You are on page 1of 25

Chapter 1 Question 1, 2, 3 Mark Created by Atul a b c d Correct Answer

SR.NO
1 Write down question Option a Option b Option c Option d a/b/c/d
2 Cloud model relies on communication API Middleware web documents embedded device a
3 What widely used service is built on cloud-computing technology? Twitter Skype Gmail All of the above d
4 HTTP is a ______ protocol stateful unidirectional bidirectional full dulpex b
websocket is a____ Protocol stateful bidirectional connection oriented all of the above d
5
6 Websocket protocol uses which communication model Publish-Subscribe Request Response Push-Pull Exclusive Pair a
Which of these techniques is vital for creating cloud-computing centers Virtualization Transubstantiation Cannibalization Insubordination a
7

p
The group of
knowledge workers

Ap
An overhanging A cloud that sits
An internal cloud is… A career risk for a CIO who use a social d
threat behind a corporate
network for water-
cooler gossip
8

at
Which of these is not an antecedent of the cloud? Software as a service Utility computing Grid computing Desktop computing d
9
Accounting
Which of the following subject area deals with pay-as-you-go usage model? Compliance Data Privacy All of the mentioned a

H
10 Management
The low barrier to
Except for tightly Cloud computing entry cannot be
Point out the correct statement
l e managed SaaS cloud
providers
vendors run very
reliable networks
accompanied by a
low barrier to
All of the mentioned b
rp
11 provisioning
________ captive requires that the cloud accommodate multiple compliance Licensed Policy-based
Variable All of the mentioned b
12 regimes.
Pu

Security methods such as private encryption, VLANs and firewalls comes Accounting
Compliance Data Privacy All of the mentioned c
13 under __________ subject area. Management
Variable but under
Which of the following captive area deals with monitoring? Licensed Law All of the mentioned b
14 control
Network bottlenecks occur when ______ data sets must be transferred large small big all of the mentioned a
15
16 Amazon AWS Consists of following services Iaas Paas Saas all of above d
17 RDS is a_____ type of database SQL NonSQL Simple storage all of above a
18 Dynamodb is ____ type of storage NonSQL SQL Simple storage all of above a
Cloud ________ are standardized in order to appeal to the majority of its None of the
SVAs SLAs SALs b
19 audience. mentioned
The reputation for cloud computing services for the quality of those services is
replicas shards tenants all of the mentioned c
20 shared by _________
___________ is a function of the particular enterprise and application in an on- None of the
Vendor lock Vendor lock-in Vendor lock-ins b
21 premises deployment. mentioned
Distributed
_________ computing refers to applications and services that run on a
Cloud Soft Parallel b
distributed network using virtualized resources.
22
. ________ as a utility is a dream that dates from the beginning of the
Model Computing Software All of the mentioned b
23 computing industry itself
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on Iaas Paas Saas All of the mentioned a
24
Which of the following is essential concept related to Cloud? Reliability Productivity Abstraction All of the mentioned c
25

p
applications benefit
start very small and technology it is built None of the
Point out the wrong statement from deployment in c

Ap
become big very fast on is evolutionary mentioned
the cloud
26
None of the
Which of the cloud concept is related to pooling and sharing of resources Polymorphism Abstraction Virtualization c
27 mentioned
________ has many of the characteristics of what is now being called cloud

at
Internet Softwares Web Service All of the mentioned a
28 computing
Which of the following can be identified as cloud Web Applications Intranet Hadoop All of the mentioned c

H
29
Azure
Which of the following is Cloud Platform by Amazon? AWS Cloudera All of the mentioned b
30
Which of the following is the deployment model? l e public
private hybrid all of the mentioned d
rp
31
PaaS
SaaS IaaS
Which of the following is best known service model? All of the mentioned d
Pu

32
Which of the following is the highest degree of integration in cloud
SaaS IaaS PaaS All of the mentioned a
33 computing?
client cloud
Which of the architectural layer is used as a front end in cloud computing? soft all of the mentioned a
34
A larger pool of More reliable A logical design
Which of the following benefit is provided by the PaaS service provider All of the mentioned d
qualified developers operation methodology
35
None of the
Communication between services is done widely using _______ protocol REST SOAP RESTful c
36 mentioned
CaaS
Which of the following provider rely on the virtual machine technology to
AaaS PaaS IaaS d
deliver servers?
37
VGM
All of the mentioned
Which of the following component is called hypervisor? VMc VMM c
38
virtual server
Applications such as a Web server or database server that can run on a virtual virtual appliances machine imaging
all of the mentioned b
machine image are referred to as __
39
Ben
Amazon Machine Images are virtual appliances that have been packaged to Xen Ken
Zen b
run on the grid of ____ nodes.
40
Imaging
Parallels QEMU None of the
__________ is a CPU emulator and virtual machine monitor c

p
mentioned
41

Ap
Distributed
_________ computing refers to applications and services that run on a
Cloud Soft Parallel b
distributed network using virtualized resources.
42
. ________ as a utility is a dream that dates from the beginning of the
Model Computing Software All of the mentioned b
43 computing industry itself

at
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on Iaas Paas Saas All of the mentioned a
44

H
Which of the following is essential concept related to Cloud? Reliability Productivity Abstraction All of the mentioned c
45
applications benefit
Point out the wrong statement
l e from deployment in
the cloud
start very small and technology it is built
become big very fast on is evolutionary
None of the
mentioned
c
rp
46
None of the
Which of the cloud concept is related to pooling and sharing of resources Polymorphism Abstraction Virtualization c
47 mentioned
Pu

________ has many of the characteristics of what is now being called cloud
Internet Softwares Web Service All of the mentioned a
48 computing
Which of the following can be identified as cloud Web Applications Intranet Hadoop All of the mentioned c
49
Azure
Which of the following is Cloud Platform by Amazon? AWS Cloudera All of the mentioned b
50
public
Which of the following is the deployment model? private hybrid all of the mentioned d
51
PaaS
SaaS IaaS
Which of the following is best known service model? All of the mentioned d
52
Which of the following is the highest degree of integration in cloud
SaaS IaaS PaaS All of the mentioned a
53 computing?
client cloud
Which of the architectural layer is used as a front end in cloud computing? soft all of the mentioned a
54
A larger pool of More reliable A logical design
Which of the following benefit is provided by the PaaS service provider All of the mentioned d
qualified developers operation methodology
55
None of the
Communication between services is done widely using _______ protocol REST SOAP RESTful c
56 mentioned
Which of the following provider rely on the virtual machine technology to
CaaS AaaS PaaS IaaS d
deliver servers?
57
VGM
All of the mentioned

p
Which of the following component is called hypervisor? VMc VMM c

Ap
58
virtual server
Applications such as a Web server or database server that can run on a virtual virtual appliances machine imaging
all of the mentioned b
machine image are referred to as __
59
Ben

at
Amazon Machine Images are virtual appliances that have been packaged to Xen Ken
Zen b
run on the grid of ____ nodes.
60

H
Parallels QEMU None of the
__________ is a CPU emulator and virtual machine monitor Imaging c
mentioned
61
62
63 l e
rp
64 Chapter 2 Question 1, 2, 3 Mark a b c d Correct Answer
Google distributed Yahoo distributed Facebook distributed
The source of HDFS architecture in Hadoop originated as Amazon S3 storage a
filesystem filesystem filesystem
Pu

65
Batch processing Resource
What is HDFS? Storage layer All of the above a
66 engine management layer
Which among the following command is used to copy a directory from one
rcp distcp dcp drcp b
67 node to another in HDFS?
68 Which utility is used for checking the health of an HDFS file system? fsck fchk fsch fcks a
Datanode manage
Namenode stores NameNode stores
Which among the following is the correct statement file system All of the above b
metadata actual data
69 namespace
70 What is default replication factor? 1 2 3 5 c
The namenode knows that the data node is active using a mechanism known
Active pulse Data pulse Heartbeats h-signal c
71 as
72 What is the default size of HDFS Data Block? 16MB 32MB 64MB 128MB d
It is the logical It is the physical
What is HDFS Block in Hadoop? representation of representation of Both the above None of the above b
73 data data
DataNode is the
slave/worker node Each incoming file is NameNode stores
Which of the following is the correct statement? and holds the user broken into 32 MB by user data in the form None of the above a
data in the form of defaul of Data Blocks
74 Data Blocks
Replication Factor is Data Blocks get
The need for data replication can arise in various scenarios like DataNode goes down All of the above d
75 changed corrupted
Occupies only the size
Cannot be stored in Occupies the full Can span over
A file in HDFS that is smaller than a single block size it needs and not the d

p
HDFS block's size. multiple blocks
76 full block

Ap
Perform read-write
Manage file system It is responsible for operation as per
Which among the following are the duties of the NameNodes None of the above a
namespace storing actual data request for the
77 clients

at
The namenode The namenode need
updates the mapping The data in that data not update mapping There namenode has
If the IP address or hostname of a data node changes c
between file name node is lost forever between file name to be restarted

H
and block name and block name
78
The memory of the In the memory of the
For the frequently accessed HDFS files the blocks are cached in Both the above None of the above a
79
l e data node
Different nodes on
namenode
Nodes on different
Nodes in different Data on the same
rp
Which scenario demands highest bandwidth for data transfer between nodes racks in the same c
the same rack data centers node
80 data center.
Block ID and
Pu

When a client contacts the namenode for accessing a file, the namenode Size of the file hostname of all the Block ID of the file
All of the above b
responds with requested data nodes requested
containing that block
81
82 In HDFS the files cannot be Read Deleted Executed Archived c
Perform read-write
Manage file system Regulates client’s operation as per
Which among the following is the duties of the Data Nodes Stores meta-data d
namespace access to files request for the
83 clients
84 NameNode and DataNode do communicate using Active pulse Heartbeats h-signal Data pulse b
None of the
Amazon EC2 provides virtual computing environments, known as : chunks instances messages b
85 mentioned
Data stored in __________ domains doesn’t require maintenance of a schema. SimpleDB SQL Server Oracle RDS a
86
Which of the following is a system for creating block level storage devices that Amazon Elastic Block
CloudWatch AWS Import/Export All of the mentioned b
87 can be used for Amazon Machine Instances in EC2 ? Store
Which of the following type of virtualization is also characteristic of cloud
Storage Application CPU All of the mentioned d
88 computing
Which of the following is most important feature of cloud storage listed below Multiplatform
Logon authentication Bare file Adequate bandwidth a
89 ? support
Which of the following is open cloud storage management standard by SNIA ? CDMI OCCI CEA Adequate bandwidth a
90
Which of the following system does not provision storage to most users ? Paas Iaas Caas Saas b
91
Which of the following service is provided by Google for online storage ? Drive SkyDrive Dropbox All of the mentioned a
92

p
Which of the following backup create a cloned copy of your current data or Continuous Data None of the
Open file backup Reverse Delta backup a

Ap
93 drive ? Protection mentioned
Which of the following storage devices exposes its storage to clients as Raw
block file disk All of the mentioned a
94 storage that can be partitioned to create volumes ?
Which of the following should be used considering factors shown in the
figure?

at
H
SimpleDB RDS Amazon EC2 All of the mentioned b

95
l e
rp
The metrics obtained Amazon Machine
by CloudWatch may A number of tools are Instances are sized at
None of the
Point out the wrong statement. be used to enable a used to support EC2 various levels and d
Pu

mentioned
feature called Auto services rented on a
Scaling computing/hour basis
96
Which of the following is an edge-storage or content-delivery system that Amazon Relational Amazon Associates
Amazon SimpleDB Amazon Cloudfront c
97 caches data in different physical locations? Database Service Web Services
Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple
c
98 to support your Web sites? Compute Cloud Queue Service Database Service Storage System
Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple
c
99 to support your Web sites? Compute Cloud Queue Service Database Service Storage System
. Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple
c
100 to support your Web sites? Compute Cloud Queue Service Database Service Storage System
Amazon Elastic Cloud SimpleDB
is a system for interoperates with EC3 is an Analytics as None of the
Point out the correct statement. b
creating virtual both Amazon EC2 and a Service provider mentioned
101 disks(volume) Amazon S3
Which of the following is a structured data store that supports indexing and
CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned b
102 data queries to both EC2 and S3?
Which of the following is the machinery for interacting with Amazon’s vast Amazon Elastic Amazon Associates Alexa Web
All of the mentioned b
product data and eCommerce catalog function? Compute Cloud Web Services Information Service
103
Amazon Elastic Amazon Mechanical Multi-Factor
Which of the following is a billing and account management service? Amazon DevPay c
104 MapReduce Turk Authentication
None of the

p
Which of the following is not the feature of Network management systems? Accounting Security Performance d
105 mentioned

Ap
Which of the following service provider provides the least amount of built in
SaaS PaaS IaaS All of the mentioned c
106 security?
Adapting your on-
Different types of
premises systems to Data should be
cloud computing

at
a cloud model transferred and
service models
Point out the correct statement. requires that you stored in an All of the mentioned d
provide different
determine what encrypted format for

H
levels of security
security mechanisms security purpose
services
are required
107

108 Agreements? l e
Which of the following services that need to be negotiated in Service Level
Logging Auditing
Regulatory
compliance
All of the mentioned d
rp
The following flowchart is intended to evaluate __________ in any cloud.
Pu

none of the
risk errors inconsistencies a
mentioned

109
Any distributed
You can use proxy
application has a Cloud computing
and brokerage
much greater attack doesn’t have
services to separate
Point out the wrong statement. surface than an vulnerabilities All of the mentioned c
clients from direct
application that is associated with
access to shared
closely held on a Internet applications
cloud storage
110 Local Area Network
e-Discovery for legal
Which of the following area of cloud computing is uniquely troublesome? Auditing Data integrity All of the mentioned d
111 compliance
Which of the following is the operational domain of CSA(Cloud Security Portability and None of the
Scalability Flexibility b
112 Alliance)? interoperability mentioned
Which of the following is considered an essential element in cloud computing Identity and access

p
Multi-tenancy Virtualization All of the mentioned a
113 by CSA? management

Ap
Which of the following is used for Web performance management and load
VMware Hyperic Webmetrics Univa UD Tapinsystems b
114 testing?
Which of the following service provider provides the highest level of service? SaaS PaaS IaaS All of the mentioned a
115

at
IaaS adds application SaaS is an operating
development environment with
PaaS supplies the
Point out the correct statement. frameworks, applications, All of the mentioned c

H
infrastructure
transactions, and management, and
control structures the user interface
116

117
Which of the following functional cloud computing hardware/software stack
is the Cloud Reference Model? l e CAS CSA SAC All of the mentioned a
rp
For the _________ model, the security boundary may be defined for the
SaaS PaaS IaaS All of the mentioned b
118 vendor to include the software framework and middleware layer.
Which of the following model allows vendor to provide security as part of the
SaaS PaaS IaaS All of the mentioned a
Pu

119 Service Level Agreement?


None of the
Which of the following cloud does not require mapping? Public Private Hybrid a
120 mentioned
Which of the following service model is owned in terms of infrastructure by None of the
Public Private Hybrid c
121 both vendor and customer? mentioned
None of the
Which of the following model type is not trusted in terms of security? Public Private Hybrid a
122 mentioned
Which of the following has infrastructure security managed and owned by None of the
Hybrid Private/Community Public b
123 the vendor? mentioned
Any security Any security
Each different type of
mechanism below mechanism above the
cloud service delivery
Point out the wrong statement. the security boundary security boundary All of the mentioned d
model creates a
must be built into the must be maintained
security boundary
system by the customer
124
125
126 Chapter 3,4,5,6 Question 1, 2, 3 Mark a b c d Correct Answer
___________ is an application for collecting messages sent in RSS and Atom
Google Reader Yahoo Mail EmailRackspace All of the mentioned A
127 format from information providers.
Which of the following application is a newsreader? Google Reader Bloglines Newsgator Online All of the mentioned D
128

p
Which of the following was developed an alternative to XML syndication by Atom Publishing Atom Subscribing Atom Subscribe None of the
A

Ap
129 IETF? Protocol Protocol Protocol mentioned
How many technologies are used for most of the syndicated content on the
1 2 3 4 B
130 Internet?
Which of the following technology is used for syndicated content? AJAX RSS Javascript All of the mentioned B
131

at
Asynchronous Another Java and Abstract JSON and None of the
The full form of AJAX is A
132 Javascript and XML XML Library XML mentioned

H
Speeder retrieval of
The advantages of Ajax is _______________ Bandwidth utilization More interactive All of these D
133 data
which of the following are the controls of Ajax? ScriptManager ScriptManagerProxy UpdateProgress All of the mentioned D
134

e
Which of the following type of virtualization is also characteristic of cloud
l Storage Application CPU All of the mentioned D
rp
135 computing?
Virtualization assigns a logical name for a physical resource and then provides
a pointer to TRUE FALSE A
Pu

136 that physical resource when a request is made


137 Virtual Machines (VMs) are offered in cloud by SaaS PaaS IaaS None of these C
The technology used to distribute service requests to resources is referred to
load performing load scheduling load balancing all of the mentioned C
138 as _____________
_________ computing refers to applications and services that run on a
distributed network Distributed Cloud Soft Parallel B
139 using virtualized resources.
Cloud computing is an abstraction based on the notion of pooling physical
none of the
resources and real virtual cloud B
mentioned
140 presenting them as a ________ resource.
141 Amazon’s Elastic Compute Cloud (EC2) is a well known ______. Virtual machine Cloud Storage PaaS SoA A
________ virtualization abstracts networking hardware and software into a None of the
Storage Network Software B
142 virtual network that can be managed. mentioned
_________ is used by Amazon Web Services to store copies of a virtual
AMI EMI IMI Application services A
143 machine.
In para-virtualization, VMs run on hypervisor that interacts with the
TRUE False B
144 hardware.
Which of the following provide system resource access to virtual machines ? VMM VMC VNM All of the mentioned A
145
An operating system running on a Type __ VM is a full virtualization. 1 2 3 All of the mentioned A
146
In Gmail, you can A typical RSS
RSS and Atom are
construct searches document or feed
prototypes of a class
with multiple contains text and None of the
Point out the wrong statement. of XML specifications B

p
operators using the metadata that can be mentioned
called synchronized
Advanced Search used to indicate

Ap
markup languages
feature publication dates
147
Which of the following file format is used by RSS module? XML SMIL JSON All of the mentioned A
148
It works as a stand- It works the same It uses C++ as its It makes data

at
What makes Ajax unique? alone Web- with all Web programming requests D
149 development tool browsers language asynchronously

H
150 _______ JavaScript is also called server-side JavaScript. Microsoft Navigator LiveWire None C
Which of the following visualization is most commonly achieved through a
None of the
mapping mechanism where a logical storage address is translated into a Storage Network Software A
mentioned
151 physical storage address?
l e You can make
rp
machine images of
systems in the
A virtual network can Instantiating a virtual
configuration that
Point out the wrong statement. create virtual machine is a very All of the mentioned B
Pu

you want to deploy


network interfaces slow process
or take snapshots of
working virtual
152 machines
AMI(Amazon Machine Image) imaging service is provided by Amazon for
private use public use pay-per-use all of the mentioned D
153 ______________
Which of the following runs on Xen Hypervisor? Azure AWS EC2 AWS EC3 All of the mentioned B
154
Virtualization allows sharing the resources of hardware across multiple a
True FALSE A
environments.
155
A virtual machine running on a server of a particular make cannot be
relocated to b True FALSE B
156 the server of another make.
Software as a service Infrastructure as a Platform as a Service None of the
Amazon Web Services (AWS) is an example of______________________ B
157 (SaaS) service (IaaS) (PaaS) mentioned
Virtual Server 2005
Which of the following is Type 1 Hypervisor ? Wind River Simics KVM LynxSecure D
158 R2
159 Which of the following is Type 2 VM ? VirtualLogix VLX VMware ESX Xen LynxSecure C
In _______ the virtual machine simulates hardware, so it can be independent none of the
paravirtualization full virtualization emulation C
160 of the underlying system hardware. mentioned
In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly none of the
paravirtualization full virtualization emulation B
161 onto the hardware. mentioned
Full virtualization Simulates hardware Has VMs with the
Clones images Alters the guest OS A
Full virtualization within software same OS
162

p
163 What are the goals of Hypervisor design? Scalability Reliability Isolation All of the above D

Ap
Bare metal hypervisor sits on top of Physical Hardware Virtualized hardware Operating System None of the above A
164
If virtualization occurs at application level, OS level and hardware level, then
such service in cloud is IaaS SaaS PaaS no such service B
165

at
Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request
ii, i, iii, iv i, ii, iii & iv ii, iii, iv & i ii, iv, iii & i D
166 iii) VM in operation iv) VM Provision

H
Which of the following should be replaced with the question mark in the
following figure?

l e Abstraction Virtualization Mobility Pattern All of the mentioned B


rp
Pu

167
Which type of Hypervisor is shown in the following figure ?

Type 1 Type 2 Type 3 All of the mentioned B

168
_____________________where a VM can be moved from one physical
Load Balancing Migration Live Migration Server consolidation C
169 machine to another even as it continues to execute.
Which type of Hypervisor is shown in the following figure ? Type 1 Type 2 Type 3 All of the mentioned A
170
Load balancing
Multiple instances of
virtualizes systems
various Google Google uses
and resources by
Point out the wrong statement : applications are hardware All of the mentioned C
mapping a logical
running on different virtualization
address to a physical
hosts
171 address
Which of the following should be placed in second lowermost layer for the
following figure ?

Host Operating None of the


Software VM A
System mentioned

p
Ap
172
On a Type 2 VM, a
Some hypervisors are software interface is
installed over an created that

at
All CPUs support
Point out the wrong statement : operating system and emulates the devices All of the mentioned B
virtual machines
are referred to as with which a system

H
Type 2 or hosted VM would normally
173 interact
Which of the following type of virtualization is found in hypervisor such as none of the
paravirtualization full virtualization emulation A
174 Microsoft’s Hyper-V ?
l e Full virtualization
mentioned
rp
requires that the host
Guest operating
operating system
systems in full
provide a virtual A process virtual
Pu

virtualization systems
machine interface for machine instantiates
Point out the wrong statement : are generally faster All of the mentioned A
the guest operating when a command
than other
system and that the begins a process
virtualization
guest access
schemes
hardware through
that host VM
175
Which of the following operating system support operating system
Windows NT Sun Solaris Windows XP Compliance B
176 virtualization ?
_________ is a service that creates and manages virtual network interfaces. VMware vStorage VMware vNetwork VMware vCompute Application services B
177
Which of the following allows a virtual machine to run on two or more Distributed Resource vNetwork Distributed
Virtual SMP Storage Vmotion A
physical processors at the same time ? Scheduler Switch
178
179 VMM is A virtual machine Hardware Host OS A layer of software D
VMM facilitates sharing of Memory & I/O CPU, memory & I/O CPU & memory I/O & CPU B
180
Virtualization enables Virtualization enables
Virtualization enables Virtualization enables
realization of emulating compute,
simulating compute, abstracting compute,
compute, network, network, and storage
network, and storage network, and storage
The BEST way to define Virtualization in cloud computing is and storage service service platforms B
service platforms service platforms
platforms from the from the underlying
from the underlying from the underlying
underlying virtual virtual hardware
virtual hardware physical hardware
hardware
181

p
Can manage OS and
Hardware-
Virtual machines can application as a single Software and

Ap
independence of
Which one is NOT generally a change after Virtualization? be provisioned to any unit by encapsulating hardware tightly D
operating system and
system them into virtual coupled
applications
machines.
182

at
Increase reliability
Which one of the statement is generally NOT correct for Microkernelized Drivers run within Simple partitioning Contains its own
and minimize lowest D
Hypervisor? guests functionality drivers model
level of the TCB

H
183
Different CPUs are
Frequecy slices by the
In multiple VM processing, CPU is alloted to the different processes in form of: Space slices by the OS allocated to different Time slices by the OS A
OS
184
l
Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google e processes
rp
IaaS SaaS PaaS None C
App Engine and Heroku, are some of the example of providing services for:
185
Service performance Service outage by Live migration of VM Service outage by
Pu

Which one of the cases not impacting major system availability C


degrade unplanned downtime for load balancing planned downtime
186
Which of the following is a structured data store that supports indexing and
CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned B
187 data queries to both EC2 and S3?
Which of the following is the machinery for interacting with Amazon’s vast Amazon Elastic Amazon Associates Alexa Web
All of the mentioned B
product data and eCommerce catalog function? Compute Cloud Web Services Information Service
188
Amazon Elastic Amazon Simple Amazon Simple Amazon Simple
Which of the following is the central application in the AWS portfolio? A
Compute Cloud Queue Service Notification Service Storage System
189
Which of the following is a message queue or transaction system for Amazon Elastic Amazon Simple Amazon Simple Amazon Simple
B
distributed Internet-based applications? Compute Cloud Queue Service Notification Service Storage System
190
Which of the following feature is used for scaling of EC2 sites? Auto Replica Auto Scaling Auto Ruling All of the mentioned B
191
Which of the following provides a bridge between a company’s existing Amazon Virtual AWS Premium Amazon Fulfillment
All of the mentioned A
network and the AWS cloud? Private Cloud Support Web Services
192
Amazon plans to
FPS is exposed as an
extend the
Between FBA and API that sorts
capabilities of VPC to
FWS, you can create a transactions into None of the
Point out the wrong statement. integrate with other B
nearly virtual store packages called Quick mentioned
systems in the
on Amazon.com Starts that makes it
Amazon cloud
easy to implement

p
computing portfolio
193

Ap
Which of the following is Amazon’s technical support and consulting Amazon Virtual AWS Premium Amazon Fulfillment
All of the mentioned B
business? Private Cloud Support Web Services
194
Which of the following is a method for bidding on unused EC2 capacity based
On-Demand Instance Reserved Instances Spot Instance All of the mentioned C
195 on the current spot price?

at
High memory
instances are useful

H
FPS is exposed as an
for large data
The standard API that sorts
throughput
instances are not transactions into None of the
Point out the wrong statement. applications such as A

l e suitable for standard


server applications
SQL Server databases
and data caching and
packages called Quick
Starts that makes it
mentioned
rp
easy to implement
retrieval
196
Pu

Which of the following instance has an hourly rate with no long-term


On-Demand Instance Reserved Instances Spot Instance All of the mentioned A
197 commitment?
Which of the following tool is used for measuring I/O of your systems to
EBS IOSTAT ESW All of the mentioned B
198 estimate these transaction costs?
The cost of creating EBS boot partitions
An EBS volume can
an EBS volume is can be stopped and
be used as an None of the
Point out the wrong statement. lesser than creating a started, and they A
instance boot mentioned
similarly sized S3 offer fast AMI boot
partition
199 bucket times
Which of the following is also referred to edge computing? CloudWave CloudFront CloudSpot All of the mentioned B
200
Which of the following is a structured data store that supports indexing and
CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned B
201 data queries to both EC2 and S3 ?
Which of the following is a system for creating block level storage devices that Amazon Elastic Block
CloudWatch AWS Import/Export All of the mentioned B
202 can be used for Amazon Machine Instances in EC2 ? Store
None of the
Amazon EC2 provides virtual computing environments, known as : chunks instances messages B
203 mentioned
Amazon EMR uses Hadoop processing combined with several __________
AWS ASQ AMR AWES A
204 products.
What is a virtual server platform that allows users to create and run virtual None of the
Azure EC2 EC5 B
205 machines on Amazon’s server farm. mentioned
Amazon Simple Amazon Elastic Amazon Simple
________________ is the central application in the AWS portfolio. All of the above B
Queue Service Compute Cloud Notification Service
206
Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple

p
C
207 to support your Web sites? Compute Cloud Queue Service Database Service Storage System

Ap
Amazon Elastic Cloud SimpleDB
is a system for interoperates with EC3 is an Analytics as None of the
Point out the correct statement. B
creating virtual both Amazon EC2 and a Service provider mentioned
208 disks(volume) Amazon S3
Amazon Elastic Amazon Mechanical Multi-Factor

at
Which of the following is a billing and account management service? Amazon DevPay C
209 MapReduce Turk Authentication
Which of the following is a means for accessing human researchers or Amazon Elastic Amazon Mechanical Multi-Factor

H
Amazon DevPay B
consultants to help solve problems on a contractual or temporary basis? MapReduce Turk Authentication
210
Virtual private Starting in 2012,

l e servers can provision


virtual private clouds
Amazon Web
Amazon.com made
its Web service
rp
Point out the wrong statement. Services is based on All of the mentioned C
connected through platform available to
SOA standards
virtual private developers on a
networks usage-basis model
Pu

211
Amazon.com’s
SQL Server is having services represent
EC2 is a Platform as a None of the
Point out the correct statement. enormous impact on the largest pure B
Service (PaaS) market mentioned
cloud computing Infrastructure as a
212 Service (IAAS)
Which of the following is a system for creating block level storage devices that Amazon Elastic Block
CloudWatch AWS Import/Export All of the mentioned B
213 can be used for Amazon Machine Instances in EC2? Store
Which of the following allows merchants to fill orders through Amazon.com Amazon Elastic Amazon Fulfillment Amazon Relational Amazon Simple
B
fulfillment service? Compute Cloud Web Services Database Service Storage System
214
With EC2, you can
launch and run server
A machine image is
instances called A machine image
the software and
Amazon Machine may be thought of as
Point out the correct statement. operating system All of the mentioned D
Images (AMIs) the contents of a
running on top of the
running different boot drive
instance
operating systems
such as Red Hat Linux
215
Which of the following provides access for developers to charge Amazon’s
FWS FAS FPS All of the mentioned C
216 customers for their purchases?
Amazon Elastic Amazon Mechanical Multi-Factor

p
Which of the following uses an authentication device? Amazon DevPay D
217 MapReduce Turk Authentication

Ap
IBM WebSphere Windows Media
Which of the following is a batch processing application? IBM sMash Condor C
218 Application Server Server
Secure access to your Most of the system
Security can be set
EC2 AMIs is image templates that
through passwords,

at
Point out the correct statement. controlled by Amazon AWS offers All of the mentioned D
Kerberos tickets, or
passwords, Kerberos, are based on Red Hat
certificates
and 509 Certificates Linux

H
219
220 How many EC2 service zones or regions exist? 1 2 3 4 D
Amazon ______ cloud-based storage system allows you to store data objects
S1 S2 S3 S4 C
221 ranging in size from 1 byte up to 5GB.
CloudFront supports ______ data by performing static data transfers and
l e table caching geocaching index caching
windows Media
B
rp
222 streaming content from one CloudFront location to another. Server
A volume is mounted
The advantages of an
on a particular You cannot mount
EBS boot partition
Pu

Point out the correct statement. instance and is multiple volumes on All of the mentioned B
are that you can have
available to all a single instance
a volume up to 1TB
223 instances
Data stored in __________ domains doesn’t require maintenance of a schema.

SimpleDB SQL Server Oracle RDS A

224
Amazon Web Services falls into which of the following cloud-computing Infrastructure as a
Platform as a Service Software as a Service Back-end as a Service C
225 category? Service
AWS reaches customers in ______________countries.
137 182 190 86 C
226
Which of the following should be used considering factors shown in the
SimpleDB RDS Amazon EC2 All of the mentioned B
227 figure?
Amazon Machine The metrics obtained
Instances are sized at by CloudWatch may A number of tools are
None of the
Point out the wrong statement. various levels and be used to enable a used to support EC2 D
mentioned
rented on a feature called Auto services
computing/hour basis Scaling
228
Which of the following is an edge-storage or content-delivery system that Amazon Relational Amazon Associates
Amazon SimpleDB Amazon Cloudfront C
229 caches data in different physical locations? Database Service Web Services

p
Which of the following is built on top of a Hadoop framework using the Elastic
Amazon Elastic Amazon Mechanical Multi-Factor

Ap
Compute Cloud? Amazon DevPay A
MapReduce Turk Authentication
230
1. Amazon Elastic 1. Amazon Elastic 1. Amazon Simple
Compute Cloud Block Store Storage System
Which of the following correctly describes components roughly in their order 2. Amazon Simple 2. Amazon Elastic 2. Amazon Elastic None of the

at
A
of importance from top to down? Storage System Compute Cloud Block Store mentioned
3. Amazon Elastic 3. Amazon Simple 3. Amazon Elastic

H
231 Block Store Storage System Compute Cloud
Which of the following is a Web service that can publish messages from an Amazon Elastic Amazon Simple Amazon Simple Amazon Simple
C
application and deliver them to other applications or to subscribers? Compute Cloud Queue Service Notification Service Storage System
232
l
Which of the following metrics are used to support Elastic Load Balancing?e CloudWatch
Amazon Elastic Block
AWS Import/Export All of the mentioned A
rp
233 Store
Amazon Elastic Amazon Simple Amazon Simple Amazon Simple
Which of the following is an online backup and storage system? D
Compute Cloud Queue Service Notification Service Storage System
Pu

234
_________ is a virtual server platform that allows users to create and run None of the
EC2 Azure EC5 A
235 virtual machines on Amazon’s server farm. mentioned
Multi-Factor
AMIs are operating systems running on the _____ virtualization hypervisor. Yen Xen Ben B
236 Authentication
Which of the following instance class is best used for applications that are High Memory None of the
Standard Instances High CPU Instances C
237 processor or compute-intensive? Instances mentioned
Upload new objects Specify where a
Which of the following can be done with S3 buckets through the SOAP and Create, edit, or delete
to a bucket and bucket should be All of the mentioned D
REST APIs? existing buckets
download them stored
238
Which of the following operation retrieves the newest version of the object? PUT GET POST COPY B
239
Amazon S3 provides
Amazon S3 is highly large quantities of Amazon S3 is highly None of the
Which of the following statement is wrong about Amazon S3? C
reliable reliable storage that available mentioned
is highly protected
240
Which of the following is relational database service provided by Amazon? SimpleDB SQL Server Oracle RDS D
241
Which of the following can be considered as a distributed caching system? CND CDN CWD All of the mentioned B
242
Amazon Relational Database Service is a variant of the _______ 5.1 database
Oracle MySQL SQL Server All of the mentioned B
243 system.

p
What are the different types of instances? General purpose Computer Optimized Storage Optimized All of the above D

Ap
244

The types of AMI provided by AWS are: Instance store backed EBS backed Both A & B None of the above C
245

at
Amazon S3 standard-
Storage classes available with Amazon s3 are - Amazon S3 standard Amazon Glacier All of the above D
infrequent Access
246

H
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster
Web Sphere Tivoli Nebula Altix B
operations and acts as a provisioning manager is known as ________.
247

248
Cloud system from SGI is functionally considered as an ________.
l e on-demand cloud
computing service
on-demand cloud
storage service
on-demand cloud
accessing service
on-demand A
rp
249 Cyclone is available in two service models as follows: Paas and Iaas Saas and Paas SaaS and Iaas All of the above C
NASA created ________ can be fifty percent more energy efficient as it turns
Nebula Cloud Cyclone Cloud Force.com Cloud CERN Cloud A
off the computers on the network to make cloud computing efficient.
Pu

250
To establish scalability for the analysis of huge research data, CERN uses LSF
Load assigning
i.e. a ________ grid and workload management solution of cloud computing Load Setting Facility Load Sharing Facility Load Setting Faculty B
Faculty
251 platform
One of the reasons of widespread of cloud is its ability to provide resource
allocation dynamically from a pool of VM resources. State True or False.
TRUE FALSE A

252
A mashup cloud can be designed by utilizing the Scalability of AWS and
Accessibility Mobility Agility Scalability C
253 ________ of GAE platforms
The Cloudlets have a ________ ownership unlike that of Clouds.
centralized decentralized global None of the above B
254
The Data-Intensive Scalable Computing(DISC) utilizes a ________ data-center
HTC HPC HCC HAC A
255 clusters to gather and maintain data.
Multitasking
Performance metrics for HPC/HTC systems include : Security Index Cost Effectiveness All of the above D
256 Scalability
[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which
Scalability Throughput Availability Effectiveness B
257 of the following?
________ refers to an increase in the performance by the addition of more
Horizontal Scalability Vertical Scalability Diagonal Scalability None of the above B
258 resources along the service layers
The percentage of time the system is up and running smoothly is referred as
system up time system scalability system availability system efficiency C
259 ________.
________ is the technology used to search tagged objects and mobile devices
GPS Cloud IoT RFID D

p
with the help of browsing an IP address or using the database entry
260

Ap
Rangeable Frequency Radio Fragment Radio Frequency Rangeable Fragment
RFID stand for ________. C
Identification Identification Identification Identification
261
The architecture of IoT consists of different layers including which of the
following? i. Application Layer

at
ii. Sensing Layer
i, ii, iv i, iii, iv ii, iii, iv ii, iii, iv A
iii. Combination Layer

H
iv. Network Layer
262
Battery-assisted
________ tags contain battery and transmit signals autonomously Acitve RFID Passive RFID Battery-assisted RFID A
263
________ tags needs an external source to wake up the battery. l e passive RFID
rp
Battery-assisted Battery-assisted
Acitve RFID Passive RFID C
passive RFID active RFID
Pu

264
The three major components of RFID hardware based on functionality include
RFID Reader Reader Antenna Reader All of the above D
265 :
Types of Zigbee devices are available as follows: i. ZigBee
Coordinator
ii. ZigBee Router
i, ii, iii i, ii, iii, iv ii, iii, iv i, ii, iv A
iii. ZigBee End Device
iv. ZigBee Accessor
266
Even with two-factor authentication, users may still be vulnerable
Scripting Cross attack Man-in-the-middle Radiant c
267 to_____________attacks.
268 Process of identifying any individual Auditing Authorisation Authentication Accounting c
Process that prevents someone from denying that she accessed resource Accounting Non-repudiation Sniffing Authorisation b
269
Making infrastructure
What security threats do employee-owned devices pose by storing corporate Potential for
vulnerable to Data Loss All of the above d
data and accessing corporate networks? noncompliance
malware
270
Cloud initiated IPS(Intrusion
Which of the following is not a correct way to secure communication layer TLS/SSL Firewalls a
communication Prevention System)
271
Communication
Which of the following is not the component of IoT Endpoint Sensor Gateway MCU b
272 Module
Which of the following makes sure that data is not changed when it not
Integrity Availability Confidentiality Accounting a
273 supposed to be?
Which of the following terms indicates that information is to be read only by

p
Availability Accounting Integrity Confidentiality d
274 those people for whom it is intended?

Ap
Supervisory Control
Supervisory Control Supervisory Column Supervisory Column
What is the full form of SCADA? and Document b
and Data Acquisition and Data Assessment and Data Assessment
Acquisition
275
Distributed Control Distributed Column

at
DCS is a ________ Data Control System Data Column System a
276 System System
277 What is SCADA? Software Process System Hardware b

H
278 The control in SCADA is Online control Direct control Supervisory control Automatic control c
279 When did the SCADA start? 1980s 1990s 1970s 1960s b
280 Which of the following is not the component of a SCADA system? Database server I/O system PLC controller Sparger controller d
281 Which of the following is the heart of a SCADA system?
RFID stands for? l e PLC
Random frequency
HMI
Radio frequency
Alarm task
Random frequency
I/O task
Radio frequency
d
b
rp
282 identification identification information information
283 Which of the following is not involved in working of IoT? RFID Sensor Nano tech Server d
Fog computing Telecommunication
M2M is a term introduced by IoT service providers None of these c
Pu

284 service providers service providers


Sensors are input
Sensors can be Sensors respond to
devices.
Which of these statements regarding sensors is TRUE? analog as well as some external All of these d
digital stimuli.
285
Temperature of the
Heat inside a Strength of a solid
Smart Dust can be used to measure the industrial lathe Chemical in the soil c
computer’s CPU material
286 machine
287 In threat modeling, what methodology used to perform risk analysis DREAD OWASP STRIDE DAR a
288 Out of the following which is not element of threat modelling Asset Vulnerability Threat Time d
Both request and Neither request nor
Request field is present in which message format? Request message Response message a
289 response response
CoAP is specialized for Internet applications Device applications Wireless applications Wired applications a
290
291 Which layer is CoAP? Control layer Transport layer Service layer Application layer c
Multicast support,
Multicast support Low overhead and Simplicity and low
CoAP provides which of the following requirements? Low over head, and d
and simplicity multicast support overhead
292 simplicity
293 CoAP is a specialized _________ protocol. Web Transfer Power Application Resource a
294 URI and content type support is which protocol feature? Http UDP CoAP SPI c
Wide Local Area Wireless Local Area Wireless Land Access Wireless Local Area
What is the full form of WLAN? b
295 Network Network Network Node
Which of the following specifies a set of media access control (MAC) and
IEEE 802.16 IEEE 802.3 IEEE 802.11 IEEE 802.15 c
296 physical layer specifications for implementing WLANs?
Low power Unlicensed radio
Which of the following is not a characteristic of a ZigBee network? Easy installation. High data rates. c
297 consumption bands.

p
Which of the following IEEE standards provides the lowest level of the ZigBee
IEEE 802.11. IEEE 802.15.1. IEEE 802.15.3. IEEE 802.15.4. d

Ap
298 software stack?
Application Support
Which of the following layers are defined by the ZigBee stack? Transport layer Physical layer. Medium Access layer d
299 sub-layer.
What is the typical range of transmission distance in a ZigBee network? 5 m. 50 m. 500 m. 5 km b
300

at
_ is an attack which forces an end user to execute unwanted actions on a Cross-site scoring Cross-site request Two-factor
Cross-site scripting d
301 web application in which he/she is currently authenticated. scripting forgery authentication

H
Two machines in a HTTP client and
Representational State Transfer (REST) is the standard interface between HTTP client and user None of the above c
302 LAN servers
Piggyback

303
Which of the following is not a messaging mode in CoAP?
l e Confirmable Separate Direct c
rp
Extension Messaging Extensible Messaging
Extension Messaging Extensible Messaging
Which of the following is the full form of XMPP? and Presence and Presence b
and Privacy Protocol and Privacy Protocol
304 Protocol Protocol
Pu

305 In 6LoWPAN address, how many bits are globally unique? 16 bits 32 bits 64 bits 128 bits c

Carrier sense multiple Carrier sense multiple


Carrier sense multiple
IEEE 802.15.4 uses which of the following for accessing the channel? access with collision access with collision None of these c
access (CSMA)
detection (CSMA-CD) avoidance (CSMA-CA)
306
307 Three parts of GPS include: space segment control segment user segment all of the above D
308 In case of ________, the GPS works as a receiver, not a transmitter. active tracking passive tracking assisted tracking receiver tracking B
________ is an embedded system which meshes the computing process with Cloud-Physical Cyber-Physical
Cyber-Space System None of the above C
the physical world in the form of an interactive as well as intelligent system System System
309
The number of binding of a node to other actors of the graph in the graph
node degree path length social circle bridge A
310 representation of a network is called as ________.
________ is the degree to which nodes have a common set of connections to Structural
Structural hole Structural cohesion None of the above C
311 other nodes equivalence
The degree to which actors are directly linked to one another through closeness
cohesion centralized path length B
312 cohesive bonds is called as ________.
less
The social circles are loosely coupled if there is ________ stringency of direct more
equal no A
contact.
313
The measures of centrality include:
Betweenness
Closeness Degree All of the above D
314
Arrange the stages in supply chain management:
i. Material and Equipment Supplies

p
ii. Delivery of Products

Ap
iii. After Sale Service and Returns iv, v, i, ii, iii iv, i, v, iii, ii iv, i, v, ii, iii i, ii, iv, v, ii C
iv. Planning and Coordination
v. Manufacturing and Testing
315
Nodes in the network analysis graph represent the ________ and the edges

at
actors
represent the relationships between nodes.
nodes users Both a and b D

H
316
317 Which is the latest Operating System? Real-time OS Desktop OS Mainframe OS Cloud OS D
Just Expensive
Joint Expensive Just Enough
JOES stands for ________
l e Operating System
Operating System
Operating System
Joined Environmental
Operating System
C
rp
318
More reliability Convenience and
Responsibility of OS developers to add new feature in existing OS are Compatibility
security All of the above D
________________
Pu

319
SaaS solution
In future, companies wont worry about the capital for large data center
PaaS solution IaaS solution None of the above B
because of ___________
320
CometCloud
_________ is an autonomic cloud engine whose basic aim is to realize a AsteroidCloud StarCloud
PlanetCloud A
virtual component of cloud with computing capability
321
CloudBridging None
CometCloud supports policy based autonomic __ and __ CloudBursting Both A and B D
322
Infrastructure,
Development, Transport, Network, Programming,
Dynamic, Static
Which are the three conceptual layers in CometCloud? Application, Physical Programming Service, D
Infrastructure
323
Python XML
In Comet, a tuple is a simple ___ string Java HTML C
324
Which of the following policies is not mentioned in ‘not to violate’ regarding
Deadline-based Budget-based Quality-based Workload-based C
CloudBurst?
325
Experiencing multi- Image Processing All of the above
The cloud media services are: Cloud gaming D
326 screens
Key Practices in
Key Performance Key Performance
Industry Key Parameters in
KPI stands for ___________ Index Indicators C
Information
327

p
Ap
SEEP is used in _________ Energy optimization Multimedia Information leakage Cost reduction A
328
System End to End
Static Environmental Symbolic Execution
Protocol State Execution And

at
SEEP stands for _________ Execution Process and Energy Profiles C
Energy Profiles
329

H
Develop, ship, run Create, export
Transport, cloud
Keywords in Docker are ________ anywhere User, data, privacy A
330
Docker can simplify both, ____ and ____
l e Process, state
Behavior, aspect
Workflows,
communication All of the above C
rp
331
“batteries included
“batteries included “batteries but
but removable” “battery less
Basic approach of Docker as a company is: but non-removable” chargeable” A
Pu

execution”
332
Windows
Android
Which containers are used by Docker severs? Linux Mac C
333
Two main components in Docker are:
Master, slave Client, server Client, master All of the above B
334
53378
Docker is generally configured to use TCP port ____ while executing 3306
2375 2376 C
unencrypted traffic
335
Docker is generally configured to use TCP port ____ while managing encrypted
3306
traffic.
53378 2375 2376 D
336
True False
Containers require less disk space as compared to virtual machine A
337
True
There is no built-in framework in Docker for testing. False A
338
Docker provides simple one-line deployment strategy.
True
False A

p
339

Ap
The examples of deployment tools are: Docker’s storm New Relic’s
Spotify’s Helios
Centurion All of the above D
340
Consumption Near
CNS stands for __________ Continuous Network Compact Neural
Sweet-Spot Compound Near

at
System System A
Sweet-Sp0T
341

H
geographical
Wireless Application
systems used to track and identify the location of objects in real time Geolocation information system Real-time location
Protocol (WAP) D
(GIS) system (RTLS)
342
gateway to the Internet optimized for mobility
l e Voice portal WiMax Mobile enterprise
Mobile Portal D
rp
343
Voice portal Geolocation sensor network
automatically identifying a Web user's location WiMax B
344
Pu

ubiquitous computing Context-aware


Computing capabilities embedded into objects around us (mobile and pervasive computing
(ubicom) computing Geolocation B
stationary)
345
Context-aware
Mobile Portal pervasive computing
Computing capabilities embedded in the environment but typically not mobile computing Voice portal B
346
Typical Mobile
Vehicle mount solutions Wireless wide area
Mobile enterprise Devices Used in Interactive voice
• Handheld solutions network (WWAN) C
Warehouses response (IVR)
• Hands-free and voice solutions
347
A collection of nodes capable of environmental sensing, local computation,
Voice portal Mobile Portal Geolocation sensor network D
and communication with its peers or with other higher performance nodes
348
short-range radio frequency communication technology for remotely storing Network-based Real-time location radio frequency Wireless wide area
C
and retrieving data using devices called ___ tags and ___ readers positioning system (RTLS) identification (RFID) network (WWAN)
349
Real-time location Wireless wide area Wireless Local Area Wireless Application
a technology that offers Internet browsing from wireless devices D
system (RTLS) network (WWAN) Network (WLAN) Protocol (WAP)
350
Location-based m-
delivery of m-commerce transactions to individuals in a specific location, at a Context-aware ubiquitous computing Network-based
commerce (l- A
specific time computing (ubicom) positioning
351 commerce)
Calculating the location of a mobile device from signals sent by the device to Personal Area terminal-based Network-based
pervasive computing B
352 base stations Network (PAN) positioning positioning

p
a wireless technology, designed to provide Internet access across metro areas Voice portal
Mobile Portal WiMax Geolocation C
to fixed (not moving) users. It is considered wireless broadband technology

Ap
353
a website with an audio interface that can be accessed through a telephone WiMax
Geolocation Mobile Portal Voice portal D
354 call
Wireless wide area Wireless Local Area Personal Area
Wireless Application

at
a wireless version of the Ethernet networking standard network (WWAN) Network (WLAN) Network (PAN) B
Protocol (WAP)
355

H
Personal Area Interactive voice Real-time location geographical
computer system capable of integrating, storing, editing, analyzing, sharing,
Network (PAN) response (IVR) system (RTLS) information system D
and displaying geographically referenced (spatial) information
356 (GIS)
a voice system enables users to request/receive info, enter/change data
through a telephone to a computerized system
l e pervasive computing
Real-time location
system (RTLS)
Personal Area
Network (PAN)
Interactive voice
response (IVR)
D
rp
357
Personal Area Wireless Application Wireless wide area
a telecommunications network that offers wireless coverage over a large Wireless Local Area
Network (PAN) Protocol (WAP) network (WWAN) C
Pu

geographical area, typically over a cellular phone network Network (WLAN)


358
application of mobile computing inside the enterprise (e.g., for improved sensor network Mobile enterprise Voice portal
Mobile Portal B
359 communication among employees)
Wireless wide area Personal Area Wireless Local Area
a wireless telecommunications network for device-to-device connections
network (WWAN) Network (PAN) Network (WLAN) sensor network B
within a very short range
360
Context-aware
ability to detect and react to a set of environmental variables that is described Mobile Portal pervasive computing Network-based
computing B
as context (which can be sensor info or users' attitudes) positioning
361
Which of the following is a specification for multicast discovery on a LAN? WS-Agent WS-Discovery WS-SOAP All of the mentioned B
362
363

You might also like