Nptel Qu
Nptel Qu
Which of the following fall(s) under the “essential characteristics” of cloud computing?
A. Resource Pooling
B. Measured Service
C. Rapid Elasticity
D. Latency
A. PaaS
B. IaaS
C. SaaS
D. FaaS
A) True
B) False
Network Function Virtualization involves the implementation of _______ function in software that
A. network,software
B. hardware, software
C. hardware, network
D. network,hardware
Which are the following applications for SaaS (Software as a Service) architecture?
A) Billing software
B) CRM
C) App engines
D) None of above
Web access to commercial software is one of the SaaS characteristics in the cloud computing
paradigm.
A. True
B. False
In the case of the client-server model: Statement (i) Virtualization is a core concept; Statement (ii)
A) True
B) False
PaaS (Platform as a Service) brings the benefits: (i) Creation of software (ii) Integration of web
A. Only (i)
B. Only (ii)
d) None of these
a) pricing
b) SLA
c) data
d) service
SOAP (Simple Object Access Protocol) does not restrict the endpoint implementation technology
a) True
b) False
that can rapidly build, modify and provision cyber-physical systems composed of a set
Customized wearable devices for collecting health parameters are the best examples of
a) IoHT
b) Fog device
c) Fog-Cloud interfaced.
d) Cloud-Fog-Edge-IoHT
a) dependant
b) independent
c) partial dependant
d) none of these
a) UDDI
b) SLA
c) HTTP
d) XML
Ass-1
a) Cluster Manager
d) Hypervisor
B. Both ephemeral storage and block storage are accessible from within VM
A task takes time T in a uniprocessor system. In a parallel implementation, the task runs on P
processors parallelly. The parallel efficiency is Eff, where 0<Eff<1. What is the time taken by each
A. M = T
B. M = T/(Eff P) ×
C. M = T/P
D. M = (T Eff)/P ×
QUESTION 3:
What does the term "biasness towards vendors" imply in the context of SLA monitoring?
NPTEL
QUESTION 4:
How does the master node in the Google File System maintain communication with chunk servers?
A. Command messages
B. Update messages
C. Query messages
D. Heartbeat messages
QUESTION 5:
In a cloud, total service uptime is 175 minutes and availability of the service is 0.85. What is the
service downtime?
A. 55 minutes
B. 148.75 minutes
C. 26.25 minutes
D. 45 minutes
QUESTION 6:
Statement 1: In ephemeral storage, the stored objects persist until the VM is terminated.
QUESTION 7:
“Midsize providers can achieve similar statistical economies to an infinitely large provider” Does
A. Correlated demand
B. Dependent demand
C. Independent demand
D. Mixed demand
QUESTION 8:
Let D(t) and R(t) be the instantaneous demand and resources at time t respectively. If demand is
exponential (D(t)=et
), any fixed provisioning interval (tp) according to the current demands will fall
linearly behind.
A. TRUE
B. FALSE
NPTEL
QUESTION 9:
Which of the following is/are expected common SLA parameter(s) for both Software-as-a-Service
A. usability
B. scalability
Ass-1
C. recovery
D. None of these
QUESTION 10:
Data retention and deletion by cloud providers do not fall under one of the SLA requirements.
A. True
B. False
NPTEL
Cloud Computing
Assignment-Week 4
QUESTION 1:
(a) Oracle
(c) MySQL
(d) None
QUESTION 2:
(a) SaaS
(b) PaaS
(c) IaaS
(d) None
QUESTION 3:
Ass-1
(a) Region
(d) None
QUESTION 4:
The OpenStack component - Glance monitors and meters the OpenStack cloud for billing,
a) True
b) False
QUESTION 5:
a) To run your web-application, you need to configure only the Google Storage bucket
b) “gcloud app deploy app.yaml” the command can be used to deploy your app to app-engine
c) After launching your application to app-engine anyone can view the app at
http://[YOUR_PROJECT_ID].appspot.com
d) “gcloud app browse” – can be used to start the local development server for the application
QUESTION 6:
In OpenStack, the different components of Nova (e.g. scheduler, Compute, api etc.) communicates
via:
(b) Neutron
(c) Conductor
(d) Swift
NPTEL
Solution: Nova is comprised of multiple server processes, each performing different functions. The
user-facing interface is a REST API, while internally Nova components communicate via an RPC
QUESTION 7:
(a) Nova
(b) Keystone
(c) Neutron
Correct Answer: c
Solution: Neutron provides the networking capability for OpenStack. It helps to ensure that each of
the components of an OpenStack deployment can communicate with one another quickly and
efficiently.
QUESTION 8:
Cloud DataStore in GCP is a NoSQL document database built for automatic scaling, high
a) True
b) False
Solution: Google Cloud Datastore is a highly scalable, fully managed NoSQL database service
offered by Google on the Google Cloud Platform. Cloud Datastore is built upon Google's Bigtable
QUESTION 9:
a) You can reuse the project ID only after you delete the previous project in GCP
b) A CNAME alias is a DNS record that lets you use a URL from your own domain to access
resources, such as a bucket and objects, in Cloud Storage using your custom domain URL
c) “Multi-Regional” Storage class is used for the bucket to stream videoes and host hot web
d) “Nearline” Storage class is used for the bucket to store data accessed frequently in one part
of the world
Ass-1
Solution: We cannot use the same project ID as it is the unique identifier. Nearline Storage is
appropriate for data backup, disaster recovery, and archival storage while Regional Storage enables
to store data at lower cost and data being stored in a specific regional location, instead of having
NPTEL
QUESTION 10:
Solution: Compute assigns a private IP address to each VM instance. Compute makes a distinction
between fixed IPs and floating IP. Fixed IPs are IP addresses that are assigned to an instance on
creation and stay the same until the instance is explicitly terminated. Floating IPs are addresses that
can be dynamically associated with an instance. A floating IP address can be disassociated and
associated with another instance at any time. A user can reserve a floating IP for their project.
NPTEL
Cloud Computing
Assignment-Week 5
Ass-1
QUESTION 1:
In a SLA negotiation, the provider agreed with the service availability of 98%. The consumer runs
the application for X hours/day. At the end of one month [31 days], the total service outage was 12
a. X is atleast 19.74
b. X is atmost 19.74
c. X is exactly 19.74
d. Insufficient information
Detailed Solution: Total time for which the application will run (in a month)=(X*31) hours Outage
QUESTION 2:
Average resource demand is 45 units,Baseline (owned) unit cost is 200 units,Time is 10 hours,Peak
resource demand is 100 units. If the cloud is cheaper than owning of computer infrastructures, the
utility premium is
c. Atleast 4.45
d. Atmost 4.45
Detailed Solution: CT < BT implies A * U * B * T < P * B * T. Or, A*U < P. Or, U < P/A. Where
A= Average Demand, U= Utility Premium, B=Baseline (owned) unit cost, T=Time, P=Peak
Demand, CT=Cloud cost and BT=Owning cost. Here P=100 units, A=45 units U< P/A implies U<
NPTEL
Ass-1
QUESTION 3:
In computing, there is a linear relationship between the number of processing cores used and
power consumption.
a. TRUE
b. FALSE
QUESTION 4:
The ________ takes a series of key/value pairs, processes each, and generates zero or more output.
a. map function
b. partition function
c. reduce function
d. None of these
Detailed Solution: The map function takes a series of key/value pairs, processes each, and
QUESTION 5:
In a MapReduce framework the HDFS block size is 64 MB. We have 6 files of size 64KB, 65MB,
X MB, Y KB, 67KB and 127MB. 24 blocks are created by Hadoop framework. The size of X and
Y are respectively [one or more than one options may be correct, select all correct options]:
a. 66 and 64
b. 64 and 64
c. 64 and 66
d. 128 and 64
Ass-1
NPTEL
Detailed Solution: The total number of blocks needed for 64 KB, 65 MB, 67 KB, 127 MB is
the number of replicas] Only option b and c are correct as the size requirement can be satisfied with
2 blocks.
QUESTION 6:
a. Network
b. Computer
c. Database
d. Execution
QUESTION 7:
d. None of these
Detailed Solution: When load decreases, VM management can be done by – a) Live migrating
QUESTION 8:
Ass-1
Correspondence between resources required by the users and resources available with the provider
Detailed Solution: Correspondence between resources required by the users and resources
NPTEL
QUESTION 9:
Ability or capacity of that system to adjust the resources dynamically to fulfill the requirements of
a. Resource provisioning
b. Resource adaptation
c. Resource mapping
d. None of these
Detailed Solution: Ability or capacity of that system to adjust the resources dynamically to fulfill
QUESTION 10:
Statement 1: Map operation consists of transforming one set of key-value pairs to another.
Statement 2: Each reducer groups the results of the map step using the same key.
Detailed Solution: Map operation consists of transforming one set of key-value pairs to another.
Each reducer groups the results of the map step using the same key.
Ass-1
NPTEL
Cloud Computing
Assignment- Week 6
__________________________________________________________________________________
_______________________
QUESTION 1:
a) Confidentiality
b) Availability
c) Integrity
d) Authenticity
__________________________________________________________________________________
__________________
QUESTION 2:
a) Different types of cloud computing service models provide different levels of security
services
b) Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in
c) Data should be transferred and stored in an encrypted format for security purpose
Correct Answer: a, b, c
Solution: Cloud computing security or, more simply, cloud security refers to a broad set
of policies, technologies, and controls deployed to protect data, applications, and the
__________________________________________________________________________________
__________________
NPTEL
QUESTION 3:
a) Replay
b) Denial of service
c) Traffic analysis
d) Masquerade
Solution: Traffic analysis is an example of passive attack. Others are active attacks.
__________________________________________________________________________________
__________________
QUESTION 4:
(a) Confidentiality
(b) Availability
(c) Integrity
(d) Authenticity
__________________________________________________________________________________
__________________
Ass-1
QUESTION 5:
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption
illegitimate advantage.
__________________________________________________________________________________
__________________
NPTEL
QUESTION 6:
whether or not an operation is allowed by a certain user. Integrity is the protection against
data alteration/corruption. So the first statement is false and the second statement is true.
__________________________________________________________________________________
__________________
QUESTION 7:
Ass-1
b) Virus Attack
Solution: Access control policies are enforced through a mechanism that translates a
user's access request, often in terms of a structure that a system provides. Virus attack and
man in the middle attack are not related to access control policy.
__________________________________________________________________________________
__________________
QUESTION 8:
a) Confidentiality
b) Integrity
c) Reliability
d) Efficiency
NPTEL
Solution: Confidentiality (keeping data and resources hidden), Integrity and Availability
(enabling access to data and resources) are the major components of security.
__________________________________________________________________________________
__________________
QUESTION 9:
a) Traffic Analysis
c) Denial of service
d) Replay
Ass-1
Solution: Passive attack (Traffic analysis, release of message contents) and Active attack
__________________________________________________________________________________
__________________
QUESTION 10:
Side channel exploitation has the potential to extract RSA & AES secret keys
a) True
b) False
Solution: Cross-VM information leakage due to sharing of physical resource (CPU’s data
caches).
__________________________________________________________________________________
__________________
NPTEL
Cloud Computing
Assignment-Week 7
QUESTION 1:
Correct Answer: (b Correct Answer: (b c) Improves reliability with information backed up and stored
in the cloud
d) None of these
Ass-1
Explanation: The key features of mobile cloud computing are: Facilitates the quick development,
delivery
and management of mobile apps. Improves reliability with information backed up and stored in the
cloud.
QUESTION 2:
d) None of these
Explanation: Dynamic runtime offloading involves the issues of:- runtime application partitioning,
migration of intensive components, continuous synchronization for the entire duration of runtime
execution
platform.
QUESTION 3:
Explanation: Cloudlet reduces the latency in reaching the cloud servers. Cloudlet resides near to the
mobile
devices.
NPTEL
QUESTION 4:
d) None of these
Explanation: MCC reduces the running cost for computation intensive applications.
QUESTION 5:
What is/are true about the execution of services in mobile cloud computing (MCC)?
b) Some services are executed in mobile devices and some services are executed in cloud
d) None of these
Explanation: Some services are executed in mobile devices and some services are executed in cloud.
QUESTION 6:
b) Network routers
c) WiFi Gateways
d) None of these
Explanation: Cellular base stations, network routers as well as WiFi Gateways are fog devices.
QUESTION 7:
d) None of these
Explanation: The advantages of fog computing are:- reduction in data movement across the network
NPTEL
QUESTION 8:
Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end data
service.
Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial
Cloud.
Explanation: Both statements are correct regarding Geospatial Cloud concept. So, the correct option
is (c).
QUESTION 9:
Explanation: Fog nodes present near to the end-user, Fog computing use for real-time applications,
Fog
nodes’ response time is much lower than cloud server, network routers, WiFi Gateways will be
capable of
QUESTION 10:
c) Data services inside cloud can be run through SaaS service model
Explanation: Data services can be inside and/or outside the cloud environment in Geospatial Cloud
Model.
NPTEL
Cloud Computing
Assignment-Week 8
QUESTION 1:
An IoT platform’s basic building blocks is/ are (choose the correct option(s)).
a. Gateway
b. Images
d. Containers
Detailed Solution: An IoT platform has three basic building blocks, Things, Gateway, and Network
QUESTION 2:
a. Docker rm
b. Docker rmi
c. Docker rvi
d. Docker push
Detailed Solution: Docker rmi is used to delete a local image. So, the correct option is (b).
Ass-1
QUESTION 3:
a) True
b) False
Detailed Solution: Docker Hub is a registry used to host various docker images.
NPTEL
QUESTION 4:
__________ enables different networks, spreads in a huge geographical area to connect together
a) Serverless
b) IoT Cloud
c) Sensor Cloud
d) Green Cloud
Detailed Solution: Sensor Cloud enables different networks, spreads in a huge geographical area to
connect together and be employed simultaneously by multiple users on demand. Lecture 38, 20:27
QUESTION 5:
a) Containers
b) Hypervisor
c) Both a and b
d) Images
Detailed Solution: Virtual machines get virtual access to host resources through
QUESTION 6:
Vehicles providing their networking and data processing capabilities to other vehicles through the
Ass-1
a) SaaS
b) PaaS
c) IaaS
d) None of these
Detailed Solution: Vehicles provide their networking and data processing capabilities to other
vehicles through the cloud comes under the Networking and Data processing as a service (IaaS)
QUESTION 7:
Sensor data can be easily shared by different groups of users without any extra effort/ measure.
a. True
b. False
NPTEL
Detailed Solution: One of the limitations of Sensor Networks is “Sensor data can not be easily
shared by different groups of users.” Hence, the correct option is (b). Lecture 38, 9:32 min.
QUESTION 8:
a) True
b) False
QUESTION 9:
In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as
d. None of these
Ass-1
Detailed Solution: In the context of Green Cloud Computing, the Power Usage Effectiveness is
defined as Overall Power / Power Delivered. So, the correct option is (b). Lecture 37, 28:45 min.
QUESTION 10:
Statement 2: Sensor network is still managed from the Sensor-Cloud Interface via Sensor
Network Proxy
Detailed Solution: Sensor cloud proxy exposes sensor resources as cloud services.
Sensor network is still managed from the Sensor-Cloud Interface via Sensor Network Proxy.
NPTEL
Cloud Computing
Assignment- Week 9
QUESTION 1:
a) Fog computing refers to a model where data, processing, and applications are concentrated
b) Fog computing is a term introduced by Cisco Systems to describe a model that centralizes
Ass-1
data processing in the cloud to manage wireless data transfer to distributed IoT devices.
c) Fog computing is a model where data, processing, and applications are concentrated in
devices at the network edge rather than existing almost entirely in the cloud.
d) The vision of fog computing is to enable applications on a few connected devices to run
Detailed Solution: Fog computing is characterized by its focus on edge processing rather than
cloud-centralized processing. Statement C correctly captures this aspect, making it the best
QUESTION 2:
Which of the following challenges is most effectively addressed by using fog and edge computing
cloud-based environments.
b) The inefficiency of processing time-sensitive applications directly in the cloud due to high
c) The need for improved security and privacy features in cloud-based systems, which are not
d) The difficulty in integrating multiple cloud services and platforms for comprehensive IoT
data management.
Detailed Solution: Fog and edge computing offer solutions to the inefficiencies of processing
bandwidth more effectively. Statement B best captures the challenge that fog and edge computing
address.
NPTEL
QUESTION 3:
fog/edge computing?
a) Data Flow
b) Control.
c) Tenancy.
d) Infrastructure.
Detailed Solution: Tenancy is correctly described as the support for hosting multiple applications
QUESTION 4:
Which of the following characteristics is NOT typically associated with fog computing
infrastructure?
d) Support for mobility Detailed Solution: High computational power concentrated solely in the
Cloud is not a
characteristic of fog computing; instead, fog computing distributes computational resources across
edge nodes.
QUESTION 5:
In the fog computing paradigm, which of the following accurately describes the relationship
a) Local analyses are performed exclusively in the Cloud, while global analyses are done at
b) Local and global analyses are performed only in the Cloud data centers.
c) Local analyses are performed at the edge devices, and global analyses can be either
d) Local analyses are conducted by IoT devices, and global analyses are not necessary in fog
computing.
Detailed Solution: Local analyses in fog computing are performed at the edge devices to ensure
Ass-1
low latency and quick processing.Global analyses can be either performed at the edge or forwarded
to the Cloud for further processing, depending on the system's requirements and resource
availability.Local and global analyses are not solely performed in the Cloud; they are distributed
NPTEL
QUESTION 6:
What is the primary goal of the application placement problem in the Cloud-Fog-Edge framework?
a) To map all applications onto the Cloud servers to maximize computational power.
b) To find available resources in the network that satisfy application requirements, respect
components onto infrastructure while considering resource (CPU, RAM), network (latency,
bandwidth), and application constraints (locality, delay sensitivity). The goal is to meet these
constraints and optimize objectives like energy consumption. Application constraints, such as
locality requirements, ensure specific services run in designated locations, making them key factors
QUESTION 7:
Detailed Solution: Locality requirements are application constraints that restrict services to
specific locations, making them key in application placement. In contrast, Option A deals with
resource constraints, Option B with network constraints, and Option D with resource availability,
QUESTION 8:
NPTEL
Detailed Solution:This question highlights the key purpose of offloading, which involves moving
servers, applications, and data closer to the network edge to enhance computing capabilities and
bring services closer to the data source, improving efficiency and reducing latency.
QUESTION 9:
b) To deploy and manage multiple cloud services to meet business needs by collaborating
Detailed Solution: Cloud federation's goal is to efficiently manage and deploy cloud services by
collaborating among multiple CSPs. This enhances capacity utilization, interoperability, and service
QUESTION 10:
b) Increased resource utilization and load balancing across multiple Cloud Service Providers
(CSPs).
Detailed Solution: A key benefit of cloud federation is maximizing resource utilization and
achieving effective load balancing across multiple CSPs, improving efficiency and reliability
NPTEL
Cloud Computing
Assignment- Week 10
QUESTION 1:
b) To efficiently distribute VM load across servers, allowing for system maintenance and
operational efficiency.
Ass-1
Detailed Solution: VM migration is crucial in cloud computing for balancing the workload across
servers, enabling maintenance without downtime, and managing operational parameters like power
consumption. It allows for dynamic allocation of resources to ensure efficient operation and
QUESTION 2:
What is the difference between cold (non-live) and hot (live) VM migration?
a) Cold migration turns off the VM during migration, while hot migration keeps the VM
running.
b) Cold migration keeps the VM running during migration, while hot migration turns off the
VM.
c) Both cold and hot migration suspend the VM during the process.
Detailed Solution: Cold (non-live) migration involves turning off or suspending the VM during the
migration process, whereas hot (live) migration allows the VM to continue running and providing
QUESTION 3:
NPTEL
Detailed Solution: In live VM migration, the two main approaches are pre-copy, where the VM's
memory pages are copied to the destination before the VM is transferred, and post-copy, where the
Ass-1
VM is first transferred to the destination, and then its memory pages are copied over as needed.
QUESTION 4:
Which of the following is a primary concern during VM migration to ensure service continuity?
b) Minimizing both downtime and total migration time, and avoiding unnecessary disruption
of active services
d) Ensuring that the migration process takes as long as possible to ensure stability
Detailed Solution: During VM migration, it's crucial to minimize both the downtime (time
services are unavailable) and the total migration time (time to complete the migration).
Additionally, the process should avoid disrupting active services by managing resource contention
effectively.
QUESTION 5:
Which phase of live VM migration involves suspending the execution of the VM at the source and
copying the remaining dirty pages and CPU state to the destination?
a) Pre-Copy Phase
b) Post-Copy Phase
c) Stop-and-Copy Phase
Detailed Solution: In the Stop-and-Copy Phase of live VM migration, the VM's execution is
suspended at the source, and the remaining dirty pages along with the CPU state are copied to the
QUESTION 6:
What is the primary advantage of the post-copy live memory migration strategy?
a) It avoids copying any memory pages from the source to the destination.
b) It ensures that memory pages are only copied on demand, potentially reducing unnecessary
Ass-1
data transfer.
d) It immediately restarts the VM at the source after copying the CPU state.
NPTEL
Detailed Solution: Post-copy live memory migration copies memory pages only when they are
needed by the VM at the destination, reducing the amount of unnecessary data transfer compared
to
other strategies.
QUESTION 7:
a) Load balancing
b) Fault tolerance
c) Power management
d) Data replication
Detailed Solution: Live VM migration involves requirements such as load balancing, fault
tolerance, power management, and resource sharing to ensure seamless operation and system
QUESTION 8:
In serial VM migration, what happens to the remaining VMs when the first VM enters the
stop-and-copy phase?
Detailed Solution:In serial VM migration, when the first VM enters the stop-and-copy phase, the
Ass-1
remaining VMs are suspended to prevent them from dirtying memory, ensuring a smooth migration
process.
QUESTION 9:
NPTEL
Detailed Solution: Containers are lightweight virtualization techniques that package application
code along with all its dependencies, enabling consistent performance across various computing
environments.
QUESTION 10:
b) To package an application along with its code, runtime, system tools, libraries, and settings
Detailed Solution: A Docker container image is a lightweight, standalone package that includes
everything needed to run an application, such as code, runtime, system tools, libraries, and settings,
NPTEL
Ass-1
Cloud Computing
Assignment-Week 11
QUESTION 1:
Which of the following best describes the key features of dew computing?
Detailed Solution: The correct answer is a) Independence and collaboration because these are
the core principles of dew computing, allowing local devices to operate autonomously while still
QUESTION 2:
b. Developers run their logic as functions, and the cloud provider manages scalability
Detailed Solution: The correct answer is b) Developers run their logic as functions, and the cloud
provider manages scalability because serverless computing allows developers to submit their code
as functions without worrying about infrastructure. The cloud provider automatically handles the
scaling and orchestration, enabling efficient parallel execution of tasks without the need for manual
container management.
Ass-1
QUESTION 3:
NPTEL
Detailed Solution: The correct answer is B) Functions are triggered by events and executed in
functions are only activated in response to specific triggers, such as client requests or external
events. These functions run in isolated environments provided by the FaaS platform, which also
handles the horizontal scaling based on the volume of incoming events. Unlike traditional
applications, FaaS functions are not constantly active, making them efficient for handling specific
QUESTION 4:
management and simplifying development because serverless computing removes the need for
developers to manage servers, allowing them to focus on writing code. This shift makes cloud
development easier and more accessible for programmers, while the cloud provider handles the
operational responsibilities.
Ass-1
QUESTION 5:
c) You upload code and AWS Lambda handles execution and scaling based on events.
Detailed Solution: AWS Lambda allows you to focus on writing code while it manages execution,
scaling, and resource provisioning based on event triggers, simplifying cloud computing tasks.
NPTEL
QUESTION 6:
What does Google Cloud Functions primarily handle in terms of execution environment?
Detailed Solution: Google Cloud Functions operates in a fully managed environment, meaning
developers do not need to provision or manage servers, and the platform automatically handles
scaling.
QUESTION 7:
Detailed Solution: Azure Functions allows developers to focus on writing code and configuring
Ass-1
QUESTION 8:
What is one major challenge of using renewable energy sources in cloud datacenters?
Detailed Solution:Renewable energy sources face challenges such as high initial costs and
QUESTION 9:
What is the primary focus of the power manager component in a sustainable cloud computing
datacenter?
NPTEL
Detailed Solution: The power manager in a sustainable cloud computing datacenter is primarily
responsible for managing the power supply, including balancing energy sources from renewables
QUESTION 10:
Which component of sustainable cloud computing aims to balance the temperature in cloud
a. Application Design
Ass-1
b. Capacity Planning
c. Cooling Management
d. Renewable Energy
Detailed Solution: Cooling Management focuses on maintaining the temperature within cloud
datacenters to ensure energy efficiency, as excessive heat can increase energy consumption and
affect performance.
NPTEL
Cloud Computing
Assignment-Week 12
QUESTION 1:
According to the given definition, which of the following statement(s) is (are) true about dew
computing?
a. Dew computing is a cloud computing paradigm where all computing is done on the cloud
c. Dew computing is a paradigm where on-premises computers and cloud services are
completely isolated from each other and do not collaborate in any way.
Detailed Solution: According to the definition given, dew computing is a paradigm where
Ass-1
on-premises computers provide functionality that is independent of cloud services and is also
QUESTION 2:
Detailed Solution: Refer slide 6 of Module 12: Cloud Computing Paradigms; Lecture 57.
QUESTION 3:
What is the benefit of 5G's ability to scale down in data rates, power, and mobility for IoT devices?
NPTEL
in virtually everything through the ability to scale down in data rates, power, and
QUESTION 4:
a. True
b. False
Ass-1
QUESTION 5:
What is(are) the key feature(s) of Mobile Cloud computing for 5G networks?
d. None of these
Detailed Solution: Key features of MCC for 5G networks include sharing resources for mobile
applications and improved reliability as data is backed up and stored in the cloud.
QUESTION 6:
Mobility Analytics utilizes the cloud platform for computation and storage.
A) True
B) False
NPTEL
Detailed Solution: Mobility Analytics utilizes a Cloud platform for computation and storage.
QUESTION 7:
In which computing environment is latency fixed due to the location of application modules at the
Area Gateway?
a. Fog computing
b. Cloud computing
c. Serverless Computing
Ass-1
Detailed Solution: In fog computing environment is latency fixed due to the location of application
QUESTION 8:
Detailed Solution: On-premises and edge data centers will continue to close the gap between
resource-constrained low-latency devices and distant cloud data centers, leading to driving the
QUESTION 9:
Customized wearable devices for collecting health parameters are the best examples of
a. IoHT
b. Fog device
c. Fog-Cloud interfaced.
d. Cloud-Fog-Edge-IoHT
Detailed Solution: Customized wearable devices for collecting health parameters are the best
examples of Cloud-Fog-Edge-IoHT.
NPTEL
QUESTION 10:
a. True
b. False
Detailed Solution: The cyber-physical system involves transdisciplinary approaches, merging the
NPTEL