0% found this document useful (0 votes)
105 views10 pages

Assignment 1

Uploaded by

madhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views10 pages

Assignment 1

Uploaded by

madhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Assignment-1

1. Which of the following fall(s) under the “essential characteristics” of cloud computing?
A. Resource Pooling B. Measured Service C. Rapid Elasticity D. Latency
Detailed Solution: cloud computing is a model for on-demand network access to a shared pool of
configurable computing resources that can provide rapid elasticity. It provides automatic control
and optimizes resource use by leveraging a metering capability.
2: “Google Doc” is an example of
A. PaaS B. IaaS C. SaaS D. FaaS
Detailed Solution: Google Slide is a provider’s application that runs on Google Cloud. The
application can be accessed from various client terminals through a client interface, say a web
browser. So, It is a Software as a Service (SaaS) model.
3: Business-Process-as-a-Service is not a part of XaaS.
A) True B) False
Detailed Solution: Business-Process-as-a-Service is a part of XaaS (Anything-as-a-Service).
4: Network Function Virtualization involves the implementation of _______ function in software
that can run on a range of industry-standard servers ______________.
A. network,software B. hardware, software C. hardware, network D. network,hardware
Detailed Solution: Network Function Virtualization involves the implementation of network
function in software that can run on a range of industry-standard servers hardware.
5: Which are the following applications for SaaS (Software as a Service) architecture?
A) Billing software B) CRM C) App engines D) None of above
Detailed Solution: SaaS is useful for Billing and CRM software. PassS is useful for app engines.
6: Web access to commercial software is one of the SaaS characteristics in the cloud computing
paradigm.
A. True B. False
Detailed Solution: Web access to commercial software is one of the SaaS characteristics in the
cloud computing paradigm.
7: In the case of the client-server model: Statement (i) Virtualization is a core concept; Statement
(ii)system can scale infinitely
A) Only Statement (i) is correct B) Only Statement (ii) is correct
C) Both Statements (i) and (ii) are correct D) None of the statements is correct
Detailed Solution: In the case of the client-server model: there is no concept of virtualization; the
system can scale up to a certain extent.
8: Client-server model is always load-balanced
A) True B) False
Detailed Solution: The Client-server model may or may not be load-balanced
9: PaaS (Platform as a Service) brings the benefits: (i) Creation of software (ii) Integration of web
services and databases
A. Only (i) B. Only (ii) C. Both (i) and (ii) D. Neither (i) nor (ii)
Detailed Solution: PaaS is a computing platform that allows developers to quickly create software
or online applications by connecting web services and databases.
10:Which of the following is false?
a) Private cloud is dedicated solely to an organization.b) Community cloud is a composition
of public and private cloud. c) Public cloud is available to the general public.d) None of
these

Detailed Solution: Community cloud is shared by several organizations and serves a specific goal.
Assignment-2
1: Service-Oriented Architecture (SOA) possess:
a)A service provider, service requestor and service broker b)A service provider and service
requestor c)A service requestor and service broker d)Only a service broker
Detailed Answer: Service-Oriented Architecture (SOA) possesses: A service provider, service
requestor and service broker
2: XML is designed to describe _________.
a)pricing b)SLA c)data d)service
Detailed Answer: XML is designed to describe data.
3: SOAP (Simple Object Access Protocol) does not restrict the endpoint implementation technology
choices. SOAP is a platform-neutral choice.
a)True b)False
Detailed Answer: SOAP does not restrict the endpoint implementation technology choices. SOAP
is platform-neutral choice.
4: A Cyber‐Physical Cloud Computing (CPCC) architectural framework is a ________environment
that can rapidly build, modify and provision cyber‐physical systems composed of a set
of__________ based sensor, processing, control, and data services.
a) system, cloud computing b) cloud computing, system
c) system, edge computing d) edge, system computing
Detailed Solution: A Cyber‐Physical Cloud Computing (CPCC) architectural framework can be
defined as “a system environment that can rapidly build, modify and provision cyber‐physical
systems composed of a set of cloud computing based sensor, processing, control, and data
services.”
5: Network Virtualization is a _________ environment that allows _______ service providers to
dynamically compose ____________virtual networks.
a) networking, single, single b) physical, single, multiple c) networking, multiple, single
d) networking, multiple, multiple
Detailed Answer: Network Virtualization is a networking environment that allows multiple service
providers to dynamically compose multiple virtual networks.
6: Customized wearable devices for collecting health parameters are the best examples of
a) IoHT b) Fog device c) Fog-Cloud interfaced. d) Cloud-Fog-Edge-IoHT
Detailed Solution: Customized wearable devices for collecting health parameters are the best
examples of Cloud-Fog-Edge-IoHT.
7: Dew Computing is a paradigm where on-premises computers provide functionality that is
_________ of cloud services and is also collaborative with cloud services
a) dependant b) independent c) partial dependant d) none of these
Detailed Solution: According to the definition given, dew computing is a paradigm where
on-premises computers provide functionality that is independent of cloud services and is also
collaborative with cloud services.
8: SOAP uses ______ as transport protocol
a) UDDI b) SLA c) HTTP d) XML
Detailed Solution: SOAP uses HTTP as transport protocol.
9: Virtual Machine Monitor is also known as
a) Cluster Manager b) Virtual Machine Handler c) Virtual Machine Manager d) Hypervisor
Detailed Answer: The hypervisor is also known as Virtual Machine Monitor
10: Which of the following is/are XML parser API(s)?
a) XaaS (Anything as a Model) b) SAX (Simple API to XML)
c) CLI (Command Line Interface) d) DOM (Document Object Model)
Detailed Answer: DOM and SAX are two of the three generic parser APIs. They read XML data,
check for syntax, and make data available to an application.
Assignment-3
1:Which of the following statement(s) regarding OpenStack storage is/are right?
A. Object storage is managed by Cinder B. Both ephemeral storage and block storage are
accessible from within VM C. Block storage persists until VM is terminated
D. Ephemeral storage is used to run operating system and/or scratch space
Detailed Answer: Object storage is managed by Swift. Block storage persists until specifically
deleted by the user. Thus, statements A and C are false.
2:A task takes time T in a uniprocessor system. In a parallel implementation, the task runs on P
processors parallelly. The parallel efficiency is Eff, where 0<Eff<1. What is the time taken by each
processor (M) in this implementation?
A. M = T B. M = T/(Eff×P) C. M = T/P D.M = (T×Eff)/P
Detailed Answer: According to the question, parallel efficiency (Eff) is less than 1. Therefore, the
time taken by each processor will be greater than the ideal T/P, and M = T/(Eff×P).
3: What does the term "biasness towards vendors" imply in the context of SLA monitoring?
A. Vendor-driven selection of monitoring parameters B.Customer-driven selection of
monitoring parameters C. Balanced approach in monitoring parameters
D. Lack of active monitoring on the customer's side
Detailed Solution: Biasness towards vendors means measurement of parameters is mostly
established according to vendor advantage or in other words vendor-driven selection of monitoring
parameters
4: How does the master node in the Google File System maintain communication with chunk
servers?
A. Command messages B. Update messages C. Query messages D. Heartbeat messages
Detailed Solution: In GFS, master maintains regular communication with chunk servers by
Heartbeat messages
5:In a cloud, total service uptime is 175 minutes and availability of the service is 0.85. What is the
service downtime?
A. 55 minutes B. 148.75 minutes C. 26.25 minutes D. 45 minutes
Detailed Answer: Availability = 1 – (downtime/uptime).
Downtime = Uptime×(1-Availability) = 175*(1-0.85) = 26.25 minutes.
6:Statement 1: In ephemeral storage, the stored objects persist until the VM is terminated.
Statement 2: The ephemeral storage is managed by Cinder in OpenStack.
A. Statement 1 is TRUE, Statement 2 is FALSE B. Statement 2 is TRUE, Statement 1 is
FALSE
C. Both statements are TRUE D. Both statements are FALSE
Detailed Solution: Ephemeral storage is managed by NOVA in OpenStack.
7:“Midsize providers can achieve similar statistical economies to an infinitely large provider” Does
this fall under?
A. Correlated demand B. Dependent demandC. Independent demand D. Mixed demand
Detailed Answer: Midsize providers can achieve similar statistical economies to an infinitely large
provider–independent demands.
8:Let D(t) and R(t) be the instantaneous demand and resources at time t respectively. If demand is
exponential (D(t)=et), any fixed provisioning interval (tp) according to the current demands will fall
linearly behind.
A. TRUE B. FALSE
Detailed Answer: If demand is exponential (D(t)=et), any fixed provisioning interval (tp)
according to the current demands will fall exponentially behind.
9: Which of the following is/are expected common SLA parameter(s) for both Software-as-a-
Service
and Storage-as-a-Service models?
A. usability B. scalability C. recovery D. None of these
Detailed Answer: Scalability is common among the options.
10:Data retention and deletion by cloud providers do not fall under one of the SLA requirements.
A. True B. False
Detailed Answer: Some cloud providers have legal requirements of retaining data even of it has
been deleted by the consumer. Hence, they must be able to prove their compliance with these
policies.
Assignment-4
1:SQL Azure is a cloud-based relational database service that is based on:
(a) Oracle (b) SQL Server (c) MySQL (d) None
Solution: SQL Azure is Microsoft's cloud database service based on SQL Server database
technology and built on Microsoft's Windows Azure cloud computing platform
2: Microsoft Azure provides
(a) SaaS (b) PaaS (c) IaaS (d) None
Solution: Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud
computing platform. It provides a range of cloud services, including those for compute, analytics,
platform, storage and networking
3: Azure App Service plan defines
(a) Region (b) Instance size (c) Scale count (d) None
Solution: An App Service plan defines a set of compute resources for a web app to run. Each App
Service plan defines:I. Region (West US, East US, etc.) II. Number of VM instances
III. Size of VM instances (Small, Medium, Large)
IV. Pricing tier (Free, Shared, Basic, Standard, Premium, PremiumV2, Isolated, Consumption)
4: The OpenStack component - Glance monitors and meters the OpenStack cloud for billing,
benchmarking. State True of False.
a) True b) False
Solution: Glance image services include discovering, registering, and retrieving virtual machine
images. Ceilometer provides telemetry services, which allow the cloud to provide billing services
to individual users of the cloud.
5: GCP: Choose the correct option(s)
a) To run your web-application, you need to configure only the Google Storage bucket
b) “gcloud app deploy app.yaml” the command can be used to deploy your app to app-engine
c) After launching your application to app-engine anyone can view the app at
http://[YOUR_PROJECT_ID].appspot.com
d) “gcloud app browse” – can be used to start the local development server for the application
Solution: a) is wrong because you can’t run your web-app only configuring storage bucket, you
need a PaaS configuration. Option d) is incorrect as that command is used to view web-app.
6: In OpenStack, the different components of Nova (e.g. scheduler, Compute, api etc.)
communicates via:
(a) Message Queues (b) Neutron (c) Conductor (d) Swift
Solution: Nova is comprised of multiple server processes, each performing different functions. The
user-facing interface is a REST API, while internally Nova components communicate via an RPC
message passing mechanism
7: In OpenStack, __________ is a system for managing networks and IP addresses.
(a) Nova (b) Keystone (c) Neutron (d) None of these
Solution: Neutron provides the networking capability for OpenStack. It helps to ensure that each of
the components of an OpenStack deployment can communicate with one another quickly and
efficiently.
8: Cloud DataStore in GCP is a NoSQL document database built for automatic scaling, high
performance, and ease of application development
a) True b) False
Solution: Google Cloud Datastore is a highly scalable, fully managed NoSQL database service
offered by Google on the Google Cloud Platform. Cloud Datastore is built upon Google's Bigtable
and Megastore technology.
9: GCP: Which one is/are correct statement(s)?
a) You can reuse the project ID only after you delete the previous project in GCP
b) A CNAME alias is a DNS record that lets you use a URL from your own domain to access
resources, such as a bucket and objects, in Cloud Storage using your custom domain URL
c) “Multi-Regional” Storage class is used for the bucket to stream videos and host hot web
content accessed frequently around the world
d) “Nearline” Storage class is used for the bucket to store data accessed frequently in one part of the
world
Solution: We cannot use the same project ID as it is the unique identifier. Nearline Storage is
appropriate for data backup, disaster recovery, and archival storage while Regional Storage enables
to store data at lower cost and data being stored in a specific regional location, instead of having
redundancy distributed over a large geographic area.
10: OpenStack: Which IP use is preferred for transferring data to a VM from
(i) Another VM in the same cloud (ii) One organization's network-
(a) i. Floating IP, ii. Private IP (b) i. Private IP, ii. Floating IP
(c) Floating IP in both cases (d) Private IP in both cases
Correct Answer: b
Solution: Compute assigns a private IP address to each VM instance. Compute makes a distinction
between fixed IPs and floating IP. Fixed IPs are IP addresses that are assigned to an instance on
creation and stay the same until the instance is explicitly terminated. Floating IPs are addresses that
can be dynamically associated with an instance. A floating IP address can be disassociated and
associated with another instance at any time. A user can reserve a floating IP for their project.
Assignment- 5
1: In a SLA negotiation, the provider agreed with the service availability of 98%. The consumer
runs
the application for X hours/day. At the end of one month [31 days], the total service outage was 12
hrs. However, SLA negotiation (in terms of service availability) is honored.
a. X is atleast 19.74 b. X is atmost 19.74 c. X is exactly 19.74 d. Insufficient information
Detailed Solution: Total time for which the application will run (in a month)=(X*31) hours Outage
time=12 hours Therefore, service duration=(X*31-12) hours % Availability=(1- outage time/service
duration)*100 %=(1-(12/(X*31-12)))*100 % Initial service guarantee=98% As, final service
availability>= initial service guarantee 98<=(1-(12/(X*31-12)))*100 or, X>=19.74
2: Average resource demand is 45 units,Baseline (owned) unit cost is 200 units,Time is 10
hours,Peak
resource demand is 100 units. If the cloud is cheaper than owning of computer infrastructures, the
utility premium is
a. Greater than 2.22 b. Less than 2.22 c. Atleast 4.45 d. Atmost 4.45
Detailed Solution: CT < BT implies A * U * B * T < P * B * T. Or, A*U < P. Or, U < P/A. Where
A= Average Demand, U= Utility Premium, B=Baseline (owned) unit cost, T=Time, P=Peak
Demand, CT=Cloud cost and BT=Owning cost. Here P=100 units, A=45 units U< P/A implies U<
100/45 or, U < 2.22
3: In computing, there is a linear relationship between the number of processing cores used and
power consumption.
a. TRUE b. FALSE
Detailed Solution: Refer to slide 10 of resource management-I.
4: The ________ takes a series of key/value pairs, processes each, and generates zero or more
output.
a. map function b. partition function c. reduce function d. None of these
Detailed Solution: The map function takes a series of key/value pairs, processes each, and
generates zero or more output.
5: In a MapReduce framework the HDFS block size is 64 MB. We have 6 files of size 64KB,
65MB,
X MB, Y KB, 67KB and 127MB. 24 blocks are created by Hadoop framework. The size of X and
Y are respectively [one or more than one options may be correct, select all correct options]:
a. 66 and 64 b. 64 and 64 c. 64 and 66 d. 128 and 64
Detailed Solution: The total number of blocks needed for 64 KB, 65 MB, 67 KB, 127 MB is
(1+2+1+2)*3=18 [3 is the number of replicas] Number of remaining blocks=(24-18)/3=6/3=2 [3 is
the number of replicas] Only option b and c are correct as the size requirement can be satisfied with
2 blocks.
6: Which among the following is/are logical resource(s)?
a. Network b. Computer c. Database d. Execution
Detailed Solution: Execution is a logical resource.
7: When load decreases, VM management can be done by
a. Live migrate VMs to more utilized nodes b. Shutdown unused nodes
c. Migrate VMs to less utilized nodes d. None of these
Detailed Solution: When load decreases, VM management can be done by – a) Live migrating
VMs to more utilized nodes b) Shutting down unused nodes
8: Correspondence between resources required by the users and resources available with the
provider
is known as a. Resource provisioning b. Resource adaptation c. Resource mapping d. None of
these
Detailed Solution: Correspondence between resources required by the users and resources
available with the provider is known as resource mapping.
9: Ability or capacity of that system to adjust the resources dynamically to fulfill the requirements
of
the user is known as
a. Resource provisioning b. Resource adaptation c. Resource mapping d. None of these
Detailed Solution: Ability or capacity of that system to adjust the resources dynamically to fulfill
the requirements of the user is known as resource adaptation.
10:Statement 1: Map operation consists of transforming one set of key-value pairs to another.
Statement 2: Each reducer groups the results of the map step using the same key.
a. Both statements are true b. Both statements are false
c. Statement 1 is true and Statement 2 is false d. Statement 1 is false and Statement 2 is true
Detailed Solution: Map operation consists of transforming one set of key-value pairs to another.
Each reducer groups the results of the map step using the same key.
Assignment- 6

1: Interception is considered as an attack on


a) Confidentiality b) Availability c) Integrity d) Authenticity
Solution: Interception security attack is attack on confidentiality
2: Find the correct statement(s):
a) Different types of cloud computing service models provide different levels of security
services
b) Adapting your on-premises systems to a cloud model requires that you determine what
security mechanisms are required and mapping those to controls that exist in your chosen
cloud service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All are incorrect statements
Solution: Cloud computing security or, more simply, cloud security refers to a broad set of policies,
technologies, and controls deployed to protect data, applications, and the associated infrastructure
of cloud computing
3: Which of the following is/are example(s) of passive attack?
a)Replay b)Denial of service c)Traffic analysis d)Masquerade
Solution: Traffic analysis is an example of passive attack. Others are active attacks.
4: Modification is considered as an attack on
(a)Confidentiality (b)Availability (c)Integrity (d)Authenticity
Solution: Modification security attack is attack on integrity
5: Spoofing is not an example of
(a)Deception (b)Disclosure (c)Usurpation (d)Disruption
Solution: In the context of network security, a spoofing attack is a situation in which aperson or
program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
6: Consider the following statements:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
Identify the correct options:
a) Statement I is TRUE and statement II is FALSE. b) Statement I is FALSE and statement II is
TRUE. c) Both statements are TRUE. d) Both statements are FALSE.
Solution: Refer slide no. 18 of Cloud-Security I. Authorization is the determination of whether or
not an operation is allowed by a certain user. Integrity is the protection against data
alteration/corruption. So the first statement is false and the second statement is true.
7: Access policy control refers to
a) Cyclic Inheritance Control b) Virus Attack c) Violation of SoD (separation of duties)
Constraint d) Man in the middle attack
Solution: Access control policies are enforced through a mechanism that translates a user's access
request, often in terms of a structure that a system provides. Virus attack and man in the middle
attack are not related to access control policy.
8: Which of the options is/are considered as the basic components of security?
a) Confidentiality b) Integrity c) Reliability d) Efficiency
Solution: Confidentiality (keeping data and resources hidden), Integrity and Availability (enabling
access to data and resources) are the major components of security.
9: Which of the following is/are not a type of passive attack?
a) Traffic Analysis b) Release of message contents c) Denial of service d) Replay
Correct Answer: c, d
Solution: Passive attack (Traffic analysis, release of message contents) and Active attack (Denial of
service, Modification, Masquerade and Replay)
10: Side channel exploitation has the potential to extract RSA & AES secret keys
a) True b) False
Solution: Cross-VM information leakage due to sharing of physical resource (CPU’s data caches).
Assignment-7
1: The key features of mobile cloud computing (MCC) are
a)Facilitates the quick development, delivery and management of mobile apps
b)Uses more device resources because applications are cloud-supported
c)Improves reliability with information backed up and stored in the cloud
d)None of these
Explanation: The key features of mobile cloud computing are: Facilitates the quick development,
delivery and management of mobile apps. Improves reliability with information backed up and
stored in the cloud.
2: Dynamic runtime offloading involves the issues of
a)Runtime application partitioning b)Migration of intensive components
c)Continuous synchronization for the entire duration of runtime execution platform
d)None of these
Explanation: Dynamic runtime offloading involves the issues of:- runtime application partitioning,
migration of intensive components, continuous synchronization for the entire duration of runtime
execution platform.
QUESTION 3: What is/are true about cloudlet?
a)Increases the latency in reaching the cloud servers b)Reduces the latency in reaching the cloud
servers c)Resides far from the mobile devices d)Resides near to the mobile devices
Explanation: Cloudlet reduces the latency in reaching the cloud servers. Cloudlet resides near to the
mobile devices.
4: What is/are true about mobile cloud computing (MCC)?
a) MCC increases the running cost for computation intensive applications
b) MCC reduces the running cost for computation intensive applications
c) MCC decreases battery lifetime d) None of these
Explanation: MCC reduces the running cost for computation intensive applications.
5: What is/are true about the execution of services in mobile cloud computing (MCC)?
a) All services are executed in cloud
b) Some services are executed in mobile devices and some services are executed in cloud
c) All computation intensive services are executed in mobile devices
d) None of these
Explanation: Some services are executed in mobile devices and some services are executed in
cloud.
6: What of the following is/are fog device(s)?
a) Cellular base stations b) Network routers c) WiFi Gateways d) None of these
Explanation: Cellular base stations, network routers as well as WiFi Gateways are fog devices.
7: What is/are the advantage(s) of fog computing?
a) Reduction in data movement across the network resulting in reduced congestion
b) Increase in data movement across the network resulting in increased congestion
c) Serving the real-time applications d) None of these
Explanation: The advantages of fog computing are:- reduction in data movement across the
network resulting in reduced congestion, serving the real- time applications.
8: Consider the following statements:
Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end data
service.
Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial
Cloud.
a) Statement 1 is Correct, but Statement 2 is Incorrect. b) Statement 2 is Correct, but Statement 1 is
Incorrect. c) Both statements are Correct. d) Both statements are Incorrect
Explanation: Both statements are correct regarding Geospatial Cloud concept. So, the correct
option is (c).
9: Which of the following statement(s) is/are FALSE about Fog Computing?
a) Fog nodes present near to the end-user b) Fog computing enables real-time applications
c) Fog nodes’ response time is much higher than Cloud’s
d) Network routers, WiFi Gateways will not be capable of running applications
Explanation: Fog nodes present near to the end-user, Fog computing use for real-time applications,
Fog nodes’ response time is much lower than cloud server, network routers, WiFi Gateways will be
capable of running applications. So, the correct options are (c), (d).
10: Which of the following is/are true about Geospatial Cloud Model?
a) It integrates data from homogeneous back-end data services
b) Data services can be inside and/or outside the cloud environment
c) Data services inside cloud can be run through SaaS service model
d) None of the above
Explanation: Data services can be inside and/or outside the cloud environment in Geospatial Cloud
Model.

Assignment-8
1:An IoT platform’s basic building blocks is/ are (choose the correct option(s)).
a. Gateway b. Images c. Network and Cloud d. Containers
Detailed Solution: An IoT platform has three basic building blocks, Things, Gateway, and Network
and Cloud.
2:__________ is used to delete a local image.
a. Docker rm b. Docker rmi c. Docker rvi d. Docker push
Detailed Solution: Docker rmi is used to delete a local image. So, the correct option is (b).
3:Docker Hub is a registry used to host various docker images.
a) True b) False
Detailed Solution: Docker Hub is a registry used to host various docker images.
4:__________ enables different networks, spreads in a huge geographical area to connect together
and be employed simultaneously by multiple users on demand.
a) Serverless b) IoT Cloud c) Sensor Cloud d) Green Cloud
Detailed Solution: Sensor Cloud enables different networks, spreads in a huge geographical area to
connect together and be employed simultaneously by multiple users on demand.
5:Virtual machines get virtual access to host resources through a ________
a) Containers b) Hypervisorc) Both a and b d) Images
Detailed Solution: Virtual machines get virtual access to host resources through a hypervisor.
6: Vehicles providing their networking and data processing capabilities to other vehicles through
the
cloud comes under which service of IoT-based Vehicular Data Clouds.
a) SaaS b) PaaS c) IaaS d) None of these
Detailed Solution: Vehicles provide their networking and data processing capabilities to other
vehicles through the cloud comes under the Networking and Data processing as a service (IaaS)
7:Sensor data can be easily shared by different groups of users without any extra effort/ measure.
a. True b. False
Detailed Solution: One of the limitations of Sensor Networks is “Sensor data can not be easily
shared by different groups of users.” Hence, the correct option is (b).
8: Container is a compile time instance of an image.
a) True b) False
Detailed Solution::Container is a run time instance of an image.
9: In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as
a. Power Delivered / Overall Power b. Overall Power / Power Delivered
c. Overall Power * Power Delivered d. None of these
Detailed Solution: In the context of Green Cloud Computing, the Power Usage Effectiveness is
defined as Overall Power / Power Delivered. So, the correct option is (b)..
10: Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud services.
Statement 2: Sensor network is still managed from the Sensor-Cloud Interface via Sensor
Network Proxy
a. Statement 1 is True and Statement 2 is False b. Statement 2 is True and Statement 1 is False
c. Both statements are True d. Both statements are False
Detailed Solution: Sensor cloud proxy exposes sensor resources as cloud services.
Sensor network is still managed from the Sensor-Cloud Interface via Sensor Network Proxy.

You might also like