Cloud Computing Questions and Answers - Introduction To Cloud Computing
Cloud Computing Questions and Answers - Introduction To Cloud Computing
Cloud Computing
Explanation: Cloud Computing is distinguished by the notion that resources are virtual
and limitless and that details of the physical systems on which software runs are
abstracted from the user.
3. ________ as a utility is a dream that dates from the beginning of the computing
industry itself.
a) Model
b) Computing
c) Software
d) All of the mentioned
View Answer
Explanation: Cloud computing takes the technology, services, and applications that are
similar to those on the Internet and turns them into a self-service utility.
4. Which of the following is essential concept related to Cloud?
a) Reliability
b) Productivity
c) Abstraction
d) All of the mentioned
View Answer
Explanation: Cloud computing abstracts the details of system implementation from users
and developers.
5. Point out the wrong statement.
a) All applications benefit from deployment in the cloud
b) With cloud computing, you can start very small and become big very fast
c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
d) None of the mentioned
View Answer
Explanation: Issues with latency, transaction control, and in particular security and
regulatory compliance are of particular concern.
6. Which of the following cloud concept is related to pooling and sharing of resources?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
View Answer
Explanation: Applications run on physical systems that aren’t specified, data is stored in
locations that are unknown, administration of systems is outsourced to others, and
access by users is ubiquitous.
7. ________ has many of the characteristics of what is now being called cloud
computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned
View Answer
Explanation: The Internet offers abstraction, runs using the same set of protocols and
standards, and uses the same applications and operating systems.
8. Which of the following can be identified as cloud?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned
View Answer
Explanation: When an intranet becomes large enough that a diagram no longer wishes
to differentiate between individual physical systems, the intranet too becomes identified
as a cloud.
9. Cloud computing is an abstraction based on the notion of pooling physical resources
and presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned
View Answer
Explanation: Cloud Computing is a new model for provisioning resources, for staging
applications, and for platform-independent user access to services.
10. Which of the following is Cloud Platform by Amazon?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned
View Answer
Explanation: Service models describe the type of service that the service provider is
offering.
2. Point out the correct statement.
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
View Answer
Explanation: The deployment model tells you where the cloud is located and for what
purpose.
4. Which of the following is the deployment model?
a) public
b) private
c) hybrid
d) all of the mentioned
View Answer
Explanation: Public, private, community, and hybrid clouds are deployment models.
5. Point out the wrong statement.
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
View Answer
Explanation: Google has built mega data centres for its search engine.
6. Which of the following is best known service model?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
View Answer
Explanation: The public cloud infrastructure is available for public use alternatively for a
large industry group.
6. Which of the following is related to the service provided by Cloud?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
View Answer
Explanation: A hybrid cloud may offer standardized or proprietary access to data and
applications, as well as application portability.
This set of Cloud Computing Questions & Answers for entrance exams focuses
on “Cloud Types – 3”.
Explanation: The public cloud infrastructure is available for public use alternatively for a
large industry group.
2. Point out the wrong statement.
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in
which infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services,
development frameworks, transactions, and control structures
d) All of the mentioned
View Answer
Explanation: The IaaS service provider manages all the infrastructure, while the client is
responsible for all other aspects of the deployment.
4. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Explanation: Infrastructure as a Service (IaaS) is a form of cloud computing that provides
virtualized computing resources over the Internet.
5. Point out the wrong statement.
a) A PaaS service adds integration features, middleware, and other orchestration and
choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid Cloud
computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud
jigsaw
d) None of the mentioned
View Answer
Explanation: In the SaaS model, the application is provided to the client through a thin
client interface.
7. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4
View Answer
Explanation: These attributes change how applications are created, priced, and
delivered.
2. Point out the correct statement.
a) Service Level Agreements (SLAs) is small aspect of cloud computing
b) Cloud computing does not have impact on software licensing
c) Cloud computing presents new opportunities to users and developers
d) All of the mentioned
View Answer
Explanation: The “high touch” applications that come with high margins require
committed resources and pose more of a risk.
4. A service that concentrates on hardware follows the _________ as a Service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Explanation: This eliminates waste and has the added benefit of shifting risk from the
client.
9. _______ feature allows you to optimize your system and capture all possible
transactions.
a) scalability
b) reliability
c) elasticity
d) none of the mentioned
View Answer
Next »
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on
“Benefits and Drawbacks of Cloud Computing”.
1. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned
View Answer
2. Point out the correct statement.
a) Google’s cloud includes perhaps some 10 data centers worldwide
b) Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
c) Data centers have been sited to optimize the overall system latency
d) All of the mentioned
View Answer
3. Which of the following benefit is related to creates resources that are pooled together
in a system that supports multi-tenant usage?
a) On-demand self-service
b) Broad network access
c) Resource pooling
d) All of the mentioned
View Answer
4. The _____ is something that you can obtain under contract from your vendor.
a) PoS
b) QoS
c) SoS
d) All of the mentioned
View Answer
5. Point out the wrong statement.
a) Internet consumes roughly 1 percent of the world’s total power
b) The cost advantages of cloud computing have enabled new software vendors to
create productivity applications
c) A client can provision computer resources without the need for interaction with cloud
service provider personnel
d) None of the mentioned
View Answer
6. All cloud computing applications suffer from the inherent _______ that is intrinsic in
their WAN connectivity.
a) propagation
b) latency
c) noise
d) all of the mentioned
View Answer
7. Cloud computing is a _______ system and it is necessarily unidirectional in nature.
a) stateless
b) stateful
c) reliable
d) all of the mentioned
View Answer
8. Which of the following is the most important area of concern in cloud computing?
a) Security
b) Storage
c) Scalability
d) All of the mentioned
View Answer
9. You can’t count on a cloud provider maintaining your _____ in the face of government
actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned
View Answer
10. Which of the following architectural standards is working with cloud computing
industry?
a) Service-oriented architecture
b) Standardized Web services
c) Web-application frameworks
d) All of the mentioned
View Answer
Explanation: This feature obviates the need for planning and provisioning.
Explanation: Factors that affect the performance of learner system does not include
good data structures.
3. Different learning methods does not include?
a) Memorization
b) Analogy
c) Deduction
d) Introduction
View Answer
Explanation: In language understanding, the levels of knowledge that does not include
empirical knowledge.
5. A model of language consists of the categories which does not include?
a) Language units
b) Role structure of units
c) System constraints
d) Structural units
View Answer
Explanation: A model of language consists of the categories which does not include
structural units.
6. What is a top-down parser?
a) Begins by hypothesizing a sentence (the symbol S) and successively predicting lower
level constituents until individual preterminal symbols are written
b) Begins by hypothesizing a sentence (the symbol S) and successively predicting upper
level constituents until individual preterminal symbols are written
c) Begins by hypothesizing lower level constituents and successively predicting a
sentence (the symbol S)
d) Begins by hypothesizing upper level constituents and successively predicting a
sentence (the symbol S)
View Answer
Explanation: The action ‘STACK(A,B)’ of a robot arm specify to Place block A on block
B.
Question Context
Solution: (B)
Ordinal variables are the variables which has some order in their categories. For
example, grade A should be consider as high grade than grade B.
A) PCA
B) K-Means
C) None of the above
Solution: (A)
A deterministic algorithm is that in which output does not change on different runs. PCA
would give the same result if we run again, but not k-means.
3) [True or False] A Pearson correlation between two variables is zero but, still
their values can still be related to each other.
A) TRUE
B) FALSE
Solution: (A)
Y=X2. Note that, they are not only associated, but one is a function of the other and
Pearson correlation between them is 0.
4) Which of the following statement(s) is / are true for Gradient Decent (GD) and
Stochastic Gradient Decent (SGD)?
A) Only 1
B) Only 2
C) Only 3
D) 1 and 2
E) 2 and 3
F) 1,2 and 3
Solution: (A)
In SGD for each iteration you choose the batch which is generally contain the random
sample of data But in case of GD each iteration contain the all of the training
observations.
5) Which of the following hyper parameter(s), when increased may cause random
forest to over fit the data?
1. Number of Trees
2. Depth of Tree
3. Learning Rate
A) Only 1
B) Only 2
C) Only 3
D) 1 and 2
E) 2 and 3
F) 1,2 and 3
Solution: (B)
Usually, if we increase the depth of tree it will cause overfitting. Learning rate is not an
hyperparameter in random forest. Increase in the number of tree will cause under fitting.
6) Imagine, you are working with “Analytics Vidhya” and you want to develop a
machine learning algorithm which predicts the number of views on the articles.
Your analysis is based on features like author name, number of articles written by
the same author on Analytics Vidhya in past and a few other features. Which of
the following evaluation metric would you choose in that case?
A) Only 1
B) Only 2
C) Only 3
D) 1 and 3
E) 2 and 3
F) 1 and 2
Solution:(A)
You can think that the number of views of articles is the continuous target variable which
fall under the regression problem. So, mean squared error will be used as an evaluation
metrics.
7) Given below are three images (1,2,3). Which of the following option is correct
for these images?
A)
B)
C)
A) 1 is tanh, 2 is ReLU and 3 is SIGMOID activation functions.
Solution: (D)
8) Below are the 8 actual values of target variable in the train file.
[0,0,0,1,1,1,1,1]
What is the entropy of the target variable?
Solution: (A)
So the answer is A.
9) Let’s say, you are working with categorical feature(s) and you have not looked
at the distribution of the categorical variable in the test data.
You want to apply one hot encoding (OHE) on the categorical feature(s). What
challenges you may face if you have applied OHE on a categorical variable of train
dataset?
A) All categories of categorical variable are not present in the test dataset.
D) Both A and B
E) None of these
Solution: (D)
Both are true, The OHE will fail to encode the categories which is present in test but not
in train so it could be one of the main challenges while applying OHE. The challenge
given in option B is also true you need to more careful while applying OHE if frequency
distribution doesn’t same in train and test.
10) Skip gram model is one of the best models used in Word2vec algorithm for
words embedding. Which one of the following models depict the skip gram
model?
A) A
B) B
C) Both A and B
D) None of these
Solution: (B)
Both models (model1 and model2) are used in Word2vec algorithm. The model1
represent a CBOW model where as Model2 represent the Skip gram model.
11) Let’s say, you are using activation function X in hidden layers of neural
network. At a particular neuron for any given input, you get the output as “-
0.0001”. Which of the following activation function could X represent?
A) ReLU
B) tanh
C) SIGMOID
D) None of these
Solution: (B)
The function is a tanh because the this function output range is between (-1,-1).
12) [True or False] LogLoss evaluation metric can have negative values.
A) TRUE
B) FALSE
Solution: (B)
13) Which of the following statements is/are true about “Type-1” and “Type-2”
errors?
A) Only 1
B) Only 2
C) Only 3
D) 1 and 2
E) 1 and 3
F) 2 and 3
Solution: (E)
In statistical hypothesis testing, a type I error is the incorrect rejection of a true null
hypothesis (a “false positive”), while a type II error is incorrectly retaining a false null
hypothesis (a “false negative”).
14) Which of the following is/are one of the important step(s) to pre-process the
text in NLP based projects?
1. Stemming
2. Stop word removal
3. Object Standardization
A) 1 and 2
B) 1 and 3
C) 2 and 3
D) 1,2 and 3
Solution: (D)
Stemming is a rudimentary rule-based process of stripping the suffixes (“ing”, “ly”, “es”,
“s” etc) from a word.
Stop words are those words which will have not relevant to the context of the data for
example is/am/are.
Object Standardization is also one of the good way to pre-process the text.
15) Suppose you want to project high dimensional data into lower dimensions.
The two most famous dimensionality reduction algorithms used here are PCA and
t-SNE. Let’s say you have applied both algorithms respectively on data “X” and
you got the datasets “X_projected_PCA” , “X_projected_tSNE”.
Solution: (B)
t-SNE algorithm consider nearest neighbour points to reduce the dimensionality of the
data. So, after using t-SNE we can think that reduced dimensions will also have
interpretation in nearest neighbour space. But in case of PCA it is not the case.
Context: 16-17
Given below are three scatter plots for two features (Image 1, 2 & 3 from left to
right).
16) In the above images, which of the following is/are example of multi-collinear
features?
A) Features in Image 1
B) Features in Image 2
C) Features in Image 3
Solution: (D)
In Image 1, features have high positive correlation where as in Image 2 has high
negative correlation between the features so in both images pair of features are the
example of multicollinear features.
A) Only 1
B)Only 2
C) Only 3
D) Either 1 or 3
E) Either 2 or 3
Solution: (E)
You cannot remove the both features because after removing the both features you will
lose all of the information so you should either remove the only 1 feature or you can use
the regularization algorithm like L1 and L2.
18) Adding a non-important feature to a linear regression model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these
Solution: (A)
After adding a feature in feature space, whether that feature is important or unimportant
features the R-squared always increase.
19) Suppose, you are given three variables X, Y and Z. The Pearson correlation
coefficients for (X, Y), (Y, Z) and (X, Z) are C1, C2 & C3 respectively.
Now, you have added 2 in all values of X (i.enew values become X+2), subtracted 2
from all values of Y (i.e. new values are Y-2) and Z remains the same. The new
coefficients for (X,Y), (Y,Z) and (X,Z) are given by D1, D2 & D3 respectively. How
do the values of D1, D2 & D3 relate to C1, C2 & C3?
E) D1 = C1, D2 = C2, D3 = C3
F) Cannot be determined
Solution: (E)
Correlation between the features won’t change if you add or subtract a value in the
features.
20) Imagine, you are solving a classification problems with highly imbalanced
class. The majority class is observed 99% of times in the training data.
Your model has 99% accuracy after taking the predictions on test data. Which of
the following is true in such a case?
A) 1 and 3
B) 1 and 4
C) 2 and 3
D) 2 and 4
Solution: (A)
21) In ensemble learning, you aggregate the predictions for weak learners, so that
an ensemble of these models will give a better prediction than prediction of
individual models.
Which of the following statements is / are true for weak learners used in ensemble
model?
A) 1 and 2
B) 1 and 3
C) 2 and 3
D) Only 1
E) Only 2
Solution: (A)
Weak learners are sure about particular part of a problem. So, they usually don’t overfit
which means that weak learners have low variance and high bias.
22) Which of the following options is/are true for K-fold cross-validation?
1. Increase in K will result in higher time required to cross validate the result.
2. Higher values of K will result in higher confidence on the cross-validation
result as compared to lower value of K.
3. If K=N, then it is called Leave one out cross validation, where N is the
number of observations.
A) 1 and 2
B) 2 and 3
C) 1 and 3
D) 1,2 and 3
Solution: (D)
Larger k value means less bias towards overestimating the true expected error (as
training folds will be closer to the total dataset) and higher running time (as you are
getting closer to the limit case: Leave-One-Out CV). We also need to consider the
variance between the k folds accuracy while selecting the k.
Time taken by an algorithm for training (on a model with max_depth 2) 4-fold is 10
seconds and for the prediction on remaining 1-fold is 2 seconds.
23) Which of the following option is true for overall execution time for 5-fold cross
validation with 10 different values of “max_depth”?
D) Can’t estimate
Solution: (D)
Each iteration for depth “2” in 5-fold cross validation will take 10 secs for training and 2
second for testing. So, 5 folds will take 12*5 = 60 seconds. Since we are searching over
the 10 depth values so the algorithm would take 60*10 = 600 seconds. But training and
testing a model on depth greater than 2 will take more time than depth “2” so overall
timing would be greater than 600.
24) In previous question, if you train the same algorithm for tuning 2 hyper
parameters say “max_depth” and “learning_rate”.
You want to select the right value against “max_depth” (from given 10 depth
values) and learning rate (from given 5 different learning rates). In such cases,
which of the following will represent the overall time?
A) 1000-1500 second
B) 1500-3000 Second
D) None of these
Solution: (D)
25) Given below is a scenario for training error TE and Validation error VE for a
machine learning algorithm M1. You want to choose a hyperparameter (H) based
on TE and VE.
H TE VE
1 105 90
2 200 85
3 250 96
4 105 85
5 300 100
A) 1
B) 2
C) 3
D) 4
E) 5
Solution: (D)
26) What would you do in PCA to get the same projection as SVD?
C) Not possible
D) None of these
Solution: (A)
When the data has a zero mean vector PCA will have same projections as SVD,
otherwise you have to centre the data first before taking SVD.
Assume there is a black box algorithm, which takes training data with multiple
observations (t1, t2, t3,…….. tn) and a new observation (q1). The black box
outputs the nearest neighbor of q1 (say ti) and its corresponding class label ci.
You can also think that this black box algorithm is same as 1-NN (1-nearest
neighbor).
A) TRUE
B) FALSE
Solution: (A)
In first step, you pass an observation (q1) in the black box algorithm so this algorithm
would return a nearest observation and its class.
In second step, you through it out nearest observation from train data and again input
the observation (q1). The black box algorithm will again return the a nearest observation
and it’s class.
28) Instead of using 1-NN black box we want to use the j-NN (j>1) algorithm as
black box. Which of the following option is correct for finding k-NN using j-NN?
A) 1
B) 2
C) 3
Solution: (A)
29) Suppose you are given 7 Scatter plots 1-7 (left to right) and you want to
compare Pearson correlation coefficients between variables of each scatterplot.
1. 1<2<3<4
2. 1>2>3 > 4
3. 7<6<5<4
4. 7>6>5>4
A) 1 and 3
B) 2 and 3
C) 1 and 4
D) 2 and 4
Solution: (B)
from image 1to 4 correlation is decreasing (absolute value). But from image 4 to 7
correlation is increasing but values are negative (for example, 0, -0.3, -0.7, -0.99).
30) You can evaluate the performance of a binary class classification problem
using different metrics such as accuracy, log-loss, F-Score. Let’s say, you are
using the log-loss function as evaluation metric.
1.
If a classifier is confident about an incorrect classification, then log-loss will
penalise it heavily.
2. For a particular observation, the classifier assigns a very small probability for the
correct class then the corresponding contribution to the log-loss will be very large.
3. Lower the log-loss, the better is the model.
A) 1 and 3
B) 2 and 3
C) 1 and 2
D) 1,2 and 3
Solution: (D)
Question 31-32
Note: Visual distance between the points in the image represents the actual
distance.
31) Which of the following is leave-one-out cross-validation accuracy for 3-NN (3-
nearest neighbor)?
A) 0
D) 0.4
C) 0.8
D) 1
Solution: (C)
In Leave-One-Out cross validation, we will select (n-1) observations for training and 1
observation of validation. Consider each point as a cross validation point and then find
the 3 nearest point to this point. So if you repeat this procedure for all points you will get
the correct classification for all positive class given in the above figure but negative class
will be misclassified. Hence you will get 80% accuracy.
32) Which of the following value of K will have least leave-one-out cross validation
accuracy?
A) 1NN
B) 3NN
C) 4NN
Solution: (A)
Each point which will always be misclassified in 1-NN which means that you will get the
0% accuracy.
33) Suppose you are given the below data and you want to apply a logistic
regression model for classifying it in two given classes.
Which of the following option is correct when you increase the value of C from zero to a
very large value?
Solution: (B)
By looking at the image, we see that even on just using x2, we can efficiently perform
classification. So at first w1 will become 0. As regularization parameter increases more,
w2 will come more and more closer to 0.
34) Suppose we have a dataset which can be trained with 100% accuracy with help
of a decision tree of depth 6. Now consider the points below and choose the
option based on these points.
Note: All other hyper parameters are same and other factors are not affected.
A) Only 1
B) Only 2
C) Both 1 and 2
Solution: (A)
If you fit decision tree of depth 4 in such data means it will more likely to underfit the
data. So, in case of underfitting you will have high bias and low variance.
35) Which of the following options can be used to get global minima in k-Means
Algorithm?
A) 2 and 3
B) 1 and 3
C) 1 and 2
D) All of above
Solution: (D)
36) Imagine you are working on a project which is a binary classification problem.
You trained a model on training dataset and get the below confusion matrix on
validation dataset.
Based on the above confusion matrix, choose which option(s) below will give you
correct predictions?
1. Accuracy is ~0.91
2. Misclassification rate is ~ 0.91
3. False positive rate is ~0.95
4. True positive rate is ~0.95
A) 1 and 3
B) 2 and 4
C) 1 and 4
D) 2 and 3
Solution: (C)
The true Positive Rate is how many times you are predicting positive class correctly so
true positive rate would be 100/105 = 0.95 also known as “Sensitivity” or “Recall”
37) For which of the following hyperparameters, higher value is better for decision
tree algorithm?
1. Number of samples used for split
2. Depth of tree
3. Samples for leaf
A)1 and 2
B) 2 and 3
C) 1 and 3
D) 1, 2 and 3
E) Can’t say
Solution: (E)
For all three options A, B and C, it is not necessary that if you increase the value of
parameter the performance may increase. For example, if we have a very high value of
depth of tree, the resulting tree may overfit the data, and would not generalize well. On
the other hand, if we have a very low value, the tree may underfit the data. So, we can’t
say for sure that “higher is better”.
Context 38-39
Imagine, you have a 28 * 28 image and you run a 3 * 3 convolution neural network
on it with the input depth of 3 and output depth of 8.
38) What is the dimension of output feature map when you are using the given
parameters.
Solution: (A)
39) What is the dimensions of output feature map when you are using following
parameters.
Solution: (B)
Same as above
40) Suppose, we were plotting the visualization for different values of C (Penalty
parameter) in SVM algorithm. Due to some reason, we forgot to tag the C values
with visualizations. In that case, which of the following option best explains the C
values for the images below (1,2,3 left to right, so C values are C1 for image1, C2
for image2 and C3 for image3 ) in case of rbf kernel.
A) C1 = C2 = C3
B) C1 > C2 > C3
C) C1 < C2 < C3
D) None of these
Solution: (C)
Penalty parameter C of the error term. It also controls the trade-off between smooth
decision boundary and classifying the training points correctly. For large values of C, the
optimization will choose a smaller-margin hyperplane. Read more here.
Explanation: RFC stands for Request For Comments and they are documents that
describe methods, behaviors, research, or innovations applicable to the working of the
Internet.
2. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
View Answer
Explanation: Each layer adds its own header to the packet from the previous layer. For
example, in the Internet layer, the IP header is added over the TCP header on the data
packet that came from the transport layer.
3. The structure or format of data is called ___________
a) Syntax
b) Semantics
c) Struct
d) Formatting
View Answer
Explanation: The structure and format of data are defined using syntax. Semantics
defines how a particular pattern to be interpreted, and what action is to be taken based
on that interpretation. In programming languages, syntax of the instructions plays a vital
role in designing of the program.
4. Communication between a computer and a keyboard involves ______________
transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
View Answer
Explanation: In simplex transmission, data flows in single direction which in this case
refers to the data flowing from the keyboard to the computer. Another example would be
of the mouse where the data flows from the mouse to the computer only.
5. The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Explanation: Messages travel from sender to receiver via a physical path called the
medium using a set of methods/rules called protocol. Mediums can be guided (wired) or
unguided (wireless).
7. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
View Answer
Explanation: Network edge devices refer to host systems, which can host applications
like web browser. A switch can’t operate as a host, but as a central device which can be
used to manage network communication.
9. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
View Answer
Explanation: A protocol stack refers to a group of protocols that are running concurrently
that are employed for the implementation of network protocol suite. Each layer in the
network model has to use one specific protocol from the protocol stack.
9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
View Answer
Explanation: Network congestion occurs when traffic in the network is more than the
network could handle. To avoid network congestion, the network management uses
various open-loop and closed-loop congestion control techniques.
10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Explanation: A virtual private network extends a private network across a public network,
and enables users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network.VPN provides
enhanced security and online anonymity to users on the internet. It is also used to
unblock websites which are unavailable in certain regions.
1. Which of this is not a constituent of residential telephone line?
a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel
View Answer
Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service
Provider. In a Digital Subscriber Line system, the same company which provides phone
connection is also an ISP. The internet is provided through the pre-installed telephone
lines.
3. The function of DSLAM is to __________
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
View Answer
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used
by Telcos to convert the analog signals to digital signals for the purpose of providing
internet. The DSLAM located in a telco’s Central Office does this function.
4. Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer
Explanation: CMTS stands for Cable modem termination system. It is used in cable
internet access. In cable internet access, internet is not provided through telephone lines
and the companies that provide such connections don’t necessarily provide telephone
access.
5. HFC contains _______
a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable
View Answer
Explanation: CMTS stands for Cable modem termination system. In cable access analog
signal is converted to digital signal by CMTS. In cable internet access, internet is not
provided through telephone lines. DSLAM is used by Telecom companies.
7. Among the optical-distribution architectures that are essentially switched ethernet is
__________
a) AON
b) PON
c) NON
d) MON
View Answer
Answer:a
Explanation: AON stands for Active optical networks which are essentially switched
Ethernets. Each user has his/her own dedicated optical fiber line connecting to the ISP
in an AON.
8. StarBand provides __________
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Explanation: StarBand was a two-way satellite broadband Internet service available in
the U.S. from 2000–2015. It was discontinued from September 30 2015 due to
increasing competition from other ISPs.
9. Home Access is provided by __________
a) DSL
b) FTTP
c) Cable
d) All of the mentioned
View Answer
Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP
provides the fastest speeds followed by the cable connections and then the DSLs. FTTP
is popularly used in modern connections.
10. ONT is connected to splitter using _________
a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable
View Answer
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the
Termination Point (TP) with an optical fibre cable. It translates light signals from the fibre
optic line to electric signals that the router can read.
11. Which of the following factors affect transmission rate in DSL?
a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference
View Answer
Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair
line i.e. the protection and electrical interference would affect the transmission rate in
DSL. Unlike DSL, FTTP is not really affected by these factors.
1. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
View Answer
Explanation: There are five layers in the Internet Protocol stack. The five layers in
Internet Protocol stack is Application, Transport, Network, Data link and Physical layer.
The internet protocol stack model is also called the TCP/IP model and it’s used in
modern Internet Communication.
2. The number of layers in ISO OSI reference model is __________
a) 5
b) 7
c) 6
d) 10
View Answer
Explanation: The seven layers in ISO OSI reference model is Application, Presentation,
Session, Transport, Network, Data link and Physical layer. OSI stands for Open System
Interconnect and it is a generalized model.
3. Which of the following layers is an addition to OSI model when compared with TCP IP
model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
View Answer
Explanation: The only difference between OSI model and TCP/IP model is that the
functions of Presentation and Session layer in the OSI model are handled by the
transport layer itself in TCP/IP. OSI is a generalized model and TCP/IP is an application
specific model.
4. Application layer is implemented in ____________
a) End system
b) NIC
c) Ethernet
d) Packet transport
View Answer
Explanation: Not only application layer, but presentation layer, session layer and
transport layer are also implemented in the end system. The layers below are
implemented outside the end system, for example, the network layer is implemented on
the routers and the physical layer is implemented for the medium.
5. Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission
View Answer
Explanation: The session layer provides the mechanism for opening, closing and
managing a session between end-user application processes. The session layer 5 is
responsible for establishing managing synchronizing and terminating sessions. In
TCP/IP protocol stack, the functions of the session layer are handled by the transport
layer itself and thus the session layer is missing from the TCP/IP model.
8. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer
provides the mechanism for opening, closing and managing a session between end-user
application processes. In TCP/IP protocol stack, the functions of the session layer are
handled by the transport layer itself and thus the session layer is missing from the
TCP/IP model.
9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive
data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from
device A to device B, the 5th layer to receive data at B is application layer. Application
layer provides the interface between applications and the network. The user interacts
with only this layer.
10. In the OSI model, as a data packet moves from the lower to the upper layers,
headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
View Answer
Explanation: In OSI reference model, when data packet moves from lower layers to
higher layer, headers get removed. Whereas when the data packet moves from higher
layer to lower layers, headers are added. These headers contain the essential control
information for the protocols used on the specific layer.
11. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
View Answer
Explanation: One layer may use the information from another layer, for example
timestamp value. The information is contained in the header inserted by the previous
layer. The headers are added as the packet moves from higher layers to the lower
layers.
1. OSI stands for __________
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet
View Answer
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model
provides a structured plan on how applications communicate over a network, which also
helps us to have a structured plan for troubleshooting. It is recognized by the ISO as the
generalized model for computer network i.e. it can be modified to design any kind of
computer network.
2. The number of layers in ISO OSI reference model is __________
a) 4
b) 5
c) 6
d) 7
View Answer
Explanation: In OSI reference model, there are two layers which are not present in
TCP/IP model. They are Presentation and Session layer. The functions of Presentation
and Session layer in the OSI model are handled by the transport layer itself in TCP/IP.
4. Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Explanation: Physical, data link and network layers are network support layers and
session, presentation and application layers are user support layers. The transport layer
links these layers by segmenting and rearranging the data. It uses protocols like TCP
and UDP.
5. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
Explanation: The physical, logical, port and specific addresses are used in TCP/IP
protocol. All the addressing schemes, that is physical (MAC) and logical address, port
address and specific address are employed in both TCP/IP model and OSI model. In
TCP/IP, the addresses are more focused on the internet implementation of these
addresses.
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to
View Answer
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end
connection between two systems in a network. The protocols used in Transport layer is
TCP and UDP. The transport layer is responsible for segmentation of the data. It uses
ports for the implementation of process-to-process delivery.
8. Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Explanation: A port number is a way to identify a specific process to which an Internet or
other network message is to be forwarded when it arrives at a server. Some examples of
port numbers are port 20 which is used for FTP data, port 22 which is used for SSH
remote login ,and port 23 which is used for TELNET.
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
View Answer
Explanation: In networking, a user mainly interacts with application layer to create and
send information to other computer or network. Application layer provides the interface
between applications and the network. It is the top-most layer in both the TCP/IP and the
OSI model.
10. Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer
View Answer
Explanation: Physical layer is a layer 1 device which deals with network cables or the
standards in use like connectors, pins, electric current used etc. Basically the
transmission speed is determined by the cables and connectors used. Hence it is
physical layer that determines the transmission speed in network. Some of the cables
used for high speed data transmission are optical fiber cables and twisted pair cables.