USCS601-Cloud-Computing

USCS601-Cloud-Computing

Cloud Computing USCS601 T.Y.B.Sc. CS Correct Answer Sr. No. Question The field that covers a variety of computer networks, both public and private, that are used in everyday jobs. C AArtificial Intelligence BML CNetwork Security 1 DIT Which of these is a part of network identification? A a) UserID b) Password c) OTP 2 d) fingerprint Which is not an objective of network security? B A. Identification B. Authentication 3 C. Access control D. Lock The computing refers to applications and services that run on a distributed network using virtualized resources is B a) Distributed b) Cloud c) Soft d) Parallel 4 Which of the following can be identified as cloud? C a) Web Applications b) Intranet c) Hadoop d) Standalone Application 5 6 Which of the following is Cloud Platform by Amazon? B a) Azure b) AWS c) Cloudera d) Hyper-V Which of the following is related to the service provided by Cloud? A a) Sourcing b) Ownership c) Reliability d) SAAS 7 1. Which of the following cloud combines multiple clouds where those clouds retain their unique identities but are D 8 bound together as a unit. a) Public b) Private c) Community d) Hybrid How many types of service models are mainly present in Cloud? C a) 1 b) 2 c) 3 d) 4 9 Which of the following is the IaaS service provider? A a) EC2 10 b) EC1 c) EC10 d) Hybrid Which of the following is the highest degree of integration in cloud computing? D a) IaaS b) CaaS c) PaaS d) SaaS 11 Which of these services is not Platform as a Service? B A. Force.com B. Microsoft Azure C. Amazon EC2 12 D. Joyent What exactly is cloud computing? C A. A way to organize desktop computers B. Lightweight software that takes up little space on a hard drive C. Computing resources that can be accessed on demand, like electricity from a utility D. The World Wide Web 13 A Which of these techniques is vital for creating cloud-computing centers? A. Virtualization B. Transubstantiation C. Cannibalization D. Insubordination 14 Which one of the following is a CPU emulator and virtual machine monitor. C a) Imaging b) Parallels c) QEMU d) None of the mentioned 15 Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems? B a) Vmachines b) VirtualBox c) ThoughtPolice d) VGM 16 REST stands for A a) Representational State Transfer 17 b) Representational Simple Transfer c) Restricted Environmental Stimulation Technique d) Restricted Environmental Stimulation Technique Which of the following will be the host operating system for Windows Server? B a) VirtualLogix VLX b) Microsoft Hyper-V c) Xen d) KVM 18 A service that concentrates on hardware follows the _________ as a Service model. A a) IaaS b) CaaS c) PaaS d)SaaS 19 6. When you add a software stack, such as an operating system and applications to the service, the model shifts to A _____ model. a) SaaS b) PaaS c) IaaS d)Caas 20 Which of the following is the most refined and restrictive service model? C a) IaaS b) CaaS c) PaaS d)SaaS 21 _______ is a pay-as-you-go model matches resources to need on an ongoing basis. A 22 a) Utility b) Elasticity c) Low barrier to entry d) All of the mentioned _______ feature allows you to optimize your system and capture all possible transactions. C a) scalability b) reliability c) elasticity 23 d)movability Point out the correct statement. C a) Service Level Agreements (SLAs) is small aspect of cloud computing b) Cloud computing does not have impact on software licensing c) Cloud computing presents new opportunities to users and developers 24 d) Cloud computing restricts opportunities to users Applications that work with cloud computing that have low margins and usually low risk are _____________ B a) high touch b) low touch 25 c) moderate touch d) single touch .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us