is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
1.cloud-physical system
2.cyber-space system
3.cyber-physical system
4.None of the above
is the degree to which nodes have a common set of connections toother nodes
1.structural hole
2.structuralequivalence
3.structural cohesion
4.none of the above
is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability
1.cometcloud
2.asteroidcloud
3.starcloud
4.planetcloud
automatically identifying a Web user's location
1.voice portal
2.geolocation
3.sensor network
4.wimax
Basic approach of Docker as a company is:
1.“batteries included but removableâ€
2.batteries included but non-removableâ€
3.batteries but chargeable
4.“battery less executionâ€
CometCloud supports policy based autonomic and
1.cloudbursting
2.cloudbridging
3.none
4.both a and b
Keywords in Docker are
1.develop, ship, run anywhere
2.create, export
3.transport, cloud
4.user, data, privacy
Process that prevents someone from denying that she accessed resource
1. accounting
2.non-repudiation
3.sniffing
4.authorisation
Responsibility of OS developers to add new feature in existing OS are
1.more reliability
2.convenience and security
3.compatibility
4.All of the above
What is the full form of WLAN?
1.wide local areanetwork
2.wireless local areanetwork
3.wireless land accessnetwork
4.wireless local areanode
When did the SCADA start?
1.1980s
2.1990s
3.1970s
4.1960s
Which are the three conceptual layers in CometCloud?
1. development, application, physical
2. infrastructure, dynamic, static
3. transport, network, programming
4.programming, service, infrastructure
Which of the following can be considered as a distributed caching system?
1.cnd
2.cdn
3.cwd
4.All of the mentioned
Which of the following is relational database service provided by Amazon?
1.simpledb
2.sql server
3.oracle
4.rds
Which of the following is Type 2 VM?
1.virtuallogix vlx
2.vmware esx
3.xen
4.lynxsecure
Which of the following layers are defined by the ZigBee stack?
1. transport layer
2.physical layer
3.application supportsub-layer.
4.medium access layer
Which of the following should be placed in second lowermost layer for the following figure?
1.host operating system
2.software
3.vm
4.None of the mentioned
Which of the following will be the host operating system for Windows Server?
1.virtuallogix vlx
2.microsoft hyper-v
3.xen
4.All of the mentioned
. Docker is generally configured to use TCP port while executing unencrypted traffic
1. 3306
2.53378
3.2375
4.2376
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
1.voice portal
2.mobile portal
3.geolocation
4.sensor network
a technology that offers Internet browsing from wireless devices
1.real-time location system (rtls)
2.wireless wide area network (wwan)
3. wireless local area network (wlan)
4.wireless application protocol (wap)
Amazon Web Services falls into which of the following cloud-computingcategory?
1.platform as a service
2.software as a service
3.infrastructure as aservice
4.back-end as a service
AMIs are operating systems running on the virtualization hypervisor.
1.yen
2.xen
3.ben
4.multi-factorauthentication
An operating system running on a Type VM is full virtualization.
1.1
2.2
3.3
4.None of the mentioned
Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv. Planning and Coordination v. Manufacturing and Testing
1. iv, v, i, ii, iii
2. iv, i, v, iii, ii
3.iv, i, v, ii, iii
4.i, ii, iv, v, ii
Based on PageRank algorithm, Google returns for a query that is parsed for its keywords.
1.sep
2.sap
3.serp
4.business objects build
Cloud system from SGI is functionally considered as an
1. on-demand cloudcomputing service
2. on-demand cloudstorage service
3.on-demand cloudaccessing service
4. on-demand
CNS stands for
1.consumption near sweet-spot
2.continuous network system
3.compact neural system
4.compound near sweet-sp0t
CoAP is a specialized protocol.
1.web transfer
2.power
3.application
4.resource
CoAP is specialized for
1. A. internet applications
2.device applications
3.wireless applications
4.wired applications
Computing capabilities embedded in the environment but typically not mobile
1.mobile portal
2.pervasive computing
3.context-aware computing
4.voice portal
Computing capabilities embedded into objects around us (mobile and stationary)
1. pervasive computing
2.ubiquitous computing (ubicom)
3.context-aware computing
4.geolocation
Docker can simplify both, and
1.process, state
2.behavior, aspect
3.workflows, communication
4.all of the above
Docker is generally configured to use TCP port while managing encrypted traffic.
1.3306
2.53378
3.2375
4.2376
Dynamic content presented in Google crawling isn’t normally indexed.
1.ajax
2.java
3.javascript
4.All of the mentioned
gateway to the Internet optimized for mobility
1.voice portal
2.wimax
3.mobile enterprise
4.mobile portal
IEEE 802.15.4 uses which of the following for accessing the channel?
1.carrier sense multiple access (csma)
2.carrier sense multiple access with collision detection (csma-cd)
3.carrier sense multiple access with collision avoidance (csma-ca)
4.None of These
In 6LoWPAN address, how many bits are globally unique?
1. 16 bits
2.32 bits
3.64 bits
4.128 bits
In case of , the GPS works as a receiver, not a transmitter.
1.active tracking
2.passive tracking
3.assisted tracking
4.receiver tracking
In Comet, a tuple is a simple string
1.java
2.python
3.xml
4.html
In future, companies wont worry about the capital for large data center because of
1. saas solution
2.paas solution
3.iaas solution
4. none of the above
JOES stands for
1.joint expensive operating system
2.just expensive operating system
3. just enough operating system
4. joined environmental operating system
KPI stands for
1.key practices in industry
2. key performance index
3.key performance indicators
4.key parameters in information
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
1.nebula cloud
2.cyclone cloud
3.force.com cloud
4.cern cloud
Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.
1. actors
2.nodes
3.users
4. both a and b
Out of the following which is not element of threat modelling
1.asset
2.vulnerability
3.threat
4. time
Point out the correct statement.
1.with paas, the goal is to create hosted scalable applications that are used in a software as a service model
2.applications built using paas tools need to be standards-based
3.in wolf, the data and transaction management conforms to the business rules you create
4.All of the mentioned
Point out the wrong statement.
1.amazon machine instances are sized at various levels and rented on a computing/hour basis
2. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling
3. a number of tools are used to support ec2 services
4.None of the mentioned
Point out the wrong statement.
1. load balancing virtualizes systems and resources by mapping a logical address to a physical address
2.multiple instances of various google applications are running on different hosts
3. google uses hardware virtualization
4.all of the mentioned
Point out the wrong statement.
1.wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
2.applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
3.google applications are cloud-based applications
4.None of the mentioned
Representational State Transfer (REST) is the standard interface between
1.two machines in alan
2.http client and user
3.http client andservers
4.None of the above
SEEP is used in
1.energy optimization
2.multimedia
3.information leakage
4.cost reduction
SEEP stands for
1.system end to end protocol
2.static environmental execution process
3. symbolic execution and energy profiles
4.state execution and energy profiles
short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers
1.network-based positioning
2.real-time location system (rtls)
3.radio frequency identification (rfid)
4.wireless wide area network (wwan)
systems used to track and identify the location of objects in real time
1.geolocation
2.geographical information system (gis)
3.wireless application protocol (wap)
4.real-time location system (rtls)
The cloud media services are:
1. cloud gaming
2.experiencing multi-screens
3.image processing
4.all of the above
The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.
1.htc
2.hpc
3.hcc
4.hac
The degree to which actors are directly linked to one another throughcohesive bonds is called as .
1.closeness
2.cohesion
3.centralized
4. path length
The examples of deployment tools are:
1.docker’s storm
2.new relic’s centurion
3.spotify’s helios
4.All of the above
The examples of deployment tools are:
1.docker’s storm
2.new relic’s centurion
3. spotify’s helios
4.All of the above
The measures of centrality include:
1.betweenness
2.closeness
3.degree
4.All of the above
The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as .
1.node degree
2.path length
3.social circle
4.bridge
The output of the reduce task is typically written to the FileSystem via
1.outputcollector.collect
2.outputcollector.get
3.outputcollector.receive
4. outputcollector.put
The social circles are loosely coupled if there is stringency of direct contact.
1. less
2.more
3.equal
4.no
Three parts of GPS include:
1.space segment
2.control segment
3.user segment
4.All of the above
Two main components in Docker are:
1.master, slave
2.client, server
3.client, master
4.All of the above
URI and content type support is which protocol feature?
1. http
2.udp
3.coap
4.spi
Vehicle mount solutions • Handheld solutions • Hands-free and voice solutions
1.mobile enterprise
2.wireless wide area network (wwan)
3. typical mobile devices used in warehouses
4.interactive voice response (ivr)
What is SCADA?
1. software
2.process
3.system
4.hardware
What is the typical range of transmission distance in a ZigBee network? A. 5 m. B. C. D.
1.5 m.
2.50 m.
3.500 m.
4.5 km
Which containers are used by Docker severs?
1.windows
2.android
3.linux
4.mac
Which of the following is not a characteristic of a ZigBee network?
1.low powerconsumption
2.easy installation.
3.high data rates
4.unlicensed radiobands
Which of the following is not a correct way to secure communication layer
1. cloud initiated communication
2.tls/ssl
3.ips(intrusion prevention system)
4.firewalls
Which of the following is not a messaging mode in CoAP?
1.confirmable
2.separate
3.direct
4.piggyback
Which of the following is not involved in working of IoT?
1. rfid
2.sensor
3.nano tech
4.server
Which of the following is not provided by “Deep Web�
1. database generated web pages
2.private or limited access web pages
3.pages without links
4.All of the mentioned
Which of the following is the full form of XMPP?
1.extension messaging and presenceprotocol
2.extensible messaging and presenceprotocol
3.extension messaging and privacy protocol
4.extensible messaging and privacy protocol
Which of the following is the heart of a SCADA system?
1. plc
2.hmi
3.alarm task
4. i/o task
Which of the following metrics are used to support Elastic Load Balancing?
1.cloudwatch
2.amazon elastic blockstore
3.aws import/export
4.All of the mentioned
Which of the following operation retrieves the newest version of the object?
1.put
2.get
3.post
4.copy
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?
1.deadline-based
2.budget-based
3.quality-based
4.workload-based
Which of the following provide system resource access to virtual machines?
1. vmm
2.vmc
3.vnm
4.None of the mentioned
Which of the following should be used considering factors shown in thefigure?
1.simpledb
2.rds
3.amazon ec2
4.All of the mentioned
Which of these statements regarding sensors is TRUE?
1. sensors are input devices.
2.sensors can be analog as well as digital
3.sensors respond to some external stimuli.
4.All of the above
Which type of Hypervisor is shown in the following figure?
1. type 1
2.type 2
3.type 3
4.All of the mentioned