Deck 12: Cloud Computing and Distributed Systems

ملء الشاشة (f)
exit full mode
سؤال
__________          is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.

A)remote sensing
B)remote invocation
C)cloud computing
D)private computing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Cloud providers provide cloud services to the cloud users.
سؤال
Which of the following is not a cloud stakeholder?

A)cloud providers
B)clients
C)end users
D)cloud users
سؤال
These cloud services are of the form of utility computing i.e. the ___________  uses these services pay-as-you-go model.

A)cloud providers
B)clients
C)end users
D)cloud users
سؤال
Which of the following is not a type of cloud?

A)private
B)public
C)protected
D)hybrid
سؤال
In this type of cloud, an organization rents cloud services from cloud providers on- demand basis.

A)private
B)public
C)protected
D)hybrid
سؤال
In this type of cloud, the cloud is composed of multiple internal or external cloud.

A)private
B)public
C)protected
D)hybrid
سؤال
__________    enables the migration of the virtual image from one physical machine to another.

A)visualization
B)virtualization
C)migration
D)virtual transfer
سؤال
Most of the cloud architectures are built on this type of architecture.

A)skeleton
B)grid
C)linear
D)template
سؤال
Saas stands for?

A)software as a service
B)system software and services
C)software as a system
D)system as a service
سؤال
In distributed system, each processor has its own __________

A)local memory
B)clock
C)both local memory and clock
D)none of the mentioned
سؤال
If one site fails in distributed system then

A)the remaining sites can continue operating
B)all the sites will stop working
C)directly connected sites will stop working
D)none of the mentioned
سؤال
Network operating system runs on

A)server
B)every system in the network
C)both server and every system in the network
D)none of the mentioned
سؤال
Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?

A)cache coherence scheme
B)computation migration
C)remote procedure call
D)message passing
سؤال
Logical extension of computation migration is __________

A)process migration
B)system migration
C)thread migration
D)data migration
سؤال
Processes on the remote systems are identified by __________

A)host id
B)host name and identifier
C)identifier
D)process id
سؤال
In distributed systems, link and site failure is detected by __________

A)polling
B)handshaking
C)token passing
D)none of the mentioned
سؤال
The capability of a system to adapt the increased service load is called __________

A)scalability
B)tolerance
C)capacity
D)none of the mentioned
سؤال
Internet provides_________    for remote login.

A)telnet
B)http
C)ftp
D)rpc
سؤال
Which of the following was one of the top 5 cloud applications in 2010?

A)cloud backup
B)web applications
C)business applications
D)all of the mentioned
سؤال
Point out the correct statement.

A)google's cloud includes perhaps some 10 data centers worldwide
B)flipkart.com's infrastructure was built to support elastic demand so the system could accommodate peak traffic
C)data centers have been sited to optimize the overall system latency
D)all of the mentioned
سؤال
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage?

A)on-demand self-service
B)broad network access
C)resource pooling
D)all of the mentioned
سؤال
The_________is something that you can obtain under contract from your vendor.

A)pos
B)qos
C)sos
D)all of the mentioned
سؤال
Point out the wrong statement.

A)internet consumes roughly 1 percent of the world's total power
B)the cost advantages of cloud computing have enabled new software vendors to create productivity applications
C)a client can provision computer resources without the need for interaction with cloud service provider personnel
D)none of the mentioned
سؤال
All cloud computing applications suffer from the inherent_________    that is intrinsic in their WAN connectivity.

A)propagation
B)latency
C)noise
D)all of the mentioned
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Cloud Computing and Distributed Systems
1
__________          is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.

A)remote sensing
B)remote invocation
C)cloud computing
D)private computing
cloud computing
2
Cloud providers provide cloud services to the cloud users.
True
3
Which of the following is not a cloud stakeholder?

A)cloud providers
B)clients
C)end users
D)cloud users
clients
4
These cloud services are of the form of utility computing i.e. the ___________  uses these services pay-as-you-go model.

A)cloud providers
B)clients
C)end users
D)cloud users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not a type of cloud?

A)private
B)public
C)protected
D)hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
In this type of cloud, an organization rents cloud services from cloud providers on- demand basis.

A)private
B)public
C)protected
D)hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
In this type of cloud, the cloud is composed of multiple internal or external cloud.

A)private
B)public
C)protected
D)hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
__________    enables the migration of the virtual image from one physical machine to another.

A)visualization
B)virtualization
C)migration
D)virtual transfer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Most of the cloud architectures are built on this type of architecture.

A)skeleton
B)grid
C)linear
D)template
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Saas stands for?

A)software as a service
B)system software and services
C)software as a system
D)system as a service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
In distributed system, each processor has its own __________

A)local memory
B)clock
C)both local memory and clock
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
If one site fails in distributed system then

A)the remaining sites can continue operating
B)all the sites will stop working
C)directly connected sites will stop working
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Network operating system runs on

A)server
B)every system in the network
C)both server and every system in the network
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?

A)cache coherence scheme
B)computation migration
C)remote procedure call
D)message passing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Logical extension of computation migration is __________

A)process migration
B)system migration
C)thread migration
D)data migration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Processes on the remote systems are identified by __________

A)host id
B)host name and identifier
C)identifier
D)process id
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
In distributed systems, link and site failure is detected by __________

A)polling
B)handshaking
C)token passing
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The capability of a system to adapt the increased service load is called __________

A)scalability
B)tolerance
C)capacity
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Internet provides_________    for remote login.

A)telnet
B)http
C)ftp
D)rpc
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following was one of the top 5 cloud applications in 2010?

A)cloud backup
B)web applications
C)business applications
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Point out the correct statement.

A)google's cloud includes perhaps some 10 data centers worldwide
B)flipkart.com's infrastructure was built to support elastic demand so the system could accommodate peak traffic
C)data centers have been sited to optimize the overall system latency
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage?

A)on-demand self-service
B)broad network access
C)resource pooling
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
The_________is something that you can obtain under contract from your vendor.

A)pos
B)qos
C)sos
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Point out the wrong statement.

A)internet consumes roughly 1 percent of the world's total power
B)the cost advantages of cloud computing have enabled new software vendors to create productivity applications
C)a client can provision computer resources without the need for interaction with cloud service provider personnel
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
All cloud computing applications suffer from the inherent_________    that is intrinsic in their WAN connectivity.

A)propagation
B)latency
C)noise
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.