Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CS 8791 Cloud Computing Internal3

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Year &Dept :IV CSE & IT Subject Name : Cloud computing

Subject Code : CS 8791

Part A

1. Which of the following algorithm is used by Google to determine the importance of a


particular page?
a) SVD
b) PageRank
c) FastMap
d) All of the mentioned

2. Point out the correct statement.


a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as
a Service model
b) Applications built using PaaS tools need to be standards-based
c) In Wolf, the data and transaction management conforms to the business rules you create
d) All of the mentioned

3. Which of the following figure correctly describe major features provided by Google App
Engine?

a) 

b) 
 
d) All of the mentioned

4. Based on PageRank algorithm, Google returns __________ for a query that is parsed for
its keywords.
a) SEP
b) SAP
c) SERP
d) Business Objects Build

5. Which of the following protocol lets a Web site list in an XML file information?
a) Sitemaps
b) Mashups
c) Hashups
d) All of the mentioned

6. Dynamic content presented in Google _______ crawling isn’t normally indexed.


a) AJAX
b) Java
c) Javascript
d) All of the mentioned

7. Which of the following google product sends you periodic email alerts based on your
search term?
a) Alerts
b) Blogger
c) Calendar
d) All of the mentioned

8. Which of the following is a payment processing system by Google?


a) Paytm
b) Checkout
c) Code
d) All of the mentioned

9. As compared to RDBMS, Hadoop


A - Has higher data Integrity.
B - Does ACID transactions
C - IS suitable for read and write many times
D - Works better on unstructured and semi-structured data.

10. In the local disk of the namenode the files which are stored persistently are −
A - namespace image and edit log
B - block locations and namespace image
C - edit log and block locations
D - Namespace image, edit log and block locations.

11. What is are true about HDFS?


A - HDFS filesystem can be mounted on a local client’s Filesystem using NFS.
B - HDFS filesystem can never be mounted on a local client’s Filesystem.
C - You can edit a existing record in HDFS file which is already mounted using NFS.
D - You cannot append to a HDFS file which is mounted using NFS.

12. The information mapping data blocks with their corresponding files is stored in
A - Data node
B - Job Tracker
C - Task Tracker
D - Namenode

13.The nature of hardware for the namenode should be


A - Superior than commodity grade
B - Commodity grade
C - Does not matter
D - Just have more Ram than each of the data nodes

14. The inter process communication between different nodes in Hadoop uses
A - REST API
B - RPC
C - RMI
D - IP Exchange

15. The purpose of starting namenode in the recovery mode is to


A - Recover a failed namenode
B - Recover a failed datanode
C - Recover data from one of the metadata storage locations
D - Recover data when there is only one metadata storage location

16. In a HDFS system with block size 64MB we store a file which is less than 64MB. Which
of the following is true?
A - The file will consume 64MB
B - The file will consume more than 64MB
C - The file will consume less than 64MB.
D - Can not be predicted.

17. Which one of the following nodes manages other nodes?


A - Name node
B - Data node
C - slave node
D - None of these

18. Which of the following service provider provides the least amount of built in security?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

19. Point out the correct statement.


a) Different types of cloud computing service models provide different levels of security
services
b) Adapting your on-premises systems to a cloud model requires that you determine what
security mechanisms are required and mapping those to controls that exist in your chosen
cloud service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All of the mentioned

20. Which of the following services that need to be negotiated in Service Level Agreements?
a) Logging
b) Auditing
c) Regulatory compliance
d) All of the mentioned

21. Point out the wrong statement.


a) You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
b) Any distributed application has a much greater attack surface than an application that is
closely held on a Local Area Network
c) Cloud computing doesn’t have vulnerabilities associated with Internet applications
d) All of the mentioned

22. Which of the following area of cloud computing is uniquely troublesome?


a) Auditing
b) Data integrity
c) e-Discovery for legal compliance
d) All of the mentioned

23. Which of the following is the operational domain of CSA?


a) Scalability
b) Portability and interoperability
c) Flexibility
d) None of the mentioned

24. Which of the following is considered an essential element in cloud computing by CSA?
a) Multi-tenancy
b) Identity and access management
c) Virtualization
d) All of the mentioned

25. Which of the following is used for Web performance management and load testing?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems

Part B

1. Which of the following is cloud platform by Amazon?


a) Azure
b) AWS
c) Cloudera
d) All of the mentioned

2. SWIGGY. In formed a cloud for its all branched but due to its limited resources it obtained
the services of AWS for extended provisioning and thus modified its cloud; The cloud so
formed is the example of _____________
a) Private Cloud
b) Public Cloud
c) Hybrid Cloud
d) Community Cloud

3. Which of the following is best known service model?


a) SaaS
b) Iaas
c) Paas
d) All of the mentioned

4. Point out the wrong statement:


a) The vendor is responsible for all the operational aspects of the service
b) The customer is responsible only for his interaction with the platform
c) Google’s App Engine platform is PaaS offering
d) Saas require specific application to be accessed globally over the internet.

5._________Provides virtual machines,virtual storage,virtual infrastructure ,and other


hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

6) Which of the following is owned by organization selling cloud services?


a) Public
b) Private
c) Community
d) Hybrid

7) All Cloud computing applications suffer from the inherent____ that is intrinsic in their
WAN connectivity.
a) propogation
b) latency
c) noise
d) None of the mentioned

8) Which of the following is specified parameter of SLA?


a) Response Times
b) Responsibilities of each party
c) Warranties
d) All of the mentioned

9)_______enables batch processing,which greatly speeds up high-processing applications


a) Scalability
b) Reliability
c) Elasticity
d) Utility

10)Cloud computing shifts capital expenditures into ______expenditures


a) operating
b) service
c) local
d) none of the mentioned

11) Cloud Computing is also a good option whwn the cost of infrastructure and management
is ____
a) low
b) high
c) moderate
d) none of the mentioned

12)Which of the architecture layer is used as backend in cloud computing?


a) client
b) cloud
c) Software
d) Network

13)_____refers to the location and management of the cloud’s infrastructure.


a)Service
b) Deployment
c) Application
d) None of the mentioned

14) Which of the following can be considered PaaS offering


a) Google Maps
b) Gmail
c) Google earth
d) All of the mentioned

15) Which of the architectural layer is used as front end in cloud computing?
a) Client
b) Cloud
c) soft
d) none of the above

You might also like