Sei sulla pagina 1di 29

OBJECTIVE QUESTIONS

UNIT-1
1. What is an important concern for the customer in multi-tenant environments?
A. Availability
B. Network bandwidth
C. Network latency
D. Security
2. Virtualization is a key architectural feature of Cloud computing.
What is another one of these key characteristics of Cloud computing?
A. the use of secured access
B. the use of Service Level Agreements
C. the use of standard protocol
D. the use of the Internet
3. Where did the Internet begin?
A. a cluster of cooperating universities in the USA
B. computer hobbyists
C. the CIA
D. the Department of Defense of the USA
4. What is a benefit of Cloud Computing for IT staff?
A. higher payment of IT staff involved in Cloud Computing
B. less interruption of work caused by users asking for support
C. less knowledge needed: Cloud Computing does not require special skills
D. lower stress levels: less worry about normal daily activities like making back-ups
5. What is a correct description of a Thin Client?
A. a Client computer without a screen
B. a mobile phone with access to the Internet
C. a Personal Computer without a hard drive
D. a user terminal without a processor
6. What is Multi-tenancy?
A. An architecture in which a single instance of a software application serves multiple
customers.
B. An architecture in which each customer has their own software instance.
C. A way of thinking in terms of services and service-based development and the outcomes of
services.
D. The act of creating a virtual (rather than actual) version of something, including (but not
limited to) a virtual computer hardware platform, operating system (OS), storage device, or
computer network resources.
7. The ISO/IEC 20000-1:2011 standard requires that ISO/IEC 20000 processes are
documented.
Who needs to show that they are familiar with the processes and adhere to the procedures and
working instructions?
A. Only the organization, because they are responsible for the processes.
B. Only the Cloud service provider, because they take over all responsibility.
C. Both the organization and the Cloud service provider, because they share responsibility.
D. Neither the organization, nor the Cloud service provider, because the processes within
Cloud computing are outside the scope of ISO/IEC 20000.
8. Which service model allows the customer to choose more layers in the computing
architecture?
A. Infrastructure as a Service (IaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. There is no difference between the service models.
9. What is an example of a single purpose environment?
A. any application on any server
B. interface to a large computer
C. interface to large storage
D. Mainframe
10. What is Federation in Identity management?
A. cloud-based Identity management enabling single sign-on (SSO) for multiple systems
B. systems in the Cloud sharing information about the identity of users
C. the cloud of all systems accessible by a single user
D. the identity of a group of users sharing the same cloud resources
11. What is the benefit of storage availability in the Cloud?
A. Additional storage does not require budget for new large storage devices.
B. Storage in the Cloud has a higher availability than storage devices in the Local Area
Network (LAN).
C. Storage in the Cloud has shorter access times than storage in the LAN.
D. Storage in the Cloud is easier to protect against intrusion.
12. Which question do you not have to ask when moving your local Cloud network to a
hybrid environment?
A. How do I test if my provider has everything under control?
B. How well is my data protected against theft?
C. What happens to my data when I’m not using it?
D. What will my customers notice from the move?
13. What is Abuse of Cloud Services?
A. An intolerable system slowdown leaves all of the legitimate service users confused and
angry as to why the service isn’t responding.
B. Cloud provider may not only host your data and applications, but also malicious software.
C. Moving into the Cloud may make it more difficult for organizations to prove their
compliance to legislation and regulations during external audits.
D. Some of the cloud providers staff or sub-contractor staff may be untrustworthy.
14. Why is a trial period needed when considering to use Software as a Service (SaaS)?
A. to establish the required bandwidth for using the cloud services
B. to evaluate whether the cloud services will be useful
C. to find out whether the vendor will meet the Service level agreement (SLA)
D. to have time to accommodate the local network to use of the new services
15. Why are standards used in Cloud Computing?
A. Standards provide compliance.
B. Standards provide location independence.
C. Standards provide portability.
D. Standards provide security.
16. What is a major limitation in using applications on mobile platforms?
A. lack of applications available for mobile platforms
B. limited memory of mobile phones
C. not all applications are available for all mobile platforms.
D. there is no enterprise applications available for the mobile platforms
17. What is an important limitation of Cloud Computing?
A. automation
B. increased costs
C. privacy
D. shared resources
18. In a cloud environment, consumers become dependent upon providers for products and
services.
What is a term used to describe the difficulties in migrating a software application from one
provider to another?
A. Data conversion plan
B. Loyalty program
C. Marketing strategy
D. Vendor lock-in
19. What is a staffing benefit of Cloud Computing?
A. fewer IT-staff
B. higher recruitment
C. managed services
D. self-service
20. What is a Virtual Private Network (VPN)?
A. a secured connection for remote access to a Local Area Network (LAN)
B. a secured private cloud for a single user
C. a virtual network device for private purposes
D. an operating system for private network systems
21. What is not a valid reason for the customer asking a Cloud provider where their servers
are located?
A. Geographical location may tell something about network latency.
B. The geographical location may tell something about legislation.
C. The number of sites tells you something about disaster recovery possibilities.
D. When a server breaks down, the customer wants to send a technician to fix the problem as
soon as possible.
22. Why is it beneficial to businesses that Cloud computing involves managed services?
A. All services are managed, even when a Cloud provider goes out of business.
B. Cloud services automatically comply with the national and international legislation.
C. The business does not have to worry about the performance of Cloud services.
D. The business’ own IT department can shift the focus away from operational issues.
23. What is information that can be used to uniquely identify, contact, or locate a single
person or can be used with other sources to uniquely identify a single individual?
A. Enterprise Architecture (EA)
B. Personal Identifiable Information (PII)
C. Service Oriented Architecture (SOA)
D. Single sign-on (SSO)
24. What is an important benefit of Cloud Computing?
A. highly protected data
B. independency from the Internet
C. reduced cost
D. small bandwidth
25. What is a risk of providing Cloud based services?
A. data continuity
B. elasticity
C. self-service
D. virtualization
26. What is a correct definition of Cloud Computing?
A. a large pool of usable and accessible virtualized resources
B. a network of globally interconnected client computers
C. a service architecture based on thin clients
D. a service offered by a Service provider, not limited by a Service level agreement (SLA)
27. You are a small business owner who wants to move all of your IT to the Cloud. You are
growing and want dynamic scaling. You expect the desktops of your employees to be
virtualized. You discuss some policy-based services with the Cloud provider.
What type of service model will you be discussing?
A. IaaS
B. PaaS
C. SaaS
D. XaaS
28. What is the purpose of the HIPAA Privacy Rule?
A. to have the Hypervisor protect private data
B. to protect personal financial and accounting information
C. to protect personal health information
D. to protect private information in HTML documents
29. What is an important requirement for applications to be accessible in the Cloud?
A. The application should be compatible with the browser of the user's computer.
B. The application should use the same programming language as the clients.
C. The user should know on which server the application is located.
D. The user's identity should be known by the application.
30. Authentication means asking: “Who are you?” Authorization means asking: “What are
you allowed to do?”
What does the Accounting characteristic from triple-A ask?
A. How much money do you need to pay?
B. What are you going to do?
C. What did you do?
D. What resources will you need?
31. Which process is not covered by ISOIEC 20000?
A. Configuration management
B. People management
C. Service level management
D. Supplier management
32. What is not a mitigating measure against data loss?
A. audits
B. authentication and authorization
C. encryption
D. Storage area network (SAN)
33. What is a big benefit of Cloud based services for a small Internet based business starting
up?
A. the data security and privacy
B. the high Operational Expenditure (OPEX)
C. the service level agreement (SLA)
D. the short implementation time
34. What top threat to Cloud computing refers to components that may not have been
developed for multi-tenant architecture and may cause security issues?
A. Account or Service Traffic Hijacking
B. Denial of Service (DoS)
C. Malicious Insiders
D. Shared Technology Vulnerabilities
35. How does Cloud Computing change the relationship between provider and customer?
A. increased focus on Service level agreements (SLAs)
B. less compliance to standards
C. less focus on SLAs
D. more focus on training
36. What risk is minimized by proper HR vetting procedures?
A. account, service, and traffic hijacking
B. insecure application interfaces
C. malicious insiders
D. shared technology vulnerabilities
37. What can be done to make maximum use of the interoperability principle of Cloud
Computing?
A. Employ multiple system integrators to build your private cloud.
B. Only use cloud providers located in Europe.
C. Use hardware and software of a single vendor.
D. Use standard protocols.
38. What are the main hardware components of a local Cloud environment?
A. Blade server, Local Area Network (LAN), load balancer, storage
B. Virtual desktop, Local Area Network (LAN), load balancer, storage
C. Blade server, virtual desktop, Local Area Network (LAN), load balancer
D. Virtual desktop, blade server, load balancer, storage
39. Why did virtualization boost the emergence of Cloud Computing?
A. A virtual machine is more secure than a physical machine.
B. Virtualization made it easier and cheaper to share resources between users.
C. Virtual machines have greater performance than their physical counterparts.
D. Virtualization leads to better network utilization.
40. Failover is the capacity to switch automatically to another system or resource in the event
of a failure.
Which Cloud property makes failover easier to scale in the Cloud than on physical servers?
A. Internet connection
B. multi-purpose
C. multi-tenancy
D. virtualization

UNIT-II
1. _________ model consists of the particular types of services that you can access on a cloud
computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Answer:a
2. Point out the correct statement :
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
Answer:b
3. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Answer:b
4. Which of the following is deployment model?
a) public
b) private
c) hybrid
d) All of the mentioned
Answer:d
5. Point out the wrong statement :
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
Answer:b
6. Which of the following is best known service model ?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
Answer:d
7. The __________ model originally did not require a cloud to use virtualization to pool
resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
Answer:b
8. _______ model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube
d) All of the mentioned
9. How many types of dimensions exists in Cloud Cube Model?
a) 1
b) 2
c) 3
d) 4
Answer:d
10. Which of the following dimension is related to organization’s boundaries ?
a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned
Answer:a
11) How many types of security boundary values exist in Cloud Cube model?
a) 1
b) 2
c) 3
d) None of the mentioned
Answer:b
12. Point out the correct statement :
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
Answer:a
13. Which of the following is provided by ownership dimension of Cloud Cube Model ?
a) Proprietary
b) Owner
c) P
d) All of the mentioned
Answer:b
14. __________is a measure of whether the operation is inside or outside the security
boundary or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned
Answer:d
15. Point out the wrong statement :
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
Answer:a
16. Which of the following is related to service provided by Cloud ?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
Answer:a
17. ________ dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned
Answer:d
18. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer:b
19. __________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer:c
20. A hybrid cloud combines multiple clouds where those clouds retain their unique
identities, but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
Answer:d

UNIT-III
1. Which of the following is owned by an organization selling cloud services ?
a) Public
b) Private
c) Community
d) Hybrid
Answer:a
2. Point out the wrong statement :
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in which
infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services, development
frameworks, transactions, and control structures
d) All of the mentioned
Answer:c
3. _______ provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:a
4. Which of the following provides development frameworks and control structures ?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:c
5. Point out the wrong statement :
a) A PaaS service adds integration features, middleware, and other orchestration and
choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid Cloud
computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw
d) None of the mentioned
Answer:d
6. _______ is a complete operating environment with applications, management, and the user
interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:b
7. How many types of service model are mainly present in Cloud ?
a) 1
b) 2
c) 3
d) 4
Answer:c
8. The three different service models is together known as the _____ model of cloud
computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
Answer:a
9. CaaS stands for _____________ as service.
a) Compliance
b) Computer
c) Community
d) Communication
Answer:d
10. Which of the following is IaaS service provider?
a) EC2
b) EC1
c) EC10
d) Hybrid
Answer:a
11. The cost of a cloud computing deployment is roughly estimated to be :
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD x (Revenue + CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) All of the mentioned
Answer:c
12. Point out the correct statement :
a) Cloud resource pricing doesn’t always scale linearly based on performance
b) Depending upon the service model type, other resources add additional unit costs
c) Typical efficiency in datacenters are between 10 and 55 percent
d) All of the mentioned
Answer:a
13. The costs associated with resources in the cloud computing model _______ can be
unbundled to a greater extent than the costs associated with Cost DATACENTER.
a) CLOUD
b) Cost CLOUD
c) CCLOUD
d) All of the mentioned
Answer:b
14. Security methods such as private encryption, VLANs and firewalls comes under
__________ subject area.
a) CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue –
(CostDATACENTER/Utilization))SYSTEMn
b) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue –
(CostDATACENTER/Utilization))SYSTEMn
c) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
+(CostDATACENTER/Utilization))SYSTEMn
d) All of the mentioned
Answer:b
15. Point out the wrong statement :
a) Datacenter operates under average loads
b) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
c) Private cloud doesn’t employ the same level of virtualization
d) None of the mentioned
Answer:c
16. For a server with a four-year lifetime, you would therefore need to include an overhead
roughly equal to ___ percent of the system’s acquisition
cost.
a) 10
b) 20
c) 25
d) All of the mentioned
Answer:c
17. The overhead associated with ____ staff is a major cost.
a) Data Center
b) IT
c) Non IT
d) All of the mentioned
Answer:b
18. Moving expenses onto the _____ side of a budget allows an organization to transfer risk
to their cloud computing provider.
a) Dex
b) OpEx
c) Pex
d) All of the mentioned
Answer:b
19. ________ is surely an impediment to established businesses starting new enterprises.
a) Proposition
b) Capitalization
c) Globalization
d) None of the mentioned
Answer:b
20. Cloud computing is also a good option when the cost of infrastructure and management is
______
a) low
b) high
c) moderate
d) None of the mentioned
Answer:b

UNIT-IV
1. Which of the following is most complete cloud computing service model ?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
Answer:d
2. Point out the correct statement :
a) Platforms can be based on specific types of development languages, application
frameworks, or other constructs
b) SaaS is the cloud-based equivalent of shrink-wrapped software
c) Software as a Service (SaaS) may be succinctly described as software that is deployed on a
hosted service
d) All of the mentioned
Answer:d
3. Which of the following aspect of the service is abstracted away ?
a) Data escrow
b) User Interaction
c) Adoption drivers
d) none of the mentioned
Answer:b
4. Which of the following SaaS platform is with an exposed API ?
a) Salesforce.com
b) amazon.com
c) flipkart.com
d) All of the mentioned
Answer:a
5. Point out the wrong statement :
a) SaaS applications come in all shapes and sizes
b) Every computer user is familiar with SaaS systems
c) SaaS software is not customizable
d) None of the mentioned
Answer:d
6. Which of the following is a SaaS characteristic?
a) The typical license is subscription-based or usage-based and is billed on a recurring basis
b) The software is available over the Internet globally through a browser on demand
c) The software and the service are monitored and maintained by the vendor
d) All of the mentioned
Answer:d
7. _________ applications have a much lower barrier to entry than their locally installed
competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
Answer:d
8. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) All of the mentioned
Answer:b
9. Open source software used in a SaaS is called _______ SaaS.
a) closed
b) free
c) open
d) All of the mentioned
Answer:c
10. The componentized nature of SaaS solutions enables many solutions to support a feature
called :
a) workspace
b) workloads
c) mashups
d) All of the mentioned
Answer:c
11. Which of the following can be referred to as productivity software ?
a) DBMS
b) Word processors
c) Presentation software
d) All of the mentioned
Answer:d
12. Point out the correct statement:
a) Management of cloud storage is performed by out-of-band management systems through a
data storage interface
b) Out-of-band refers to a management console that isn’t on the storage network
c) Out-of-band is most often on an Ethernet network inside a browser
d) All of the mentioned
Answer:d
13. Which of the following can be tagged as frequently used secondary category
applications?
a) Personal Information Managers
b) Scheduler
c) HTML editors
d) All of the mentioned
Answer:c
14. Which of the following is characteristic of productivity software ?
a) Standards for data interchange
b) User-centric
c) Static features
d) All of the mentioned
15. Point out the wrong statement:
a) A CDMI container can be exported and then used as a virtual disk by Virtual Machines in
the cloud
b) CDMI and OCCI are meant to interoperate
c) The cloud infrastructure management console can be used to attach exported CDMI
containers to the Virtual Machine that is desired
d) None of the mentioned
Answer:d
16. Which of the following is disadvangtage of online office suite ?
a) Generally lower costs for users
b) Platform independence
c) Reduced maintenance costs
d) An Internet connection is required to access your documents
Answer:d
17. Which of the following benefit is provided by cloud computing office suite ?
a) Easier document sharing
b) More secure
c) No full Control
d) None of the mentioned
Answer:a
18. Which of the following is Adobe’s application suite of cloud-based applications ?
a) Acrobat.com
b) Openoffice
c) Gpdf
d) All of the mentioned
Answer:a
19. Which of the following tool cannot be found at Acrobat.com ?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer:c
20. Which of the following Acrobat word processor offers a capable set of office applications
and makes good use of Adobe Flash animation in its interface ?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer:a

UNIT-V
1) Which of the following systems allow short text messages to be exchanged?
a) SMS
b) IMS
c) JVS
d) All of the mentioned
Answer:a
2. Point out the correct statement:
a) Aggregation also can be done within software creating a custom Web page
b) The Add Stuff link in iGoogle takes you to the content management system
c) When you return to iGoogle, the feed appears within an Ajax frame that can be moved
around on the page or moved to additional tabs that you can create
d) All of the mentioned
Answer:d
3. _____ builds on the older concept of Internet chat to add a more immediate response to
text messages between individuals and groups.
a) VM
b) IM
c) SM
d) None of the mentioned
Answer:b
4. Which of the following can be a form of Instant messaging application ?
a) Discrete instant messaging desktop clients
b) Enterprise messaging services
c) Browser-based IM clients
d) All of the mentioned
Answer:d
5. Point out the wrong statement:
a) Syndicated content appears in iGoogle inside Ajax frames that can be arranged in pages
b) RSS and Atom are prototypes of a class of XML specifications called syndication markup
languages
c) Webmail services are often free, browser-based, and platform-independent
d) None of the mentioned
Answer:d
6. Which of the following feature is provided by Instant messaging ?
a) Rich contact management
b) File transfers
c) E-mail integration
d) All of the mentioned
Answer:d
7. Which of the following is also referred to as Windows Live Messenger native client
contact ?
a) Friends list
b) Buddy list
c) Contact list
d) None of the mentioned
Answer:b
8. Which of the following should be replaced with question mark in the figure shown ?

a) Glide
b) Acrobat
c) Google Docs
d) None of the mentioned
Answer:b
9. Which of the following Webmail service has IM clients embedded in it ?
a) Yahoo Office Communications Server
b) Microsoft Office Communications Server
c) AOL Server
d) All of the mentioned
Answer:b
10. Which of the following feature is provide by standards shown in the following figure ?

a) Scalability
b) Interoperability
c) Reliability
d) None of the mentioned
Answer:b
11. Which of the following is the most commonly used standard for performing
synchronization ?
a) SyncML
b) SMIL
c) SML
d) None of the mentioned
Answer:a
12. Point out the wrong statement:
a) Data synchronization is an important Web service for mobile devices
b) Contact, calendar, and information on devices often need to be synchronized between
multiple systems
c) SyncML is implemented using a SyncML server or alternatively as a SyncML hosted
service
d) None of the mentioned
Answer:d
13. Which of the following data type may be synchronized by SyncML ?
a) Files
b) Memos
c) Tasks
d) All of the mentioned
Answer:d
14. Which of the following services is an example of SMS gateway ?
a) Microsoft Live
b) Direct to SMSC gateway
c) Y-Mail service
d) All of the mentioned
Answer:b
15. Point out the correct statement:
a) The CnML protocol finds support in a number of products from major mobile software and
hardware vendors
b) The desktop-to-mobile sync application Windows Mobile Device Center allows a mobile
client to synchronize to a desktop
C) Desktop ActiveSync is not supported by some third-party mail servers
d) All of the mentioned
Answer:b
16. Which of the following allows you to attach sounds, pictures, icons, and even formatted
text with your message ?
a) EMS
b) SMS
c) MMS
d) All of the mentioned
Answer:a
17. Which of the following uses a combination of WAP and SMS for its transport ?
a) EMS
b) SMS
c) MMS
d) All of the mentioned
Answer:c
18. Which of the following protocol is used for transaction monitoring service based on a
request/response mechanism ?
a) WTP
b) WTLS
c) WDP
d) All of the mentioned
Answer:a
19. Which of following public-key encryption method is used for the same purpose as TLS ?
a) WTP
b) WTLS
c) WDP
d) All of the mentioned
Answer:b
20. Which of the following provides unreliable data transport data formatting ?
a) WTP
b) WTLS
c) WDP
d) WAE
Answer:c

PART-A SOLUTIONS
UNIT - I

1. What is HTC and HPC? Explain in detail each with an example


A: For many research and engineering projects, the quality of the research or the product is
heavily dependent upon the quantity of computing cycles available. It is not uncommon to find
problems that require weeks or months of computation to solve. Scientists and engineers
engaged in this sort of work need a computing environment that delivers large amounts of
computational power over a long period of time. Such an environment is called a High-
Throughput Computing (HTC) environment. In contrast, High Performance Computing (HPC)
environments deliver a tremendous amount of compute power over a short period of time. HPC
environments are often measured in terms of FLoating point Operations per Second (FLOPS).
But a growing community is not concerned about FLOPS, as their problems are on a much
larger scale. These people are concerned with floating point operations per month or per year.
They are more interested in how many jobs they can complete over a long period of time instead
of how fast an individual job can complete.
Example: Weather Prediction Forecasts on a global scale

2. What is Parallel computing Vs Distributed Computing?


A: Parallel computing is a term usually used in the area of High Performance Computing
(HPC). It specifically refers to performing calculations or simulations using multiple
processors. Supercomputers are designed to perform parallel computation. These system do
not necessarily have shared memory (as incorrectly claimed by other answers). OpenMP a
tool used in the space will work on a single machine or clusters of machines found in
supercomputers.
Distributed computing is a term that actually is more general than parallel computation. One
could use distributed computing in the same sense a parallel computing to mean that
computation is distributed among many different computers. However, distributed computing
deals with additional aspects other than concurrency. Distributed computing deals with
additional capabilities that may include consistency, availability and partition tolerance. These
deal with the properties of a distributed system in the event of different kinds of failures.
Parallel computing is a computation type in which multiple processors execute multiple tasks
simultaneously. Distributed computing is a computation type in which networked computers
communicate and coordinate the work through message passing to achieve a common goal.
Number of Computers Required
Parallel computing occurs on one computer. Distributed computing occurs between multiple
computers.
Processing Mechanism
In parallel computing multiple processors perform processing. In distributed computing,
computers rely on message passing.
Synchronization
All processors share a single master clock for synchronization. There is no global clock in
distributed computing, it uses synchronization algorithms
Memory
In Parallel computing, computers can have shared memory or distributed memory. In
Distributed computing, each computer has their own memory.
Usage
Parallel computing is used to increase performance and for scientific computing. Distributed
computing is used to share resources and to increase scalability.

3. What is Degree of Parallelism? Explain it various types


A: The degree of parallelism (DOP) is a metric which indicates how many operations can be
or are being simultaneously executed by a computer. It is especially useful for describing the
performance of parallel programs and multi-processor systems.
A program running on a parallel computer may utilize different numbers of processors at
different times. For each time period, the number of processors used to execute a program is
defined as the degree of parallelism. The plot of the DOP as a function of time for a given
program is called the parallelism profile.

4. What is an Utility Computing? Give an Example.


A: Utility computing is the process of providing computing service through an on-demand,
pay-per-use billing method. Utility computing is a computing business model in which the
provider owns, operates and manages the computing infrastructure and resources, and the
subscribers accesses it as and when required on a rental or metered basis. Utility computing is
one of the most popular IT service models, primarily because of the flexibility and economy it
provides. This model is based on that used by conventional utilities such as telephone services,
electricity and gas. The principle behind utility computing is simple. The consumer has access
to a virtually unlimited supply of computing solutions over the Internet or a virtual private
network, which can be sourced and used whenever it's required. The back-end infrastructure
and computing resources management and delivery is governed by the provider. Utility
computing solutions can include virtual servers, virtual storage, virtual software, backup and
most IT solutions. Cloud computing, grid computing and managed IT services are based on the
concept of utility computing.

5. What is Cyber Physical System?


A: A cyber-physical system (CPS) is an integration of computation with physical processes
whose behaviour is defined by both cyber and physical parts of the system. Embedded
computers and networks monitor and control the physical processes, usually with feedback
loops where physical processes affect computations and vice versa. As an intellectual
challenge, CPS is about the intersection, not the union, of the physical and the cyber. It is not
sufficient to separately understand the physical components and the computational
components. We must instead understand their interaction. CPS applications arguably have the
potential to eclipse the 20th century information technology (IT) revolution.
Example: Consider a city where traffic lights and cars cooperate to ensure efficient flow of
traffic. In particular, imagine never having to stop at a red light unless there is actual cross
traffic. Such a system could be realized with expensive infrastructure that detects cars on the
road. But a better approach might be to have the cars themselves cooperate. They track their
position and communicate to cooperatively use shared resources such as intersections. Making
such a system reliable, of course, is essential to its viability. Failures could be disastrous.

6. Give any three design issues of Critical Cluster design?


 Availability and support
 Hardware Fault Tolerance
 Single System Image
 Efficient Communications
 Cluster-wide job management
 Dynamic load balancing
 Scalability and Programmability
7. Differentiate between Grid and Cloud Computing?

8. What is Fault Tolerance and System Availability?


High Availability is desired in all clusters, grid, p2p networks, and cloud systems. A System is
highly available if it has along mean time to failure(MTTF) and a short mean time to repair
(MTTR).System availability is formally defined as follows.
System Availability=MTTF(MTTF+MTTR)
UNIT – II
1. Differentiate between Private, Public and Hybrid Cloud?
 Private Cloud: the cloud services used by a single organization, which are not exposed to
the public. A private cloud resides inside the organization and must be behind a firewall, so
only the organization has access to it and can manage it.
 Public Cloud: the cloud services are exposed to the public and can be used by anyone.
Virtualization is typically used to build the cloud services that are offered to the public. An
example of a public cloud is Amazon Web Services (AWS).
 Hybrid Cloud: the cloud services can be distributed among public and private clouds, where
sensitive applications are kept inside the organization’s network (by using a private cloud),
whereas other services can be hosted outside the organization’s network (by using a public
cloud). Users can them interchangeably use private as well as public cloud services in every
day operations.
 The biggest differences between public, private and hybrid cloud are described in the table
below.

Difference Private Public Hybrid


The data stored in the public cloud is
Multi-tenancy: the
Single tenancy: there’s usually multi-tenant, which means the
data of multiple
only the data of a single data from multiple organizations is stored
Tenancy organizations in stored
organization stored in in a shared environment. The data stored
in a shared
the cloud. in private cloud is kept private by the
environment.
organization.
No: only the The services running on a private cloud
Yes: anyone can use
Exposed to organization itself can can be accessed only the organization’s
the public cloud
the Public use the private cloud users, while the services running on
services.
services. public cloud can be accessed by anyone.
Anywhere on the
Inside the organization’s network for
Internet where the
Data Center Inside the private cloud services as well as
cloud service
Location organization’s network. anywhere on the Internet for public cloud
provider’s services are
services.
located.
The organization must The cloud service
have their own provider manages the The organization itself must manage the
Cloud Service
administrators services, where the private cloud, while the public cloud is
Management
managing their private organization merely managed by the CSP.
cloud services. uses them.
Must be provided by the
The CSP provides all
organization itself, which The organization must provide hardware
Hardware the hardware and
has to buy physical servers for the private cloud, while the hardware
Components ensures it’s working at
to build the private cloud of CSP is used for public cloud services.
all times.
on.
The CSP has to
Can be quite expensive, The private cloud services must be
provide the hardware,
since the hardware, provided by the organization, including
set-up the application
Expenses applications and the hardware, applications and network,
and provide the
network have to be while the CSP manages the public cloud
network accessibility
provided and managed services.
according to the SLA.
by the organization
itself.
As you can see, the hybrid cloud is a combination of private, as well as public cloud, used
together by the same organization to pull the best features from each.

2. Give any three Cloud Design Objectives?


 Shifting computing from desktops to data centres
 Service provisioning and cloud economics
 Scalability in performance
 Data Privacy Protection
 High quality of cloud services
 New standards and interfaces

3. What is IaaS, PaaS and SaaS? Give an Example each.


SaaS: Software as a Service
Software as a Service, also known as cloud application services, represents the most commonly
utilized option for businesses in the cloud market. SaaS utilizes the internet to deliver
applications, which are managed by a third-party vendor, to its users. A majority of SaaS
applications are run directly through the web browser, and do not require any downloads or
installations on the client side.
PaaS: Platform as a Service
Cloud platform services, or Platform as a Service (PaaS), provide cloud components to certain
software while being used mainly for applications. PaaS delivers a framework for developers
that they can build upon and use to create customized applications. All servers, storage, and
networking can be managed by the enterprise or a third-party provider while the developers
can maintain management of the applications.
IaaS: Infrastructure as a Service
Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are made of highly
scalable and automated compute resources. IaaS is fully self-service for accessing and
monitoring things like computers, networking, storage, and other services, and it allows
businesses to purchase resources on-demand and as-needed instead of having to buy hardware
outright.
Common Examples of SaaS, PaaS, & IaaS
Platform Type Common Examples

SaaS Google Apps, Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting

AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App


PaaS
Engine, Apache Stratos, OpenShift

DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco


IaaS
Metapod, Microsoft Azure, Google Compute Engine (GCE)

4. What are the Data-center Construction Requirements?


Data center construction is the collective set of processes used to physically construct a data
center facility.
It combines construction standards data center operational environment requirements.
Data center construction primarily focuses on designing and building a data center using these
key factors:
Capacity: The floor plan of the data center must have enough room to house all servers and
equipment for current and perceived future use.
 Disaster Tolerant: The data center facility must be able to resist natural disasters and
calamities such as earthquakes, floods, snowstorms, tornados, etc. Moreover, the data
center construction also looks for ways to prevent disasters, such as adequate water
tanks and hoses within the facility for putting out a fire.
 Efficient Design: The overall design should be straightforward and require minimal
wiring. With the shift towards green data centers, efficient air flow, renewable energy
resources and other environmental factors are also taken into consideration.

5. Give any three Data-Center Management Issues?


 Energy Efficiency
 Monitoring
 Capacity Planning
 Performance Management
 Real-Time Reporting

6. What is Market-Oriented Cloud Architecture?


Need – Consumers will require different QoS to be maintained by their providers. – Providers
will need to consider and meet different QoS parameter of each individual consumer – So
market oriented resource management is necessary to regulate the supply and demand cloud
resources at market equilibrium.
Market Oriented Cloud Architecture Users/Brokers: Submit service request from anywhere in
the world. SLA Resource Allocator: Interface between cloud provider and users.

7. What are Data and Software Protection Techniques?


Copy protection is effort to prevent cracking • Cracking-modification to binary files to remove
protection reverse engineering • Discovering technical principles of
device,object,system,software. • It often involves disassembling exe code to get machine code
and bypass software security.
Method of protection • hardware based • Hardware device is integrated with software and used
to protect and license an application. • It uses device called USB hardware • Software executes
only if devise is actually present on machine • E.g.-ANSYS(related to ME)
Serial key generation • enter serial key • Serial key compare • If match installation complete
Encryptions • Encoding applications in such a way that only authorized users can use it • It
doesn’t prevent hacking • Used to prevent data at rest like files and data at transits like data
transfer via networks
Data code confusion technique • It changes the program’s use of data or data structures. • The
storage of data can be obfuscated by replacing current data definitions with those which do not
make sense for their intended use. For example, a loop iteration variable can be replaced with
another variable type besides an integer.

UNIT-III
1. What is Service Oriented Architecture?
Service-oriented architecture (SOA) is a style of software design where services are provided
to the other components by application components, through a communication protocol over a
network. The basic principles of service-oriented architecture are independent of vendors,
products and technologies. A service is a discrete unit of functionality that can be accessed
remotely and acted upon and updated independently, such as retrieving a credit card statement
online.
A service has four properties according to one of many definitions of SOA:
1. It logically represents a business activity with a specified outcome.
2. It is self-contained.
3. It is a black box for its consumers.
4. It may consist of other underlying services.
Different services can be used in conjunction to provide the functionality of a large software
application, a principle SOA shares with modular programming. Service-oriented architecture
integrates distributed, separately-maintained and -deployed software components. It is enabled
by technologies and standards that facilitate components' communication and cooperation over
a network, especially over an IP network.

2. What is REST Full Services?


REST stands for Representational State Transfer, which is an architectural style for networked
hypermedia applications, it is primarily used to build Web services that are lightweight,
maintainable, and scalable. A service based on REST is called a RESTful service.
REST web services does not use protocol other than HTTP. Your request has to be specified by
Url, Http Verb (get, post, put, delete, etc.) and http headers only.
On contrast, traditional web services uses SOAP protocol which basically means that the
request is wrapped into soap envelope (special xml structure defined by the soap protocol).
As you can see, to consume REST service you don't need any framework or special library
because it just plain http request. However, to consume SOAP service you need to create special
SOAP request and parse special SOAP response. To do so will need some framework, e.g WCF
in C#, or JAX-WS in java.
SOAP protocol also defines how exactly should the request and response look like for a
particular service. In REST you usually need some kind of documentation of the service.

3. Name any three Data-Center Management issues?


Energy Efficiency
Monitoring
Capacity Planning
Performance Management
Real-Time Reporting

4. Name any three Data-Center Design and Interconnection Networks?


Warehouse-Scale Data-Center Design
Data-Center Interconnection Networks
Modular Data Center in Shipping Containers
Interconnection of Modular Data Centers
Data-Center Management Issues

5. What is Hardware Virtualization?


Hardware virtulaization involves embedding virtual machine software into the hardware
component of a server. The software used is known by several different names, although
hypervisor and virtual machine monitor are the most common.
Hardware virtualization is an evolving technology that is gaining popularity in server
platforms. The basic idea of the technology is to consolidate many small physical servers into
one large physical server so that the processor can be used more effectively. The operating
system running on a physical server gets converted into a distinct OS running inside the virtual
machine.
The hypervisor controls the processor, memory and other components by allowing several
different operating systems to run on the same machine without the need for a source code. The
operating system running on the machine will appear to have its own processor, memory and
other components.

6. Write are the Services Microsoft Windows Azure?


• Live service Users can visit Microsoft Live applications and apply the data involved across
multiple machines concurrently.
• .NET service This package supports application development on local hosts and execution on
cloud machines.
• SQL Azure This function makes it easier for users to visit and use the relational database
associated with the SQL server in the cloud.
• SharePoint service This provides a scalable and manageable platform for users to develop
their special business applications in upgraded web services.
• Dynamic CRM service This provides software developers a business platform in managing
CRM applications in financing, marketing, and sales and promotions.

7. What are the services provided by the Amazon Web Services?


Analytics Services
Amazon EMR (Amazon EMR) uses Hadoop, an open source framework, to manage and
process data. Hadoop uses the MapReduce engine to distribute processing using a cluster.
 Amazon EMR (You identify the data source, specify the number and type of EC2
instances for the cluster and what software should be on them, and provide a
MapReduce program or run interactive queries)
 AWS Data Pipeline (to regularly move and process data)
 Amazon Kinesis (real-time processing of streaming data at a massive scale)
 Amazon ML (use machine learning technology to obtain predictions for their
applications using simple APIs. Amazon ML finds patterns in your existing data, creates
machine learning models, and then uses those models to process new data and generate
predictions)

8. What is Distributed Intrusion Anomaly Detection?


The Internet and computer networks are exposed to an increasing number of security threats.
With new types of attacks appearing continually, developing flexible and adaptive security
oriented approaches is a severe challenge. In this context, anomaly-based network intrusion
detection techniques are a valuable technology to protect target systems and networks against
malicious activities. However, despite the variety of such methods described in the literature
in recent years, security tools incorporating anomaly detection functionalities are just starting
to appear, and several important problems remain to be solved. This paper begins with a review
of the most well-known anomaly-based intrusion detection techniques. Then, available
platforms, systems under development and research projects in the area are presented. Finally,
we outline the main challenges to be dealt with for the wide scale deployment of anomaly-
based intrusion detectors, with special emphasis on assessment issues.

UNIT-IV
1. What is Map-Reduce programming?
Map Reduce is the programming paradigm that allows for massive scalability across hundreds
or thousands of servers in a Hadoop Cluster, i.e. suppose you have a job to run and you write
the Job using the MapReduce framework and then if there are a thousand machines available,
the Job could run potentially in those thousand machines.
The Big Data is not stored traditionally in HDFS. The data gets divided into chunks of small
blocks of data which gets stored in respective data nodes. No complete data’s present in one
centralized location and hence a native client application cannot process the information right
away. So a particular framework is needed with the capability of handling the data that stays
as blocks of data into respective data nodes, and the processing can go there to process that
data and bring back the result. In a nutshell, data is processed in parallel which makes
processing faster.

2.What is HDFC in Hadoop?


The HDFS runs on large clusters and follows a master/slave architecture. The metadata of the
file i.e., information about the relative position of the file in the node is managed by the
NameNode which is the master and could save several DataNodes to store the data. Some of
the other components of Hadoop are –
 Yarn – It manages the resources and performs job scheduling.
 Hive – It allows users to write SQL-like queries to analyse the data.
 Sqoop – Used for to and fro structured data transfer between the Hadoop Distributed
file System and the Relational Database Management System.
 Flume – Similar to Sqoop but it facilitates the transfer of unstructured and semi-
structured data between the HDFS and the source.
 Kafka – A messaging platform of Hadoop.
 Mahout – It used to create Machine Learning operations on big data.

3. What is Dryad and DryadLINQ from Microsoft?


As a proof of Dryad’s versatility, a rich software ecosystem has been built on top Dryad:
 SSIS on Dryad executes many instances of SQL server, each in a separate Dryad vertex,
taking advantage of Dryad’s fault tolerance and scheduling. This system is currently
deployed in a live production system as part of one of Microsoft’s AdCenter log
processing pipelines.
 DryadLINQ generates Dryad computations from the LINQ Language-Integrated
Query extensions to C#.

4. Explain what is OpenNebula?


OpenNebula is an open source management tool that helps virtualized data
centers oversee private clouds, public clouds and hybrid clouds.
OpenNebula combines existing virtualization technologies with advanced features for multi-
tenancy, automated provisioning and elasticity. A built-in virtual network manager
maps virtual networks to physical networks. OpenNebula is vendor neutral, as well as
platform- and API-agnostic. It can use KVM, Xen or VMware hypervisors.
OpenNebula, which now operates as an open source project, began as a research project by
Ignacio M. Llorente and Rubén S. Montero in 2005. The first public release of OpenNebula
was in March 2008.

5. What is Amazon Simple Storage Service(S3)?


Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, low-cost, web-based
cloud storage service designed for online backup and archiving of data and application
programs. S3 was designed with a minimal feature set and created to make web-scale
computing easier for developers.
6.What is Structure of Google Chubby for Distributed Lock Service?
Chubby is a distributed lock service intended for coarse-grained synchronization of activities
within Google's distributed systems. Chubby has become Google's primary internal name
service; it is a common rendezvous mechanism for systems such as MapReduce; the storage
systems GFS and Bigtable use Chubby to elect a primary from redundant replicas; and it is a
standard repository for files that require high availability, such as access control lists. Chubby
is a relatively heavy-weight system intended for coarse-grained locks, locks held for "hours or
days", not "seconds or less."

7. Explain the Programming of Google App Engine?


This practical guide shows intermediate and advanced web and mobile app developers how to
build highly scalable Python applications in the cloud with Google App Engine. The flagship
of Google's Cloud Platform, App Engine hosts your app on infrastructure that grows
automatically with your traffic, minimizing up-front costs and accommodating unexpected
visitors. You’ll learn hands-on how to perform common development tasks with App Engine
services and development tools, including deployment and maintenance.
App Engine's Python support includes a fast Python 2.7 interpreter, the standard library, and a
WSGI-based runtime environment. Choose from many popular web application frameworks,
including Django and Flask.
 Get a hands-on introduction to App Engine's tools and features, using an example
application
 Simulate App Engine on your development machine with tools from Google Cloud
SDK
 Structure your app into individually addressable modules, each with its own scaling
configuration
 Exploit the power of the scalable Cloud Datastore, using queries, transactions, and data
modeling with the ndb library
 Use Cloud SQL for standard relational databases with App Engine applications
 Learn how to deploy, manage, and inspect your application on Google infrastructure

UNIT-V
1. What is Grid Service Protocol Stack?
To put together the resources needed in a grid platform, a layered grid architecture is shown in
the figure below. The top layer corresponds to user applications to run on the grid system. The
user applications demand collective services including collective computing and
communications. The next layer is formed by the hardware and software resources aggregated
to run the user applications under the collective operations. The connectivity layer provides the
interconnection among drafted resources. This connectivity could be established directly on
physical networks or it could be built with virtual networking technology.
The connectivity must support the grid fabric, including the network links and virtual private
channels. The fabric layer includes all computational resources, storage systems, catalogs,
network resources, sensors, and their network connections. The connectivity layer enables the
exchange of data between fabric layer resources. The five-layer grid architecture is closely
related to the layered Internet protocol stack shown on the right-hand side of figure. The fabric
layer corresponds to the link layer in the Internet stack. The connectivity layer is supported by
the network and transport layers of the Internet stack. The Internet application layer supports
the top three layers.

2. What is Virtual Organization?


A virtual organization or company is one whose members are geographically apart, usually
working by computer e-mail and groupware while appearing to others to be a single,
unified organization with a real physical location.

3. What is Federation Model in Grid Data Access?


Cluster Grids are the simplest, consisting of one or more systems working together to provide
a single point of access to users on a single project or department. Campus Grids enable
multiple projects or departments within an organization to share computing resources.
Organizations can use campus grids to handle a wide variety of tasks, from cyclical business
processes to rendering and data mining. Global Grids are a collection of campus grids that cross
organizational boundaries to create a very large virtual systems. Users have access to compute
power that far exceeds the resources available within their own organization.

4. What is Parallel Vs Stripped Data Transfer?


Parallel data transfer opens multiple data streams for passing subdivided segments of a file
simultaneously. Although the speed of each stream is the same as in sequential streaming, the
total time to move data in all streams can be significantly reduced compared to FTP transfer.
Stripped Data Transfer, a data object is partitioned into a number of sections, and each section
is placed in an individual site in a data grid. When a user requests this piece of data, a data
stream is created for each site, and all the sections of data objects are transferred
simultaneously. Stripped Data Transfer can utilize the bandwidths of multiple sites more
efficiently to speed up data transfer.

5. What is Service Accounting and Economy Model?


Economic –based resource trading is an effective way to allocate grid resources. First
resource providers register their shared resources together with resource information in a grid
market.
When the jobs are successfully completed, the customers are charged for the resources
allocated.
Two accounting services are introduced
 Monitoring and meeting services
 Accounting component

6. What is Economy Model for Grid Computing?


The different economic models are kept as generic as possible. This ensures that our proposed
architecture is free from any specific implementation and that it provides a general framework
for any other Grid middleware and tool developers. Particular emphasis will be placed on the
framework and heuristics that GRBs can employ for establishing their service price depending
on their customers’ requirements. The service providers publish their services through the
GMD. They use the declarative language of the Grid trading services to define the cost
specifications and their objectives, such as access price for various users for different times and
durations along with the possibilities of offering discounts to attract users during off-peak
hours. The Grid trading server (GTS) can employ different economic models in providing
services. The simplest would be a commodity model wherein the resource owners define
pricing strategies including those driven by the demand and resource availability. The GTS can
act as auctioneer if an auction-based model is used in deciding the service access price or an
external auctioneer service can be used.
For each of the economic models, firstly, the economic model theory, its parameters and
influences are discussed, and then a possible solution is given for a current Grid environment
and how they can be mapped to existing Grid tools and architectures or what needs to be
extended. In the classical economic theory there are different models for specific environmental
situations and computing applications.

7. Name any three Packages for Grid Software Support and Middleware?
Open source grid middleware packages
The globus toolkit architecture(GT4)
Containers and resources/data management
The ChinaGrid Support Platform(CGSP)

Potrebbero piacerti anche