Quiz 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Cloud Computing (S2-21_CSIWZG527)

Which of the following is not part of Hypervisor Design goals?


Select one:
a. Modifiability
b. Reliability
c. Isolation

d. Scalability
The process of off-loading tasks to the cloud during times when the most compute resources are
needed is called _________________
Select one:
a. Cloud bursting
b. Load validation
c. Tasks off-load

d. Resource pooling
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-
created or acquired applications created using programming languages and tools supported by
the provider comes under _____________________________ model
Select one:
a. Infrastructure As Service
b. Software As Service
c. Platform As Service

d. All of the mentioned

Advantage of thin layer of software to achieve hypervisor goal is


Select one:
a. High reliability
b. Basis for Trusted Computing Base (TCB)
c. Support of Smaller in nature : Microkernel

d. All of the above mentioned

Goals for a virtual machine architecture are:


Select one:
a. Equivalence
b. Efficiency
c. All the above mentioned
d. Resource control
Decoupling memory from the server to provide a shared, distributed, or networked function is
called __________________
Select one:
a. All the above
b. Application Virtualization
c. Memory Virtualization

d. Storage Virtualization
Amazon is the de-facto standard for ______________________________
Select one:
a. Platform As Service
b. Software As Service
c. All of the mentioned

d. Infrastructure As Service
Rackspace Cloud Service an example of --------
Select one:
a. All the mentioned
b. PaaS
c. IaaS

d. SaaS
The resource management term that refers to the grouping together of resources (compute
(CPU), network(bandwidth), storage) for the purposes of maximizing advantage and/or
minimizing risk to the users is called ________________________________________
Select one:
a. Cloud balancing
b. Cloud bursting
c. Resource pooling

d. Network balancing
For the above statement, which feature is applicable?
Select one:
a. 1, 2 and 3
b. 1 and 3
c. 1 only

d. 2 and 3
o run a virtual machine with all three desired properties, which of the following conditions should
be satisfied?
Select one:
a. Sensitive instructions are a subset of privileged instructions
b. Privileged instructions are a subset of sensitive instructions.
c. None of the above, because there exist different virtualization techniques.

d. Both of the above are important.


The capability provided to the consumer is to use the provider’s applications running on a cloud
infrastructure comes under ______________________________ model
Select one:
a. Infrastructure As Service
b. Software As Service
c. All of the mentioned

d. Platform As Service
General characteristics of Software as a Service include?
Select one:
a. Provides a platform to build applications and services.
b. Application is accessed over the internet.
c. Resources are distributed as a service.

d. All of the mentioned


The purpose of OpenStack Horizon is to
Select one:
a. Manage OpenStack services
b. Manage OpenStack deployment
c. Manage OpenStack services

d. Manage Network interfaces


Management and monitoring of a computer network as a single managerial entity from a single
software based administrator’s console is called _______________________
Select one:
a. external Network Virtualization
b. Software Virtualization
c. Platform Virtualization

d. Internal Network Virtualization


The cloud infrastructure that is a composition of two or more clouds (private, community, or
public) comes under ___________________________ deployment model.
Select one:
a. Public Cloud
b. Hybrid Cloud
c. Community Cloud

d. Private Cloud
The capability provided to the consumer to provision processing, storage, networks, and other
fundamental computing resources comes under
____________________________________________ model
Select one:
a. Platform As Service
b. All of the mentioned
c. Infrastructure As Service

d. Software As Service
What are the characteristics of cloud computing? 1.Homogeneity , 2.Service orientation ,
3.Geographic distribution , 4.Rely on raditional hardware
Select one:
a. 1, 2 and 4
b. 1, 3 and 4
c. 1, 2 and 3

d. 2, 3 and 4
The ability to apply a quantifiable methodology that allows for the basis of an adaptive
introspection within a real time infrastructure is called _________________________
Select one:
a. Stretchability
b. Elasticity
c. Adaptability
d. Scalability

Previous page

_______________ is an enhancement of virtualization technology in which a guest OS is


modified prior to installation inside a virtual machine (VM) in order to allow all guest OSes within
the system to share resources and successfully collaborate, rather than attempt to emulate an
entire hardware environment.
Select one:
a. SKI Virtualization
b. Paravirtualization
c. Software virtualization

d. Hardware virtualization
IT Infrastructure Projects and
Processes (S2-21_CSIWZG511)
What process represent the scope of financial management for IT services?
Select one:
a. Billing, Accounting and Charging.
b. Budgeting, Costing and Charging.
c. Budgeting, Accounting and Charging.

d. Cost models and invoicing.

Which of these does not constitute the people componenet of systems


Select one:
a. Vendors and suppliers
b. Users
c. Government Officials

d. System support staff


'Doing the Right Way’ is/are
Select one:
a. Both A and BQuality, quantity, query.
b. Agile Method
c. Structured Approach

d. None of the above


What is the timebox for daily Scrum
Select one:
a. 15 Minutes
b. 5 Minutes
c. 4 Hours

d. Two Minutes per person


Which of these is not agile
Select one:
a. XP
b. Kanban
c. V process

d. SRUM
'You are solving this quiz', is the example of
Select one:
a. Routine
b. Recreational Actvity
c. Project

d. Repetative Work
What is the objective of service level management
Select one:
a. Monitor changes throughout their lifecycle
b. Respond to service requests and inquiries promptly
c. Define, document, agree, monitor, measure, report, and review services

d. Establish the root cause of incidents and problems efficiently and cost effectively
Which of the following model would you prefer for client/server applications?
Select one:
a. Spiral Model
b. Incremental Model
c. Concurrent Model

d. WINWIN Spiral Model


PRINCE2 stands for
Select one:
a. Projects in Controlled Environments
b. Part Route Incident Evaluation.
c. Project recommendation in cost evaluation.

d. Prince Charles II
Which process analyses services that are no longer viable and when they should be retired?
Select one:
a. Service portfolio management
b. Service Level Management
c. Business Management

d. Change management
Scrum in agile process is
Select one:
a. Design
b. Sprint
c. Analysis

d. Requirements
Service is tested in
Select one:
a. Service design
b. Service strategy
c. Service transition

d. Service operation
Each template is a function that builds a publication using one of three different components.
Which of these is not one of them?
Select one:
a. Dynamic elements
b. External services
c. Publication services
d. Static elements

Previous page

Target Audience is
Select one:
a. All of the above
b. Organizations that are going out to tender for their services
c. Service Providers

d. Organizations that aims to improve services


The following is not a ITIL BRM Sub-Processes.
Select one:
a. Identify Service Requirements.
b. Notional Charges
c. Sign up customers to Standard Services.

d. Maintain Customer Relationship.


Reliability is closely related to
Select one:
a. Performance
b. Availability
c. Extensibility

d. Security
The full form of PMBOK is
Select one:
a. Project Management Body of Knowledge.
b. Project Management Book of Knowledge.
c. Project Management Book.

d. Practical Management Body of Knowledge.


Cash Flow Forecasting is
Select one:
a. evaluation of cash budget over project execution time
b. Flow of money due to client satisfaction risk
c. Flow of money due to design failure risk

d. Flow of money to mitigate risk in future


Which is not part of risk management?
Select one:
a. Risk analysis
b. Risk monitoring
c. Risk mitigation

d. Risk identification
'Brainstorming' is the part of
Select one:
a. Risk identification
b. Risk monitoring
c. Risk analysis and prioritization
d. Risk planning

Previous page

Web Technologies (S2-21_CSIWZG526)


Which of the following tags is not optional in html5?
Select one:
a. Head
b. Doctype
c. Html

d. Body
A Rendering engine is not responsible for ________
Select one:
a. parsing style information (CSS only)
b. parsing style information (CSS, XSL, and so on)
c. parsing the mark-up content (HTML)

d. generating a visual presentation of the formatted content including media files referenced
What is the path for an image located in same folder as the current page?
Select one:
a. <img src= “../pic.jpg”>
b. <img src= “pic.jpg”>
c. <img src= “/images/pic.jpg”>

d. <img src= “images/pic.jpg”>


Most domain names are assigned by _____________.
Select one:
a. InterNIC
b. DISA
c. None of the above

d. ICANN
WHich of the following is not one of the request methods of HTTP?
Select one:
a. USE
b. POST
c. TRACE

d. PUT
Which of the following is the first web browser?
Select one:
a. Netscape Navigator
b. Mosaic
c. Internet Explorer

d. Nexus
The class selector in CSS is represented by:
Select one:
a. Hash symbol
b. Dollar Symbol
c. None of the above

d. Dot symbol
var x=a.lastIndexOf("B");
Select one:
a. 6
b. Undefined
c. 7

d. Run Time Error


Which of the following is not a reserved word in Javascript?
Select one:
a. All
b. Var
c. Number

d. Set
The ____ attribute specifies an inline style associated with an element, which determines the
rendering of the affected element.
Select one:
a. style
b. id
c. pre

d. dir
10px represents which border property?
Select one:
a. Right border
b. Top border
c. Bottom border

d. Left border
Which one of the statement has the correct syntax?
Select one:
a. <p id=”#td”>
b. <p id=”%td”>
c. <p id=”1td”>
d. <p id=”td”>
Select the correct one from the following to embed a JavaScript file in HTML document.
Select one:
a. <script ref=”wipro.js”>
b. <script src=”wipro.js”>
c. <script href=”wipro.js”>

d. <script name=”wipro.js”>
Which of the following is not used with text-decoration property?
Select one:
a. Inline
b. Over line
c. Underline

d. Line-through
Which among the following is not the part of box model?
Select one:
a. Border
b. Content
c. None of the mentioned above.

d. Padding
Javascript arrays uses
Select one:
a. Both the Mentioned
b. Named indexes
c. None of the mentioned.

d. Numbered indexes
what does a variable a contain from the following code a = 2+"3"
Select one:
a. Compilation Error
b. Run Time Error
c. 5

d. 23
Which property should I use to return all the text and HTML content contained within an element
Select one:
a. InnerHTML
b. TextContent
c. OuterHTML

d. InnerText
Which element will of use for art direction in responsive designs?
Select one:
a. Canvas
b. Svg
c. Picture

d. Img
The best way to break up a string in Javascript is to use ____________.
Select one:
a. /
b. ||
c. \

d. +

Advanced Computer Networks (S2-


21_CSIWZG525)
Which of the following Algorithms is an example of Closed Loop Solutions
Select one:
a. Warning Bit
b. Full Bucket
c. Token Bucket

d. Leaky Bucket
Which of the following approaches prevents Congestion Control
Select one:
a. Public Loop
b. Closed Loop
c. Open Loop

d. Private Loop
What is a Bandwidth-Delay Product (BDP)
Select one:
a. Product of Bandwidth ( in bits per second) and number of of Routers enroute
b. Product of Number of Packets and Speed
c. Product of Bandwidth ( in bytes per Second) and Receive Buffer Size ( in bytes)

d. Product of Bandwidth ( in bits per second) and Round Trip Time ( in Seconds)
What allows TCP to detect lost segments and in turn recover from that loss?
Select one:
a. Acknowledgment number
b. Checksum
c. Both Sequence & Acknowledgment number

d. Sequence number
Commands to control aircraft is belongs
Select one:
a. Lax RTS
b. Hard RTS
c. Soft RTS
d. Firm RTS

Previous page

A program that can display a web page is called ------------------


Select one:
a. web client
b. web portal
c. HTTP browser

d. web browser
The ___________ is expressed as Propagation+Transmit+queue
Select one:
a. Bit rate
b. Latency
c. Throughput

d. RTT
Stream Control Transmission Protocol is implemented at
Select one:
a. Transport layer
b. Data link layer
c. None

d. Network layer
Which of the following buffers is used for Flow Control in TCP
Select one:
a. Traffic Buffer
b. Receive Buffer
c. Sender Buffer

d. Open Buffer
Retransmission of packets is required if
Select one:
a. Packet is fragmented
b. Packet is lost
c. Packets arrive out of sequence

d. Packet is error-free
Consider a situation where a user wants to fetch a 1MB file across a 1Gbps network with a
round-trip time of 100ms, then the transfer time is
Select one:
a. 108ms
b. 107ms
c. 106ms

d. 109ms
Network virtual terminal is the service offered by
Select one:
a. Application layer
b. Data link layer
c. Network layer

d. Transport layer
Network virtual terminal is the service offered by
Select one:
a. Application layer
b. Data link layer
c. Network layer

d. Transport layer
The size of an IP address in IPv6 is _________
Select one:
a. 265 bits
b. 128 bits
c. 64 bits
d. 32 bits
The broad categories of congestion control are
Select one:
a. Active control and Passive control
b. Open-control and Closed-control
c. Active loop and Passive loop

d. Open-loop and Closed-loop


End to end service is offered by
Select one:
a. Transport layer
b. None of the above
c. Network layer

d. Application layer
------ provides Efficiency and privacy.
Select one:
a. Multiplexing
b. Switching
c. Broadcasting

d. Digital Signature
________ product is important to know when constructing high-performance networks.
Select one:
a. Bandwidth x Delay
b. Bandwidth x Latency
c. Bandwidth x Size

d. None of these
Which of the following is loss intolerant application
Select one:
a. Music Streaming Application
b. Watching Cricket on HotStar
c. Remote ECG Monitoring Application

d. Skype Video call


Application layer protocol used for mail transfer
Select one:
a. HTTP
b. FTP
c. IMAC
d. SMTP

Previous page

Real time traffic requires buffer of type


Select one:
a. Play back
b. Sorted
c. Unsorted

d. Reordering

You might also like