Sei sulla pagina 1di 21

Benha University

Final Exam (May 2017)


Model Answer Faculty of Computers & Informatics
Date: 28/05/2017
Class: 4th Year Students (IS) Time: 3 hours
Subject: Cloud Computing
Examinar : Dr. Diaa Salama

Instructions to students:
1. Language allowed to answer is the English language.
2. The answer for the multiple choice questions should be written alphabetically (A, B, C, D, E) in a
table such as the next Multiple Choice FORM.
Any other form is not accepted

Multiple Choice FORM


Questions 1 2 3 4 5 6 7 8 9 10

Answer Key D D D D D C C C C C

Questions 11 12 13 14 15 16 17 18 19 20

Answer Key B B B B B A A A A A

Questions 21 22 23 24 25 26 27 28 29 30

A A A A A B B B B B

Questions 31 32 33 34 35 36 37 38 39 40

C C C C C D D D D D

Questions 41 42 43 44 45 46 47 48 49 50

A A A A A B B B B B

3. Check that your Exam Paper is complete. The exam paper is 7 pages long in total.
Question One :Answer ALL the following, by selecting the correct answer in each. Place the answer
on the special Multiple Choice FORM Alphabetically. Each Point [0.5 Mark] Total [25 Marks]

1) Which is true about big data?


A. Includes only unstructured data B. Includes data from a single source
C. Captured efficiently using traditional software tools
D. Data size is beyond the capability of traditional software to process **

2) Which is a feature of information-centric architecture?


A. Storage is internal to the servers
B. Prevents sharing of storage among servers
C. Consists of server, network, and storage in a single system
D. Storage is managed centrally and independent of servers **

3) Which requirement refers to the ability of a storage solution to grow with the business?
A. Availability
B. Manageability
C. Integrity
D. Scalability **

4) Which statement is true about software RAID implementation?


A. Upgrades to operating system do not require compatibility validation with RAID software
B. It is expensive than hardware RAID implementation
C. Supports all RAID levels
D. Uses host CPU cycles to perform RAID calculations **
5) What is write penalty in a RAID 6 configuration for small random I/Os?
A. 2
B. 3
C. 4
D. 6 **

6) An application generates 400 small random IOPS with a read/write ratio of 3:1. What is the
RAID-corrected IOPS on the disk for RAID 5?
A. 400
B. 500
C. 700 **
D. 900

7) Which problem is addressed by RAID technologies?

A. Data corruption B. Data backup C. Data loss D. Data security


Answer: C

8) Which Cloud deployment model(s) is considered suitable for most start-up organizations?
A.Private Cloud only B. Hybrid Cloud only C. Public Cloud D.Both Private and
Hybrid Cloud
Answer: C

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 2 of 21
9) Which is an example of structured data?
A. Image B. PDF document C. Database ** D. Web page

10) What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB?
A. 64 KB
B. 128 KB
C. 256 KB **
D. 320 KB

11) What accurately describes virtualization?


A. Provides on-demand, metered services
B. Abstracts physical resources into logical resources **
C. Pools logical resources to provide data integrity
D. Enables decentralized management across data centers

12) Which is a benefit of compute virtualization?


A. Enables compute memory swapping
B. Improves compute utilization **
C. Isolates compute memory from the applications
D. Isolates compute OS from the applications

13) Which is a challenge of DAS environment?


A. Low performance
B. Limited scalability **
C. Deployment complexity
D. High initial investment

14) In traditional storage provisioning, which LUN expansion technique provides improved
performance?
A. Concatenated metaLUN
B. Striped metaLUN **
C. Base LUN
D. Component LUN

15) Which mechanism provides protection to ‘uncommitted data in cache’ against power failure?
A. Mirroring
B. Vaulting **
C. Watermarking
D. Tiering

16) Which data center management activity ensures business continuity by eliminating single
points of failure?

A. Availability management B. Capacity management


C. Performance management D. Security management
Answer: A

17) Which is a benefit provided by Hyper-threading in a virtualized server environment?

A. Improved CPU utilization B. Logical CPU load balancing


C. Improved memory utilization D. Improved virtual machine security
Answer: A

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 3 of 21
18) Which statement about virtual machines is true?

A. They are not aware of the underlying storage technology used.


B. They are not aware of the size of the virtual disk.
C. They are aware of the underlying storage technology used.
D. They are aware of the type of storage media used.
Answer: A
19) Which application is most benefited by using RAID 3?
A. Backup **
B. OLTP
C. e-commerce
D. email

20) What is concatenation?


A. Grouping multiple physical drives into a logical drive **
B. Dividing a physical drive into multiple logical drives
C. Process of writing disk metadata on a logical drive
D. Adding more capacity to a physical drive through de-fragmentation

21) Which RAID type uses parity to protect against data loss?
A. RAID 3 B. RAID 0 C. RAID 1 D. Nested
Answer: A
22) Which component of a compute system performs the creation and control of logical
storage?
A. Volume Manager B. Operating System C. DBMS D. Application
Answer: A

23) A compute resource is accessing data from storage over a network at the block level.
Which statement is true about the associated file system?
A. It is managed by the compute resource. B. It is managed by the storage.
C. It is part of the network. D. It is managed by the application.
Answer: A

24) An organization runs a proprietary operating system for its custom applications. System
performance has been declining at an increasing rate. They would like to leverage a Cloud
solution to address their problem.Which Cloud service model would be appropriate for them?

A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a-


Service
Answer: A

25) Which process provides data access control by restricting host access to specific LUN(s)?
A. LUN masking **
B. Zoning
C. Trespassing
D. VSAN

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 4 of 21
26) Which is a benefit of server clustering?

A.High CPU utilization B. High availability C. High memory utilization D. High


security
Answer: B

27) Which Cloud service model allows the user to run any operating system and application?
A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service
D.IT-as-a-Service
Answer: B

28) Which Cloud service model is most appropriate for application development?
A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service
D.IT-as-a-Service
Answer: B

29) What is an F_Port in FC SAN?


A. Switch port that connects an E_Port
B. Switch port that connects an N_Port **
C. Node port that connects an N_Port
D. Node port that connects an E_Port

30) Which is a benefit of zoning in FC SAN?


A. Isolates fabric services
B. Restricts RSCN traffic **
C. Enables online volume expansion
D. Provides non-disruptive data migration

31) What best describes virtual machines (VMs)?


A. All VMs on a physical server must run same OS
B. VM files are deleted when VM is powered off
C. VMs are discrete sets of files **
D. All VMs share available resources equally

32) Which component of an intelligent storage system isolates host from the mechanical delays
associated with rotating disks?
A. Front-end controller
B. Back-end controller
C. Cache **
D. Storage network
33) Which mode of flushing is activated when the cache reaches 100% of its capacity?
A. Idle
B. High watermark
C. Forced **
D. Low watermark
34) Which cable type provides minimum signal attenuation over long distance?
A. Twisted-pair copper
B. Coaxial copper
C. Single-mode optical **
D. Multimode optical

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 5 of 21
35) Which type of fabric login enables the exchange of upper layer protocol-related parameters
between N_Ports?
A. Fabric login
B. Port login
C. Process login **
D. ULP login
36) Which factors contribute to the overall service time of a mechanical disk?
A. Disk buffer time, full stroke, and rotation latency
B. Internal transfer rate, external transfer rate, and buffer time
C. Full stroke, average seek time, and track-to-track seek time
D. Average seek time, rotational latency, and data transfer rate **

37) Which is a feature of scale-out NAS?


A. Uses general purpose operating system for file serving
B. Creates multiple file systems on each node in the cluster
C. Uses external and independently-managed nodes
D. Enables pooling of nodes that work as a single NAS device **

38) Which statement best describes the capability of the FCIP protocol?

(a) Enables the creation of virtual IP links over FC network


(b) Enables the creation of virtual FC links over FCoE network
(c) Enables the creation of virtual TCP links over IP network
(d) Enables the creation of virtual FC links over IP network

Answer: d
39) What best describes Recovery Point Objective (RPO)?

(a) The time within which business operations must resume after an outage
(b) The amount of data that an application must lose after an outage
(c) The time within which systems and applications must be recovered after an outage
(d) The point-in-time to which systems and data must be recovered after an outage

Answer: d

40) Which formula is used to calculate "mean time between failure (MTBF)"?

(a) MTBF = uptime/(uptime + downtime)


(b) MTBF = total downtime/number of failures
(c) MTBF = downtime/(uptime + downtime)
(d) MTBF = total uptime/number of failures

Answer: d

41) Which is a benefit of VSAN?


A. Improves security by isolating traffic between VSANs **
B.Eliminates need for fabric login process
C. Provides higher network bandwidth
D. Enables VSANs to share fabric zoning service

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 6 of 21
42) What enables communication among a group of nodes regardless of their physical location in a
Fibre Channel fabric?

(a) Virtual SAN


(b) File storage virtualization
(c) Block storage virtualization
(d) Virtual router

Answer: a

43) Which iSCSI topology does the graphic represent?


A. Bridged
B. Native
C. Combined
D. Isolated

Answer: Bridged

44) Which NAS implementation consolidates file-based and block-based access on a single storage
platform?
A. Unified **
B.Scale-out
C. Gateway
D. Both gateway and scale-out

45) Which type of iSCSI name requires a registered domain name to generate unique iSCSI
identifier?
A. iqn **
B. eui
C. WWN
D. MAC

46) Which Fibre Channel layer defines flow control and routing?

(a) FC-1
(b) FC-2
(c) FC-3
(d) FC-4

Answer: b

47) Which iSCSI host connectivity option offloads both iSCSI and TCP/IP processing from the
host CPU?
A. Standard NIC with iSCSI initiator software
B. iSCSI HBA **
C. TOE NIC
D. CNA

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 7 of 21
48) Which protocol encapsulates FC frames onto IP packet?
A. FCoE
B. FCIP **
C. iSCSI
D. CIFS
49) Which component of a NAS head translates file-level requests into block-storage requests?
A. Front-end ports
B. Optimized operating system **
C. CIFS and NFS
D. Network Interface Card

50) Which is a feature of gateway NAS?


A. Uses dedicated storage for each NAS head
B. NAS head and storage are managed independently **
C. Creates a single file system that runs on all NAS heads
D. Provides connectivity to iSCSI and FC hosts

Question Two : Answer ALL the following Question Each Point [2 Mark] Total [10 Marks]

1- Define cloud computing and Describe the essential cloud characteristics


2- There are two different Types of Hypervisor , explain
3- Differentiate between Conventional Hard Drives and Flash Drives
4- Describe the key components of intelligent storage system
5- Differentiate between different type of Mesh Topology

1- Define cloud computing and Describe the essential cloud characteristics [2 Marks]

cloud computing : A model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources, (e.g., servers, storage, networks, applications, and
services) that can be rapidly provisioned and released with minimal management effort or service
provider interaction.

the essential cloud characteristics


• On-demand self-service
• Broad network access
• Resource pooling
• Rapid elasticity
• Measured service

2- There are two different Types of Hypervisor , explain [2 Marks]

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 8 of 21
Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A
bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware
resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However,
this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the
hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is
designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities
such as resource management, high availability, security, and so on. In contrast to a bare-metal
hypervisor, a hosted hypervisor is installed as an application on an operating system. In this
approach, the hypervisor does not have direct access to the hardware and all requests must pass
through the operating system running on the physical compute system. Hosted hypervisors are
compatible with all the devices that are supported by the operating system on which it is installed.
Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are
many services and processes running on an operating system that are consuming compute system
resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training
purposes.

3-Differentiate between Conventional Hard Drives and Flash Drives [2 Marks]

4-Describe the key components of intelligent storage system [2 Marks]

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 9 of 21
5-Differentiate between different type of Mesh Topology [2 Marks]

• Full mesh
 Each switch is connected to every other switch
 Maximum of one ISL or hop is required for host-to-storage traffic
 Host and storage can be connected to any switch
• Partial mesh
 Not all the switches are connected to every other switch

Question Two : Answer only 10 of the following Question Each Point [3 Mark] Total [30 Marks]

1- Differentiate between different types of services models of cloud computing and different
types of deplyment models .
2- Describe the cloud computing reference model including all entities that operate at this
layer and Functions of the physical layer (support your answer with figures).
3- List different Fabric Port Types and explain the different Types of Zoning
4- Explain briefly the main Components of FC SAN
5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA
and SCSI , and etc. .
6- Explain the two different types of Read Operation with Cache and the two different types
of write Operation with Cache
7- Explain briefly the main Components of FC SAN and its implementations
8- Differntionate by graph between Data Center Infrastructure – Before Using FCoE and
after Using FCoE
9- Sometimes , Some people considered that backup and replication are two sides of the same
coin , Explain the validity of previous information.
10- Explain the differnec between difernt type of protocol stack of FC SAN , IP SAN
11- Differntionate between different RAID levels according to minimum number of disks ,
available storage capacity % ,write penality , and protection.

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 10 of 21
1-Differentiate between different types of services models of cloud computing and different types of
deplyment models .
A cloud service model specifies the services and the capabilities that are provided to consumers. In
SP 800-145, NIST classifies cloud service offerings into the three primary models listed below:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
The different service models provide different capabilities and are suitable for different consumers
and business objectives. The factors that a provider should take into consideration while adopting a
particular cloud service model are covered in ‘Building the Cloud Infrastructure’ module.
Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various
publications and by different industry groups. These service models are specific to certain specialized
cloud services and capabilities that (they) provide. Such cloud service models are Backup as a
Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS),
Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on.
However, these models eventually belong to one of the three primary cloud service models.

A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and
accessed. In SP 800-145, NIST specifies the four primary cloud deployment models listed below:
Public cloud
Private cloud
Hybrid cloud
Community cloud
Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and
SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost,
and availability of resources.

2- Describe the cloud computing reference model including all entities that operate at this layer and
Functions of the physical layer (support your answer with figures).

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 11 of 21
3- List different Fabric Port Types and explain the different Types of Zoning
A port in a switched fabric can be one of the following types:
• N_Port is an end-point in the fabric. This port is also known as the node port (or FC adapter port). Typically,
it is a compute system port (on an FC HBA) or a storage system port connected to a switch in a fabric.
• E_Port is a switch port that forms a connection between two FC switches. This port is also known as an
expansion port. The E_Port on an FC switch connects to the E_Port of another FC switch in the fabric
through ISLs.
• F_Port is a port on a switch that connects an N_Port. It is also known as a fabric port.
• G_Port is a generic port on some vendors’ switches. It can operate as an E_Port or an F_Port and determines
its functionality automatically during initialization.

• Zoning can be categorized into three types: WWN zoning, port zoning, and mixed zoning.
• WWN zoning uses WWNs to define zones. The zone members are the unique WWPN addresses of the ports
in HBA and its targets (storage systems). A major advantage of WWN zoning is its flexibility. WWN zoning
allows nodes to be moved to another switch port in the fabric and to maintain connectivity to their zone
partners without having to modify the zone configuration. This is possible because the WWN is static to the
node port.
• Port zoning uses the switch port identifier to define zones. In port zoning, access to data is determined by the
physical switch port to which a node is connected. The zone members are the port identifier (switch domain
ID and port number) to which an HBA and its targets are connected. If a node is moved to another switch
port in the fabric, then zoning must be modified to allow the node, in its new port, to participate in its

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 12 of 21
original zone. However, if an HBA or a storage system port fails, an administrator just has to replace the
failed device without changing the zoning configuration.
• Mixed zoning combines the qualities of both WWN zoning and port zoning. Using mixed zoning enables a
specific node port to be tied to the WWN of a node.

4- Explain briefly the main Components of FC SAN


The key FC SAN components include network adapters, cables and connectors, and interconnecting
devices.
Each node requires one or more network adapters to provide a physical interface for communicating
with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage
system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS
(or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC
storage systems over an FC SAN.
FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper
cables might be used for shorter distances. A connector may attach at the end of a cable to enable
swift connection and disconnection of the cable to and from a port.
FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward
data from one physical switch port to another. Directors are high-end switches with a higher port
count and better fault-tolerance capabilities than smaller switches (also known as “departmental”
switches). Switches are available with a fixed port count or with a modular design. In a modular
switch, the port count is increased by installing additional port cards into empty slots. Modular
switches enable online installation of port cards. The architecture of a director is usually modular,
and its port count is increased by inserting line cards or blades to the director’s chassis.

5- Differentiate between different types of Storage connectivity protocols


such as IDE/ATA and SCSI , and etc. .
IDE/ATA and Serial ATA
• Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA)
 Popular interface used to connect hard disks or CD-ROM drives
 Available with varity of standards and names
• Serial Advanced Technology Attachment (SATA)
 Serial version of the IDE/ATA specification that has replaced the parallel ATA
 Inexpensive storage interconnect, typically used for internal connectivity
 Provides data transfer rate up to 6 Gb/s (standard 3.0)
SCSI and SAS
• Parallel Small computer system interface (SCSI)
 Popular standard for connecting host and peripheral devices
 Commonly used for storage connectivity in servers
 Higher cost than IDE/ATA, therefore not popular in PC environments

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 13 of 21
 Available in wide variety of related technologies and standards
 Support up to 16 devices on a single bus
 Ultra-640 version provides data transfer speed up to 640 MB/s
• Serial Attached SCSI (SAS)
 Point-to-point serial protocol replacing parallel SCSI
 Supports data transfer rate up to 6 Gb/s (SAS 2.0)
Fibre Channel and IP
• Fibre Channel (FC)
 Widely used protocol for high speed communication to the storage device
 Provides a serial data transmission that operates over copper wire and/or optical fiber
 Latest version of the FC interface ‘16FC’ allows transmission of data up to 16 Gb/s
• Internet Protocol (IP)
 Traditionally used to transfer host-to-host traffic
 Provide opportunity to leverage existing IP based network for storage communication
Examples: iSCSI and FCIP protocols

6- Explain the two different types of Read Operation with Cache and the two different types of write
Operation with Cache

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 14 of 21
7-Explain briefly the main Components of FC SAN and its implementations
Components of FC SAN
• Node (server and storage) ports
• Cables
• Connectors
• Interconnecting devices such as FC switches and hubs
• SAN management software
Components of a NAS device:
-Network Interface
-NFS
-CIFS
-Dedicated optimized OS
-Storage interface

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 15 of 21
NAS Implementation – 1- Unified NAS

• Consolidates NAS-based (file-level) and SAN-based (block-level) access on a single storage


platform
• Supports both CIFS and NFS protocols for file access and iSCSI and FC protocols for block
level access
• Provides unified management for both NAS head and storage

NAS Implementation – 2- Gateway NAS

• Uses external and independently-managed storage


• NAS heads access SAN-attached or direct-attached storage arrays
• NAS heads share storage with other application servers that perform block I/O
• Requires separate management of NAS head and storage

NAS Implementation – 3- Scale-out NAS

• Pools multiple nodes together in a cluster that works as a single NAS device
Pool is managed centrally
• Scales performance and/or capacity with addition of nodes to the pool non-disruptively
• Creates a single file system that runs on all nodes in the cluster
Clients, connected to any node, can access entire file system
File system grows dynamically as nodes are added
• Stripes data across all nodes in a pool along with mirror or parity protection

8-Differntionate by graph between Data Center Infrastructure – Before Using FCoE and after Using
FCoE

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 16 of 21
9- Sometimes , Some people considered that backup and replication are two sides of the same coin ,
Explain the validity of previous information.

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 17 of 21
Backup vs. Replication

Definition
Backup involves making a copy or copies of data.
Replication is the act of copying and then moving data between a company’s sites. It is typically
measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Requirements
Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store
archived tapes.
Replication requires investment in another, identical, infrastructure, effectively doubling your IT
costs.
Purpose
Backup focuses on compliance and granular recovery, such as recovering a single user’s emails from
5 years ago.
Replication and recovery focus on business continuity — quick and easy resumption of operations
after a disaster or corruption. Minimizing the recovery time objective (RTO) is key.
Uses
Backup is typically used for everything in the enterprise, from critical production servers to
desktops.
Replication is often used for mission-critical applications that must always be up and running.
How it Works
Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point
in time.
Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data
Protection (CDP) to enable users to access historic images.
Bottom Line
Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure
continuity of operations.
Focused on ensuring that business applications and processes are always available, even after a
disaster. More expensive to set up and maintain.
This table begs the question asked by Chris Mellor in a post on The Register

10 Explain the differnec between difernt type of protocol stack of FC SAN , IP SAN

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 18 of 21
12- Differntionate between different RAID levels according to minimum number of disks ,
available storage capacity % ,write penality , and protection.

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 19 of 21
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 20 of 21
Good Luck Dr. Diaa Salama

Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 21 of 21

Potrebbero piacerti anche