MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
What is the default size of HDFS Data Block? |
| A. | 16mb |
| B. | 32mb |
| C. | 64mb |
| D. | 128mb |
| Answer» E. | |
| 152. |
The namenode knows that the data node is active using a mechanism knownas |
| A. | active pulse |
| B. | data pulse |
| C. | heartbeats |
| D. | h-signal |
| Answer» D. h-signal | |
| 153. |
Which utility is used for checking the health of an HDFS file system? |
| A. | fsck |
| B. | fchk |
| C. | fsch |
| D. | fcks |
| Answer» B. fchk | |
| 154. |
Which among the following command is used to copy a directory from onenode to another in HDFS? |
| A. | rcp |
| B. | distcp |
| C. | dcp |
| D. | drcp |
| Answer» C. dcp | |
| 155. |
Communication between services is done widely using protocol |
| A. | rest |
| B. | soap |
| C. | restful |
| D. | none of thementioned |
| Answer» D. none of thementioned | |
| 156. |
Which of the following is the highest degree of integration in cloudcomputing? |
| A. | saas |
| B. | iaas |
| C. | paas |
| D. | all of the mentioned |
| Answer» B. iaas | |
| 157. |
Which of the following can be identified as cloud |
| A. | web applications |
| B. | intranet |
| C. | hadoop |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 158. |
has many of the characteristics of what is now being called cloudcomputing |
| A. | internet |
| B. | softwares |
| C. | web service |
| D. | all of the mentioned |
| Answer» B. softwares | |
| 159. |
. as a utility is a dream that dates from the beginning of thecomputing industry itself |
| A. | model |
| B. | computing |
| C. | software |
| D. | all of the mentioned |
| Answer» C. software | |
| 160. |
is a function of the particular enterprise and application in an on-premises deployment. |
| A. | vendor lock |
| B. | vendor lock-in |
| C. | vendor lock-ins |
| D. | none of thementioned |
| Answer» C. vendor lock-ins | |
| 161. |
The reputation for cloud computing services for the quality of those services isshared by |
| A. | replicas |
| B. | shards |
| C. | tenants |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 162. |
Cloud are standardized in order to appeal to the majority of itsaudience. |
| A. | svas |
| B. | slas |
| C. | sals |
| D. | none of thementioned |
| Answer» C. sals | |
| 163. |
Amazon AWS Consists of following services |
| A. | iaas |
| B. | paas |
| C. | saas |
| D. | all of above |
| Answer» E. | |
| 164. |
Network bottlenecks occur when data sets must be transferred |
| A. | large |
| B. | small |
| C. | big |
| D. | all of the mentioned |
| Answer» B. small | |
| 165. |
Security methods such as private encryption, VLANs and firewalls comesunder subject area. |
| A. | accountingmanagement |
| B. | compliance |
| C. | data privacy |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 166. |
captive requires that the cloud accommodate multiple complianceregimes. |
| A. | licensed |
| B. | policy-based |
| C. | variable |
| D. | all of the mentioned |
| Answer» C. variable | |
| 167. |
Which of these is not an antecedent of the cloud? |
| A. | software as a service |
| B. | utility computing |
| C. | grid computing |
| D. | desktop computing |
| Answer» E. | |
| 168. |
Which of these techniques is vital for creating cloud-computing centers |
| A. | virtualization |
| B. | transubstantiation |
| C. | cannibalization |
| D. | insubordination |
| Answer» B. transubstantiation | |
| 169. |
websocket is a Protocol |
| A. | stateful |
| B. | bidirectional |
| C. | connection oriented |
| D. | all of the above |
| Answer» E. | |
| 170. |
What widely used service is built on cloud-computing technology? |
| A. | |
| B. | skype |
| C. | gmail |
| D. | all of the above |
| Answer» E. | |
| 171. |
Cloud model relies on |
| A. | communication api |
| B. | middleware |
| C. | web documents |
| D. | embedded device |
| Answer» B. middleware | |
| 172. |
IEEE 802.15.4 uses which of the following for accessing the channel? |
| A. | Carrier sense multiple access (CSMA) |
| B. | Carrier sense multiple access with collision detection (CSMA‐CD) |
| C. | Carrier sense multiple access with collision avoidance (CSMA‐CA) |
| D. | None of these |
| Answer» D. None of these | |
| 173. |
In 6LoWPAN address, how many bits are globally unique? |
| A. | 16 bits |
| B. | 32 bits |
| C. | 64 bits |
| D. | 128 bits |
| Answer» D. 128 bits | |
| 174. |
Which of the following is not a messaging mode in CoAP? |
| A. | Confirmable |
| B. | Separate |
| C. | Direct |
| D. | Piggyback |
| Answer» D. Piggyback | |
| 175. |
Which of these statements regarding sensors is TRUE? |
| A. | Sensors are input devices. |
| B. | Sensors can be analog as well as digital |
| C. | Sensors respond to some external stimuli. |
| D. | All of these |
| Answer» E. | |
| 176. |
Which of the following is not the component of a SCADA system? |
| A. | Database server |
| B. | I/O system |
| C. | PLC controller |
| D. | Sparger controller |
| Answer» E. | |
| 177. |
What is SCADA? |
| A. | Software |
| B. | Process |
| C. | System |
| D. | Hardware |
| Answer» C. System | |
| 178. |
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? |
| A. | Making infrastructure vulnerable to malware |
| B. | Potential for noncompliance |
| C. | Data Loss |
| D. | All of the above |
| Answer» E. | |
| 179. |
DCS is a ________ |
| A. | Distributed Control System |
| B. | Data Control System |
| C. | Data Column System |
| D. | Distributed Column System |
| Answer» B. Data Control System | |
| 180. |
What is the full form of SCADA? |
| A. | Supervisory Control and Document Acquisition |
| B. | Supervisory Control and Data Acquisition |
| C. | Supervisory Column and Data Assessment |
| D. | Supervisory Column and Data Assessment |
| Answer» C. Supervisory Column and Data Assessment | |
| 181. |
________ tags contain battery and transmit signals autonomously |
| A. | Acitve RFID |
| B. | Passive RFID |
| C. | Battery-assisted passive RFID |
| D. | Battery-assisted RFID |
| Answer» B. Passive RFID | |
| 182. |
The three major components of RFID hardware based on functionality include : |
| A. | RFID Reader |
| B. | Reader Antenna |
| C. | Reader |
| D. | All of the above |
| Answer» E. | |
| 183. |
________ tags needs an external source to wake up the battery. |
| A. | Acitve RFID |
| B. | Passive RFID |
| C. | Battery-assisted passive RFID |
| D. | Battery-assisted active RFID |
| Answer» D. Battery-assisted active RFID | |
| 184. |
RFID stand for ________. |
| A. | Rangeable Frequency Identification |
| B. | Radio Fragment Identification |
| C. | Radio Frequency Identification |
| D. | Rangeable Fragment Identification |
| Answer» D. Rangeable Fragment Identification | |
| 185. |
________ is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry |
| A. | GPS |
| B. | Cloud |
| C. | IoT |
| D. | RFID |
| Answer» E. | |
| 186. |
The percentage of time the system is up and running smoothly is referred as ________. |
| A. | system up time |
| B. | system scalability |
| C. | system availability |
| D. | system efficiency |
| Answer» D. system efficiency | |
| 187. |
________ refers to an increase in the performance by the addition of more resources along the service layers |
| A. | Horizontal Scalability |
| B. | Vertical Scalability |
| C. | Diagonal Scalability |
| D. | None of the above |
| Answer» C. Diagonal Scalability | |
| 188. |
The Data-Intensive Scalable Computing(DISC) utilizes a ________ data-center clusters to gather and maintain data. |
| A. | HTC |
| B. | HPC |
| C. | HCC |
| D. | HAC |
| Answer» B. HPC | |
| 189. |
The Cloudlets have a ________ ownership unlike that of Clouds. |
| A. | centralized |
| B. | decentralized |
| C. | global |
| D. | None of the above |
| Answer» C. global | |
| 190. |
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a ________ grid and workload management solution of cloud computing platform |
| A. | Load Setting Facility |
| B. | Load Sharing Facility |
| C. | Load Setting Faculty |
| D. | Load assigning Faculty |
| Answer» C. Load Setting Faculty | |
| 191. |
A mashup cloud can be designed by utilizing the Scalability of AWS and ________ of GAE platforms |
| A. | Accessibility |
| B. | Mobility |
| C. | Agility |
| D. | Scalability |
| Answer» D. Scalability | |
| 192. |
One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 193. |
NASA created ________ can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient. |
| A. | Nebula Cloud |
| B. | Cyclone Cloud |
| C. | Force.com Cloud |
| D. | CERN Cloud |
| Answer» B. Cyclone Cloud | |
| 194. |
Cloud system from SGI is functionally considered as an ________. |
| A. | on-demand cloud computing service |
| B. | on-demand cloud storage service |
| C. | on-demand cloud accessing service |
| D. | on-demand |
| Answer» B. on-demand cloud storage service | |
| 195. |
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as ________. |
| A. | Web Sphere |
| B. | Tivoli |
| C. | Nebula |
| D. | Altix |
| Answer» C. Nebula | |
| 196. |
Storage classes available with Amazon s3 are - |
| A. | Amazon S3 standard |
| B. | Amazon S3 standard-infrequent Access |
| C. | Amazon Glacier |
| D. | All of the above |
| Answer» E. | |
| 197. |
The types of AMI provided by AWS are: |
| A. | Instance store backed |
| B. | EBS backed |
| C. | Both A & B |
| D. | None of the above |
| Answer» D. None of the above | |
| 198. |
AWS reaches customers in ______________countries. |
| A. | 137 |
| B. | 182 |
| C. | 190 |
| D. | 86 |
| Answer» D. 86 | |
| 199. |
________________ is the central application in the AWS portfolio. |
| A. | Amazon Simple Queue Service |
| B. | Amazon Elastic Compute Cloud |
| C. | Amazon Simple Notification Service |
| D. | All of the above |
| Answer» C. Amazon Simple Notification Service | |
| 200. |
Which of the following is Amazon’s technical support and consulting business? |
| A. | Amazon Virtual Private Cloud |
| B. | AWS Premium Support |
| C. | Amazon Fulfillment Web Services |
| D. | All of the mentioned |
| Answer» C. Amazon Fulfillment Web Services | |