Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
a. nebula cloud
b. cyclone cloud
c. force.com cloud
d. cern cloud
Q. To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform
a. load setting facility
b. load sharing facility
c. load setting faculty
d. load assigning faculty
Q. A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms
a. accessibility
b. mobility
c. agility
d. scalability
Q. The Cloudlets have a ownership unlike that of Clouds.
a. centralized
b. decentralized
c. global
d. none of the above
Q. The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.
a. htc
b. hpc
c. hcc
d. hac
Q. Performance metrics for HPC/HTC systems include :
a. multitasking scalability
b. security index
c. cost effectiveness
d. all of the above
Q. refers to an increase in the performance by the addition of more resources along the service layers
a. horizontal scalability
b. vertical scalability
c. diagonal scalability
d. none of the above
Q. RFID stand for .
a. rangeable frequency identification
b. radio fragment identification
c. radio frequency identification
d. rangeable fragment identification
Q. The architecture of IoT consists of different layers including which of the following? i. Application Layerii. Sensing Layeriii. Combination Layeriv. Network Layer
a. i, ii, iv
b. i, iii, iv
c. ii, iii, iv
d. ii, iii, iv
Q. tags needs an external source to wake up the battery.
a. acitve rfid
b. passive rfid
c. battery-assisted passive rfid
d. battery-assisted active rfid
Q. Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor
a. i, ii, iii
b. i, ii, iii, iv
c. ii, iii, iv
d. i, ii, iv
Q. Even with two-factor authentication, users may still be vulnerable to attacks.
a. scripting
b. cross attack
c. man-in-the-middle
d. radiant
Q. Which of the following is not the component of IoT Endpoint
a. sensor
b. gateway
c. communication module
d. mcu
Q. Which of the following makes sure that data is not changed when it not supposed to be?
a. integrity
b. availability
c. confidentiality
d. accounting