user must have an internet
connection and a device.

2. Which of the following is not a type of cloud server?


a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers
Answer: d
Explanation: In Public Servers the users share the hardware, storage, and networks. Private Servers
provide high security to the data stored through firewalls and internal hosting. Also, in the private
cloud, the user can customize their servers with add-ons. In Dedicated Servers, the server
completely belongs to a particular organization or a company.

3. Which of the following are the features of cloud computing?


a) Security
b) Availability
c) Large Network Access
d) All of the mentioned
Answer: d
Explanation: One of the important features is security, the data stored is secured and cannot be
accessed by unauthorized parties. In case the user exhausts the storage space allocated, the user can
buy extra storage for a less amount. The data stored can be accessed by any authorized user
anywhere anytime provided the user must have an internet connection and a device.

4. Which of the following is a type of cloud computing service?


a) Service-as-a-Software (SaaS)
b) Software-and-a-Server (SaaS)
c) Software-as-a-Service (SaaS)
d) Software-as-a-Server (SaaS)
Answer: c
Explanation: Software as a Service, is the most widely used choice for enterprises. SaaS makes use
of the internet to offer apps to consumers that are controlled by a third-party vendor.
5. Which of the following is the application of cloud computing?
a) Adobe
b) Paypal
c) Google G Suite
d) All of the above
Answer: d
Explanation: Adobe Creative Cloud is used in the art sector. Paypal is an online payment
application. Google G Suite is the best storage and backup application used by google.

6. Which of the following is an example of the cloud?


a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above
Answer: d
Explanation: Amazon Web Services (AWS), Dropbox, and Cisco WebEx are examples of cloud.

7. Applications and services that run on a distributed network using virtualized resources is known
as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
Answer: d
Explanation: Cloud computing refers to the delivery of services such as storage, servers, databases,
networking, and other functions through the internet without the need for the user to manage them
directly. These applications are accessed by common Internet protocols and networking standards.

8. Which of the following is an example of a PaaS cloud service?


a) Heroku
b) AWS Elastic Beanstalk
c) Windows Azure
d) All of the above
Answer: d
Explanation: PaaS stands for Platform-as-a-Service. In PaaS, the users receive hardware or
software tools from the users on the internet. AWS Elastic Beanstalk, Windows Azure, Heroku are
example of a PaaS service.
9. Which of the following is an example of an IaaS Cloud service?
a) DigitalOcean
b) Linode
c) Rackspace
d) All of the above
Answer: d
Explanation: IaaS stands for Infrastructure-as-a-Service. In IaaS, the users receive computing
resources like software or hardware tools virtually over the internet. DigitalOcean, Linode,
Rackspace are the example of an IaaS service.

10. Which of the following is the correct statement about cloud computing?
a) Cloud computing abstracts systems by pooling and sharing resources
b) Cloud computing is nothing more than the Internet
c) The use of the word “cloud” makes reference to the two essential concepts
d) All of the mentioned

Answer: a
Explanation: Abstraction and Virtualization are the two essential concepts.

11. Point out the wrong statement.


a) Azure enables .NET Framework applications to run over the Internet
b) Cloud Computing has two distinct sets of models
c) Amazon has built a worldwide network of datacenters to service its search engine
d) None of the mentioned
Answer: c
Explanation: Google has built mega data centres for its search engine.

12. Which of the following model attempts to categorize a cloud network based on four
dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
Answer: a
Explanation: Cloud Cube model is mainly used for secure collaboration.

13. Which of the following is the correct statement about cloud types?
a) Cloud Square Model is meant to show is that the traditional notion of a network boundary being
the network’s firewall no longer applies in cloud computing
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
Answer: b
Explanation: Four types of deployment models exist.

14. Which architectural layer is used as a backend in cloud computing?


a) cloud
b) soft
c) client
d) all of the mentioned
Answer: a
Explanation: The cloud creates a system where resources can be pooled and partitioned as needed.

15. All cloud computing applications suffer from the inherent _______ that is intrinsic in their
WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
Answer: c
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, it may not be the best model for you.

16. Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
Answer: b
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility
computing.

17. Which of the following is the correct statement?


a) Cloud computing presents new opportunities to users and developers
b) Service Level Agreements (SLAs) is small aspect of cloud computing
c) Cloud computing does not have impact on software licensing
d) All of the mentioned
Answer: a
Explanation: Because it is based on the paradigm of a shared multi-tenant utility.

18. Which of the following is the wrong statement about cloud computing?
a) Private cloud doesn’t employ the same level of virtualization
b) Data center operates under average loads
c) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
d) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
Answer: a
Explanation: Capacity of the datacenter is fixed by the assets it has.

19. Identify the wrong statement about cloud computing.


a) Virtualization assigns a logical name for a physical resource and then provides a pointer to that
physical resource when a request is made
b) Virtual appliances are becoming a very important standard cloud computing deployment object
c) Cloud computing requires some standard protocols
d) None of the mentioned
Answer: d
Explanation: Many of these protocols are standard Internet protocols.
20. Identify the correct statement about cloud computing.
a) Cloud computing relies on a set of protocols needed to manage interprocess communications
b) Platforms are used to create more complex software
c) Cloud architecture can couple software running on virtualized hardware in multiple locations to
provide an on-demand service
d) All of the mentioned
Answer: d
Explanation: The most commonly used services uses a set of discovery and description protocols
based on WSDL.

21. Point out the wrong statement.


a) Cloud services span the gamut of computer applications
b) The impact of cloud computing on network communication is to discourage the use of open
source network protocols in place of proprietary protocol
c) Atom is a syndication format that allows for HTTP protocols to create and update informations
d) None of the mentioned
Answer: b
Explanation: Microsoft’s ADO.NET Data Services Framework is another system for transferring
data using a RESTful transaction and standard HTTP commands.
22. Which of the following is required by Cloud Computing?
a) That the identity be authenticated
b) That the authentication be portable
c) That you establish an identity
d) All of the mentioned
Answer: d
Explanation: When applied to a number of users in a cloud computing system, these requirements
describe systems that must provision identities.

23. Cloud computing is a concept that involves pooling physical resources and offering them as
which sort of resource?
a) cloud
b) real
c) virtual
d) none of the mentioned
Answer: c
Explanation: Cloud computing means providing services like storage, servers, database,
networking, etc. over the internet. It is a new model for provisioning resources, for staging
applications, and for platform-independent user access to services.

24. Which of the following is the Cloud Platform provided by Amazon?


a) AWS
b) Cloudera
c) Azure
d) All of the mentioned
Answer: a
Explanation: Amazon Web Services (AWS), an Infrastructure as a Service (IaaS) offering that
allows users to rent virtual machines on Amazon’s own infrastructure, is one of the most successful
cloud-based enterprises.

25. Into which expenditures does Cloud computing shifts capital expenditures?
a) local
b) operating
c) service
d) none of the mentioned
Answer: b
Explanation: The nature of the service provider and its connection with its client is changing as a
result of cloud computing.

26. Point out the wrong statement.


a) With a pay-as-you-go, endlessly expandable, and universally available system, cloud computing
realises the long-held goal of utility computing
b) The widespread use of the Internet enables the huge size of cloud computing systems
c) Soft computing represents a significant change in the way computers are delivered
d) All of the mentioned
Answer: c
Explanation: Cloud computing is differentiated by the idea that resources are virtual and infinite,
and that the user is shielded from the specifics of the actual infrastructure on which software
operates.

27. Which of the following is the most essential element in cloud computing by CSA?
a) Virtualization
b) Multi-tenancy
c) Identity and access management
d) All of the mentioned
Answer: b
Explanation: Multi-tenancy refers to hosting shared among multiple customers. Multi-tenancy
introduces a variety of new security problems to cloud computing that must be addressed.

28. Which of the following monitors the performance of the major cloud-based services in real time
in Cloud Commons?
a) CloudWatch
b) CloudSensor
c) CloudMetrics
d) All of the mentioned
Answer: b
Explanation: The Cloud Commons is a new online community founded by CA to promote
information exchange on cloud service and the SMI standard.

29. Which of the following model consists of the service that you can access on a cloud computing
platform?
a) Deployment
b) Service
c) Application
d) None of the mentioned
Answer: b
Explanation: The sort of service that the service provider provides is described by the service
model. Three types of service provided are:
1) Platform-as-a-Service
2) Software-as-a-Service
3) Infrastructure-as-a-Service

30. Which of the following is the most important area of concern in cloud computing?
a) Scalability
b) Storage
c) Security
d) All of the mentioned
Answer: c
Explanation: When your data goes to and is stored on systems that are no longer under your
control, you run the risk of it being intercepted or misused by outsiders. Only an authorized user
can access the save data.

You might also like