0% found this document useful (0 votes)
8 views8 pages

CC Minor Mid I Bits

Uploaded by

216n1a04d0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

CC Minor Mid I Bits

Uploaded by

216n1a04d0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

01.

From Year we saw widespread use of personal computers built with D


VLSI microprocessors
A 1960 to 1980 B 1990 to 2000
C 1980 to 2000, D 1970 to 1990
02. The is often a collection of homogeneous compute nodes that are physically A
connected in close range to one another
A cluster B Gutter
C duster D pluster
03. networks are formed for distributed file sharing and content delivery D
applications
A peer-to-not peer B host-to host
C peer to adhoc D peer-to-peer
04. In general, distributed computing is the opposite of . A
A centralized computing B parallel computing
C Cloud computing D Grid Computing
05. Full form of HTC is B
A high-throughput computer B high-throughput computing
C high-throughput cloud D height-throughput computing
06. high-throughput computing systems built with computing technologies A
A parallel and distributed B Grid and Autonomous
C Hardware and distributed D Grid and Parallel
07. In distributed system, each processor has its own C
A local memory B clock
C both local memory and clock D Virtual memory
08. If one site fails in distributed system then A
A the remaining sites can continue B all the sites will stop working
operating
C directly connected sites will stop D none of the mentioned
working

09. The process of writing distributed programs is referred to as A


A Distributedprogramming. B Multithreadedprogramming.
C ConcurrentProgramming D HeterogeneousProgramming
10. refers to computing with pervasive devices at any place and time using D
wired or wireless communication
A Multithreadedprogramming. B ConcurrentProgramming
C HeterogeneousProgramming D Ubiquitouscomputing
11. The is a networked connection of everyday objects including computers, A
sensors, humans, etc
A Internetof Things B ComputerNetworks
C Peer-to-Peer D AdhocNetworks
12. in which the processor executes multiple instructions simultaneously rather C
than only one instruction at a time.
A bit-levelparallelism B Data-levelparallelism
C instruction-levelparallelism D task-levelparallelism
13. consists of multiple autonomous computers, each having its own private C
memory, communicating through a computer network.
A parallel System B Cloud System
C Distributed System D Autonomous System
14. can be built with physical or virtualized resources over large data centers B
that are centralized or distributed.
A parallel System B Cloud System
C Distributed System D Autonomous System
15. is a computing paradigm by which all computer resources are centralized in C
one physical system.
A parallel computing B Cloud computing
C centralized computing D Grid Computing
16. computing all processors are either tightly coupled with centralized A
shared memory or loosely coupled with distributed memory
A parallel computing B Cloud computing
C centralized computing D Grid Computing
17. approach is also called bare-metal VM, B
A Supervisor B Hypervisor
C Bitvisor D Cypervisor
18. VMM runs in mode A
A nonprivileged B privileged
C stack D queue
19. consists of interconnected stand-alone computers which work D
cooperatively as a single integrated computing resource
A computingGrid B computingcloud
C ParallelComputing D computingcluster
20. is envisioned to allow close interaction among applications running on D
distant computers simultaneously
A parallel computing B Cloud computing
C centralized computing D Grid Computing
21. connects client hosts directly to the disk arrays A
A Networkattached storage (NAS) B storagearea network (SAN)
C LocalArea Networks(LAN) D WideArea Networks(WAN)
22. The nodes in small clusters are mostly interconnected by an C
A Networkattached storage (NAS) B storagearea network (SAN)
C LocalArea Networks(LAN) D WideArea Networks(WAN)
23. in which the processor executes multiple instructions simultaneously rather A
than bit serial processing.
A bit-levelparallelism B Data-levelparallelism
C instruction-levelparallelism D task-levelparallelism
24. A connects servers to network storage such as disk arrays B
A Networkattached storage (NAS) B storagearea network (SAN)
C LocalArea Networks(LAN) D WideArea Networks(WAN)
25. How many types of overlay networks are used C
A One B Three
C two D four
26. P2P computing faces types of heterogeneity problems in hardware, software, B
and network requirements.
A One B Three
C two D four
27. is a pool of virtualized computer resources. A
A cloud B grid
C cluster D peersystem
28. computing as an on-demand computing paradigm B
A parallel computing B Cloud computing
C centralized computing D Grid Computing
29. network is characterized by a random graph. A
A Unstructuredoverlay B structuredoverlay
C DistributedOverlay D HeterogeneousOverlay
30. Which overlay Network Routing mechanisms are developed B
A Unstructuredoverlay B structuredoverlay
C DistributedOverlay D HeterogeneousOverlay
31. which is not a type of overlay network D
A unstructured B structured
C structuredand unstructured D heterogeneous
32. networks follow certain connectivity topology and rules for inserting and B
removing nodes (peer IDs) from the overlay graph.
A Unstructuredoverlay B structuredoverlay
C DistributedOverlay D HeterogeneousOverlay
33. Internet clouds offer types of deployment modes D
A One B Three
C two D four
34. CPU speed performance measured in A
A MIPS B Mbps
C Dbps D CIPS
35. network bandwidth performance measured in B
A MIPS B Mbps
C Dbps D CIPS
36. System throughput is often measured in A
A MIPS B Mbps
C Dbps D CIPS
37. model includes middleware, databases, development tools, andsome C
runtime support such as Web 2.0 and Java.
A Infrastructure as a Service B Cluster as a Service
C Software as a Service D Platform as a Service
38. model platform includes both hardware and software integrated with specific B
programming interfaces.
A Infrastructure as a Service B Platform as a Service
C Software as a Service D Cluster as a Service
39. model puts together infrastructures demanded by usersnamely A
servers, storage, networks, and the data center fabric.
A Infrastructure as a Service B Platform as a Service
C Software as a Service D Cluster as a Service
40. model enables the user to deploy user-built applications onto a virtualized B
cloud platform
A Infrastructure as a Service B Platform as a Service
C Software as a Service D Cluster as a Service
41. Which is not a security requirements D
A confidentiality, B integrity,
C availability D sensitivity
42. is the main source of intellectual property violations within the boundary A
of a P2P network
A Collusivepiracy B Onlinepiracy
C Networkpiracy D Openpiracy
43. has hindered the use of open P2P networks for commercial content B
delivery
A Collusivepiracy B Onlinepiracy
C Networkpiracy D Openpiracy
44. The generation tools were designed to prevent or avoid intrusions A
A First B Second
C Third D Fourth
45. scaled-workload speedup also sometime called as C
A Ohms B Amdahls
C GustafsonsLaw D Booths
46. Any failure that will pull down the operation of the entire system is called a of A
failure.
A Singlepoint B Muti-point
C Manyto many point D Sngleto many point
47. Law states that the speedup factor of using the n-processor system over D
the use of a single processor
A Ohms B GustafsonsLaw
C Booths D Amdahls
48. Law states that When using an n-processor system, the user scales the B
workload to W
A Ohms B GustafsonsLaw
C Booths D Amdahls
49. Which one of the following cloud concepts is related to sharing and pooling the B
resources?
A Polymorphism B Virtualization
C Abstraction D Resource utilization
50. A provides an environment that is logically separated from the A
underlying hardware.
A Virtual machine B Physical Machine
C Parallel Machine D Sky level Machine
51. virtualization layer is known as B
A Supervisor B Hypervisor
C Devisor D Revisor
52. virtual machine monitor (VMM) sometime called as C
A Low level layer B Hardware layer
C virtualization layer D Physical layer
53. is a computer architecture technology by which multiple virtual C
machines (VMs) are multiplexed in the same hardware machine.
A Clusterization B Simulation
C Virtualization D Parallelization

54. physical resources and represents them as resources to users. C


A Real B Cloud
C Virtual D Hardware

55. Virtualization does not need to modify the host OS. A


A Full B Para
C Partial D Half
56. is a hardware-assisted para-virtualization tool, which improves performance and
supports unmodified guest OSes. B

A Microsoft Hyper-V B KVM


C VMware ESX D Xen

57. Virtualization at the virtualizes an application as a VM. A


A Application Level B Operating System
C Library Support Level D Hardware-level
58. Virtualization with is possible by controlling the communication link C
between applications and the rest of a system through API hooks.
A User-Application Level B Operating System Level
C Library Support Level D Hardware-level
59. virtualization is performed right on top of the bare hardware D
A User-Application Level B Operating System Level
C Library Support Level D Hardware-level
60. Virtualization creates isolated containers on a single physical server and the B
OS instances to utilize the hardware and software in data centers.
A User-Application Level B Operating System Level
LibrarySupport LevelHardware-level
61. 61. data centers can be allocated data A
A Dynamically B Statically
C Stationary. D constantly
62. In data centers, a large number of workloads can run on servers at C
various times
A Homogenous B Instantaneous
C Heterogeneous D Meterogeneous
63. VMM Instructions runs in A
A Supervisor mode B user mode
C Non Supervisor mode D Hardware mode
64. A is a collection of servers interconnected by a physical network such as A
a LAN.
A physical cluster B virtual cluster
C software cluster D ordinary cluster

and privacy.
A Private clouds B public cloud
C hybrid cloud D Virtual Cloud
65. Google App Engine (GAE) is a cloud B
A Private B public
C hybrid D Standalone
66. cloud delivers a selected set of business processes over continent. D
A Private B hybrid
C Standalone D public
67. Amazon Web Services (AWS) is a cloud provider B
A Private B public
C hybrid D Standalone
68. is supposed to deliver more efficient and convenient cloud services D
A public cloud B hybrid cloud
C VirtualCloud D Private clouds
69. operate in the middle, with many compromises in terms of resource sharing. B
A public clouds B hybrid clouds
C VirtualClouds D Private clouds

70. PaaS Full form A


A Platform as a Service B Planet as a Service
C Program as a Service D Provider as a Service
71. SaaS Full form D
A Security as a Service B Super as a service
C Simple as a Service D Software as a Service

72. --------are interconnected logically by a virtual network across several B


physical networks
A physical cluster B virtual cluster
C software cluster D ordinary cluster
73. 73. A is built with both public and private clouds, C
A Private clouds B public cloud
C hybrid cloud D Virtual Cloud
74. give local users a flexible and agile private infrastructure to run service A
workloads within their administrative domains
A Private clouds B public cloud
C hybrid cloud D Virtual Cloud
75. Microsoft Azure is a cloud provider B
A Private B public
C hybrid D Standalone
76. The services provided over the cloud can be generally categorized into C
different service models
A One B Two
C Three D four

77. In GAE Architecture Component is used for distributed application lock D


services.
A Google File System (GFS) B MapReduce
C BigTable D Chubby
78. In GAE Architecture offers a storage service for accessing structured data. C
A Google File System (GFS) B MapReduce
C BigTable D Chubby
79. service Model to be able to develop, deploy, and manage the execution of B
applications using provisioned resources demands a cloud platform with the proper
software environment.
A IaaS B PaaS
C SaaS D CaaS
80. A CPU architecture is virtualizable if it supports the ability to run the VMs privileged and B
unprivileged instructions in the CPUs
A Supervisor mode B user mode
C Non Supervisor mode D Hardware mode

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy