Objective Questions UNIT-1
Objective Questions UNIT-1
Objective Questions UNIT-1
UNIT-1
1. What is an important concern for the customer in multi-tenant environments?
A. Availability
B. Network bandwidth
C. Network latency
D. Security
2. Virtualization is a key architectural feature of Cloud computing.
What is another one of these key characteristics of Cloud computing?
A. the use of secured access
B. the use of Service Level Agreements
C. the use of standard protocol
D. the use of the Internet
3. Where did the Internet begin?
A. a cluster of cooperating universities in the USA
B. computer hobbyists
C. the CIA
D. the Department of Defense of the USA
4. What is a benefit of Cloud Computing for IT staff?
A. higher payment of IT staff involved in Cloud Computing
B. less interruption of work caused by users asking for support
C. less knowledge needed: Cloud Computing does not require special skills
D. lower stress levels: less worry about normal daily activities like making back-ups
5. What is a correct description of a Thin Client?
A. a Client computer without a screen
B. a mobile phone with access to the Internet
C. a Personal Computer without a hard drive
D. a user terminal without a processor
6. What is Multi-tenancy?
A. An architecture in which a single instance of a software application serves multiple
customers.
B. An architecture in which each customer has their own software instance.
C. A way of thinking in terms of services and service-based development and the outcomes of
services.
D. The act of creating a virtual (rather than actual) version of something, including (but not
limited to) a virtual computer hardware platform, operating system (OS), storage device, or
computer network resources.
7. The ISO/IEC 20000-1:2011 standard requires that ISO/IEC 20000 processes are
documented.
Who needs to show that they are familiar with the processes and adhere to the procedures and
working instructions?
A. Only the organization, because they are responsible for the processes.
B. Only the Cloud service provider, because they take over all responsibility.
C. Both the organization and the Cloud service provider, because they share responsibility.
D. Neither the organization, nor the Cloud service provider, because the processes within
Cloud computing are outside the scope of ISO/IEC 20000.
8. Which service model allows the customer to choose more layers in the computing
architecture?
A. Infrastructure as a Service (IaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. There is no difference between the service models.
9. What is an example of a single purpose environment?
A. any application on any server
B. interface to a large computer
C. interface to large storage
D. Mainframe
10. What is Federation in Identity management?
A. cloud-based Identity management enabling single sign-on (SSO) for multiple systems
B. systems in the Cloud sharing information about the identity of users
C. the cloud of all systems accessible by a single user
D. the identity of a group of users sharing the same cloud resources
11. What is the benefit of storage availability in the Cloud?
A. Additional storage does not require budget for new large storage devices.
B. Storage in the Cloud has a higher availability than storage devices in the Local Area
Network (LAN).
C. Storage in the Cloud has shorter access times than storage in the LAN.
D. Storage in the Cloud is easier to protect against intrusion.
12. Which question do you not have to ask when moving your local Cloud network to a
hybrid environment?
A. How do I test if my provider has everything under control?
B. How well is my data protected against theft?
C. What happens to my data when I’m not using it?
D. What will my customers notice from the move?
13. What is Abuse of Cloud Services?
A. An intolerable system slowdown leaves all of the legitimate service users confused and
angry as to why the service isn’t responding.
B. Cloud provider may not only host your data and applications, but also malicious software.
C. Moving into the Cloud may make it more difficult for organizations to prove their
compliance to legislation and regulations during external audits.
D. Some of the cloud providers staff or sub-contractor staff may be untrustworthy.
14. Why is a trial period needed when considering to use Software as a Service (SaaS)?
A. to establish the required bandwidth for using the cloud services
B. to evaluate whether the cloud services will be useful
C. to find out whether the vendor will meet the Service level agreement (SLA)
D. to have time to accommodate the local network to use of the new services
15. Why are standards used in Cloud Computing?
A. Standards provide compliance.
B. Standards provide location independence.
C. Standards provide portability.
D. Standards provide security.
16. What is a major limitation in using applications on mobile platforms?
A. lack of applications available for mobile platforms
B. limited memory of mobile phones
C. not all applications are available for all mobile platforms.
D. there is no enterprise applications available for the mobile platforms
17. What is an important limitation of Cloud Computing?
A. automation
B. increased costs
C. privacy
D. shared resources
18. In a cloud environment, consumers become dependent upon providers for products and
services.
What is a term used to describe the difficulties in migrating a software application from one
provider to another?
A. Data conversion plan
B. Loyalty program
C. Marketing strategy
D. Vendor lock-in
19. What is a staffing benefit of Cloud Computing?
A. fewer IT-staff
B. higher recruitment
C. managed services
D. self-service
20. What is a Virtual Private Network (VPN)?
A. a secured connection for remote access to a Local Area Network (LAN)
B. a secured private cloud for a single user
C. a virtual network device for private purposes
D. an operating system for private network systems
21. What is not a valid reason for the customer asking a Cloud provider where their servers
are located?
A. Geographical location may tell something about network latency.
B. The geographical location may tell something about legislation.
C. The number of sites tells you something about disaster recovery possibilities.
D. When a server breaks down, the customer wants to send a technician to fix the problem as
soon as possible.
22. Why is it beneficial to businesses that Cloud computing involves managed services?
A. All services are managed, even when a Cloud provider goes out of business.
B. Cloud services automatically comply with the national and international legislation.
C. The business does not have to worry about the performance of Cloud services.
D. The business’ own IT department can shift the focus away from operational issues.
23. What is information that can be used to uniquely identify, contact, or locate a single
person or can be used with other sources to uniquely identify a single individual?
A. Enterprise Architecture (EA)
B. Personal Identifiable Information (PII)
C. Service Oriented Architecture (SOA)
D. Single sign-on (SSO)
24. What is an important benefit of Cloud Computing?
A. highly protected data
B. independency from the Internet
C. reduced cost
D. small bandwidth
25. What is a risk of providing Cloud based services?
A. data continuity
B. elasticity
C. self-service
D. virtualization
26. What is a correct definition of Cloud Computing?
A. a large pool of usable and accessible virtualized resources
B. a network of globally interconnected client computers
C. a service architecture based on thin clients
D. a service offered by a Service provider, not limited by a Service level agreement (SLA)
27. You are a small business owner who wants to move all of your IT to the Cloud. You are
growing and want dynamic scaling. You expect the desktops of your employees to be
virtualized. You discuss some policy-based services with the Cloud provider.
What type of service model will you be discussing?
A. IaaS
B. PaaS
C. SaaS
D. XaaS
28. What is the purpose of the HIPAA Privacy Rule?
A. to have the Hypervisor protect private data
B. to protect personal financial and accounting information
C. to protect personal health information
D. to protect private information in HTML documents
29. What is an important requirement for applications to be accessible in the Cloud?
A. The application should be compatible with the browser of the user's computer.
B. The application should use the same programming language as the clients.
C. The user should know on which server the application is located.
D. The user's identity should be known by the application.
30. Authentication means asking: “Who are you?” Authorization means asking: “What are
you allowed to do?”
What does the Accounting characteristic from triple-A ask?
A. How much money do you need to pay?
B. What are you going to do?
C. What did you do?
D. What resources will you need?
31. Which process is not covered by ISOIEC 20000?
A. Configuration management
B. People management
C. Service level management
D. Supplier management
32. What is not a mitigating measure against data loss?
A. audits
B. authentication and authorization
C. encryption
D. Storage area network (SAN)
33. What is a big benefit of Cloud based services for a small Internet based business starting
up?
A. the data security and privacy
B. the high Operational Expenditure (OPEX)
C. the service level agreement (SLA)
D. the short implementation time
34. What top threat to Cloud computing refers to components that may not have been
developed for multi-tenant architecture and may cause security issues?
A. Account or Service Traffic Hijacking
B. Denial of Service (DoS)
C. Malicious Insiders
D. Shared Technology Vulnerabilities
35. How does Cloud Computing change the relationship between provider and customer?
A. increased focus on Service level agreements (SLAs)
B. less compliance to standards
C. less focus on SLAs
D. more focus on training
36. What risk is minimized by proper HR vetting procedures?
A. account, service, and traffic hijacking
B. insecure application interfaces
C. malicious insiders
D. shared technology vulnerabilities
37. What can be done to make maximum use of the interoperability principle of Cloud
Computing?
A. Employ multiple system integrators to build your private cloud.
B. Only use cloud providers located in Europe.
C. Use hardware and software of a single vendor.
D. Use standard protocols.
38. What are the main hardware components of a local Cloud environment?
A. Blade server, Local Area Network (LAN), load balancer, storage
B. Virtual desktop, Local Area Network (LAN), load balancer, storage
C. Blade server, virtual desktop, Local Area Network (LAN), load balancer
D. Virtual desktop, blade server, load balancer, storage
39. Why did virtualization boost the emergence of Cloud Computing?
A. A virtual machine is more secure than a physical machine.
B. Virtualization made it easier and cheaper to share resources between users.
C. Virtual machines have greater performance than their physical counterparts.
D. Virtualization leads to better network utilization.
40. Failover is the capacity to switch automatically to another system or resource in the event
of a failure.
Which Cloud property makes failover easier to scale in the Cloud than on physical servers?
A. Internet connection
B. multi-purpose
C. multi-tenancy
D. virtualization
UNIT-II
1. _________ model consists of the particular types of services that you can access on a cloud
computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Answer:a
2. Point out the correct statement :
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
Answer:b
3. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Answer:b
4. Which of the following is deployment model?
a) public
b) private
c) hybrid
d) All of the mentioned
Answer:d
5. Point out the wrong statement :
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
Answer:b
6. Which of the following is best known service model ?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
Answer:d
7. The __________ model originally did not require a cloud to use virtualization to pool
resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
Answer:b
8. _______ model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube
d) All of the mentioned
9. How many types of dimensions exists in Cloud Cube Model?
a) 1
b) 2
c) 3
d) 4
Answer:d
10. Which of the following dimension is related to organization’s boundaries ?
a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned
Answer:a
11) How many types of security boundary values exist in Cloud Cube model?
a) 1
b) 2
c) 3
d) None of the mentioned
Answer:b
12. Point out the correct statement :
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
Answer:a
13. Which of the following is provided by ownership dimension of Cloud Cube Model ?
a) Proprietary
b) Owner
c) P
d) All of the mentioned
Answer:b
14. __________is a measure of whether the operation is inside or outside the security
boundary or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned
Answer:d
15. Point out the wrong statement :
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
Answer:a
16. Which of the following is related to service provided by Cloud ?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
Answer:a
17. ________ dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned
Answer:d
18. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer:b
19. __________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer:c
20. A hybrid cloud combines multiple clouds where those clouds retain their unique
identities, but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
Answer:d
UNIT-III
1. Which of the following is owned by an organization selling cloud services ?
a) Public
b) Private
c) Community
d) Hybrid
Answer:a
2. Point out the wrong statement :
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in which
infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services, development
frameworks, transactions, and control structures
d) All of the mentioned
Answer:c
3. _______ provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:a
4. Which of the following provides development frameworks and control structures ?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:c
5. Point out the wrong statement :
a) A PaaS service adds integration features, middleware, and other orchestration and
choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid Cloud
computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw
d) None of the mentioned
Answer:d
6. _______ is a complete operating environment with applications, management, and the user
interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Answer:b
7. How many types of service model are mainly present in Cloud ?
a) 1
b) 2
c) 3
d) 4
Answer:c
8. The three different service models is together known as the _____ model of cloud
computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
Answer:a
9. CaaS stands for _____________ as service.
a) Compliance
b) Computer
c) Community
d) Communication
Answer:d
10. Which of the following is IaaS service provider?
a) EC2
b) EC1
c) EC10
d) Hybrid
Answer:a
11. The cost of a cloud computing deployment is roughly estimated to be :
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD x (Revenue + CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) All of the mentioned
Answer:c
12. Point out the correct statement :
a) Cloud resource pricing doesn’t always scale linearly based on performance
b) Depending upon the service model type, other resources add additional unit costs
c) Typical efficiency in datacenters are between 10 and 55 percent
d) All of the mentioned
Answer:a
13. The costs associated with resources in the cloud computing model _______ can be
unbundled to a greater extent than the costs associated with Cost DATACENTER.
a) CLOUD
b) Cost CLOUD
c) CCLOUD
d) All of the mentioned
Answer:b
14. Security methods such as private encryption, VLANs and firewalls comes under
__________ subject area.
a) CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue –
(CostDATACENTER/Utilization))SYSTEMn
b) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue –
(CostDATACENTER/Utilization))SYSTEMn
c) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
+(CostDATACENTER/Utilization))SYSTEMn
d) All of the mentioned
Answer:b
15. Point out the wrong statement :
a) Datacenter operates under average loads
b) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
c) Private cloud doesn’t employ the same level of virtualization
d) None of the mentioned
Answer:c
16. For a server with a four-year lifetime, you would therefore need to include an overhead
roughly equal to ___ percent of the system’s acquisition
cost.
a) 10
b) 20
c) 25
d) All of the mentioned
Answer:c
17. The overhead associated with ____ staff is a major cost.
a) Data Center
b) IT
c) Non IT
d) All of the mentioned
Answer:b
18. Moving expenses onto the _____ side of a budget allows an organization to transfer risk
to their cloud computing provider.
a) Dex
b) OpEx
c) Pex
d) All of the mentioned
Answer:b
19. ________ is surely an impediment to established businesses starting new enterprises.
a) Proposition
b) Capitalization
c) Globalization
d) None of the mentioned
Answer:b
20. Cloud computing is also a good option when the cost of infrastructure and management is
______
a) low
b) high
c) moderate
d) None of the mentioned
Answer:b
UNIT-IV
1. Which of the following is most complete cloud computing service model ?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
Answer:d
2. Point out the correct statement :
a) Platforms can be based on specific types of development languages, application
frameworks, or other constructs
b) SaaS is the cloud-based equivalent of shrink-wrapped software
c) Software as a Service (SaaS) may be succinctly described as software that is deployed on a
hosted service
d) All of the mentioned
Answer:d
3. Which of the following aspect of the service is abstracted away ?
a) Data escrow
b) User Interaction
c) Adoption drivers
d) none of the mentioned
Answer:b
4. Which of the following SaaS platform is with an exposed API ?
a) Salesforce.com
b) amazon.com
c) flipkart.com
d) All of the mentioned
Answer:a
5. Point out the wrong statement :
a) SaaS applications come in all shapes and sizes
b) Every computer user is familiar with SaaS systems
c) SaaS software is not customizable
d) None of the mentioned
Answer:d
6. Which of the following is a SaaS characteristic?
a) The typical license is subscription-based or usage-based and is billed on a recurring basis
b) The software is available over the Internet globally through a browser on demand
c) The software and the service are monitored and maintained by the vendor
d) All of the mentioned
Answer:d
7. _________ applications have a much lower barrier to entry than their locally installed
competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
Answer:d
8. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) All of the mentioned
Answer:b
9. Open source software used in a SaaS is called _______ SaaS.
a) closed
b) free
c) open
d) All of the mentioned
Answer:c
10. The componentized nature of SaaS solutions enables many solutions to support a feature
called :
a) workspace
b) workloads
c) mashups
d) All of the mentioned
Answer:c
11. Which of the following can be referred to as productivity software ?
a) DBMS
b) Word processors
c) Presentation software
d) All of the mentioned
Answer:d
12. Point out the correct statement:
a) Management of cloud storage is performed by out-of-band management systems through a
data storage interface
b) Out-of-band refers to a management console that isn’t on the storage network
c) Out-of-band is most often on an Ethernet network inside a browser
d) All of the mentioned
Answer:d
13. Which of the following can be tagged as frequently used secondary category
applications?
a) Personal Information Managers
b) Scheduler
c) HTML editors
d) All of the mentioned
Answer:c
14. Which of the following is characteristic of productivity software ?
a) Standards for data interchange
b) User-centric
c) Static features
d) All of the mentioned
15. Point out the wrong statement:
a) A CDMI container can be exported and then used as a virtual disk by Virtual Machines in
the cloud
b) CDMI and OCCI are meant to interoperate
c) The cloud infrastructure management console can be used to attach exported CDMI
containers to the Virtual Machine that is desired
d) None of the mentioned
Answer:d
16. Which of the following is disadvangtage of online office suite ?
a) Generally lower costs for users
b) Platform independence
c) Reduced maintenance costs
d) An Internet connection is required to access your documents
Answer:d
17. Which of the following benefit is provided by cloud computing office suite ?
a) Easier document sharing
b) More secure
c) No full Control
d) None of the mentioned
Answer:a
18. Which of the following is Adobe’s application suite of cloud-based applications ?
a) Acrobat.com
b) Openoffice
c) Gpdf
d) All of the mentioned
Answer:a
19. Which of the following tool cannot be found at Acrobat.com ?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer:c
20. Which of the following Acrobat word processor offers a capable set of office applications
and makes good use of Adobe Flash animation in its interface ?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer:a
UNIT-V
1) Which of the following systems allow short text messages to be exchanged?
a) SMS
b) IMS
c) JVS
d) All of the mentioned
Answer:a
2. Point out the correct statement:
a) Aggregation also can be done within software creating a custom Web page
b) The Add Stuff link in iGoogle takes you to the content management system
c) When you return to iGoogle, the feed appears within an Ajax frame that can be moved
around on the page or moved to additional tabs that you can create
d) All of the mentioned
Answer:d
3. _____ builds on the older concept of Internet chat to add a more immediate response to
text messages between individuals and groups.
a) VM
b) IM
c) SM
d) None of the mentioned
Answer:b
4. Which of the following can be a form of Instant messaging application ?
a) Discrete instant messaging desktop clients
b) Enterprise messaging services
c) Browser-based IM clients
d) All of the mentioned
Answer:d
5. Point out the wrong statement:
a) Syndicated content appears in iGoogle inside Ajax frames that can be arranged in pages
b) RSS and Atom are prototypes of a class of XML specifications called syndication markup
languages
c) Webmail services are often free, browser-based, and platform-independent
d) None of the mentioned
Answer:d
6. Which of the following feature is provided by Instant messaging ?
a) Rich contact management
b) File transfers
c) E-mail integration
d) All of the mentioned
Answer:d
7. Which of the following is also referred to as Windows Live Messenger native client
contact ?
a) Friends list
b) Buddy list
c) Contact list
d) None of the mentioned
Answer:b
8. Which of the following should be replaced with question mark in the figure shown ?
a) Glide
b) Acrobat
c) Google Docs
d) None of the mentioned
Answer:b
9. Which of the following Webmail service has IM clients embedded in it ?
a) Yahoo Office Communications Server
b) Microsoft Office Communications Server
c) AOL Server
d) All of the mentioned
Answer:b
10. Which of the following feature is provide by standards shown in the following figure ?
a) Scalability
b) Interoperability
c) Reliability
d) None of the mentioned
Answer:b
11. Which of the following is the most commonly used standard for performing
synchronization ?
a) SyncML
b) SMIL
c) SML
d) None of the mentioned
Answer:a
12. Point out the wrong statement:
a) Data synchronization is an important Web service for mobile devices
b) Contact, calendar, and information on devices often need to be synchronized between
multiple systems
c) SyncML is implemented using a SyncML server or alternatively as a SyncML hosted
service
d) None of the mentioned
Answer:d
13. Which of the following data type may be synchronized by SyncML ?
a) Files
b) Memos
c) Tasks
d) All of the mentioned
Answer:d
14. Which of the following services is an example of SMS gateway ?
a) Microsoft Live
b) Direct to SMSC gateway
c) Y-Mail service
d) All of the mentioned
Answer:b
15. Point out the correct statement:
a) The CnML protocol finds support in a number of products from major mobile software and
hardware vendors
b) The desktop-to-mobile sync application Windows Mobile Device Center allows a mobile
client to synchronize to a desktop
C) Desktop ActiveSync is not supported by some third-party mail servers
d) All of the mentioned
Answer:b
16. Which of the following allows you to attach sounds, pictures, icons, and even formatted
text with your message ?
a) EMS
b) SMS
c) MMS
d) All of the mentioned
Answer:a
17. Which of the following uses a combination of WAP and SMS for its transport ?
a) EMS
b) SMS
c) MMS
d) All of the mentioned
Answer:c
18. Which of the following protocol is used for transaction monitoring service based on a
request/response mechanism ?
a) WTP
b) WTLS
c) WDP
d) All of the mentioned
Answer:a
19. Which of following public-key encryption method is used for the same purpose as TLS ?
a) WTP
b) WTLS
c) WDP
d) All of the mentioned
Answer:b
20. Which of the following provides unreliable data transport data formatting ?
a) WTP
b) WTLS
c) WDP
d) WAE
Answer:c
PART-A SOLUTIONS
UNIT - I
UNIT-III
1. What is Service Oriented Architecture?
Service-oriented architecture (SOA) is a style of software design where services are provided
to the other components by application components, through a communication protocol over a
network. The basic principles of service-oriented architecture are independent of vendors,
products and technologies. A service is a discrete unit of functionality that can be accessed
remotely and acted upon and updated independently, such as retrieving a credit card statement
online.
A service has four properties according to one of many definitions of SOA:
1. It logically represents a business activity with a specified outcome.
2. It is self-contained.
3. It is a black box for its consumers.
4. It may consist of other underlying services.
Different services can be used in conjunction to provide the functionality of a large software
application, a principle SOA shares with modular programming. Service-oriented architecture
integrates distributed, separately-maintained and -deployed software components. It is enabled
by technologies and standards that facilitate components' communication and cooperation over
a network, especially over an IP network.
UNIT-IV
1. What is Map-Reduce programming?
Map Reduce is the programming paradigm that allows for massive scalability across hundreds
or thousands of servers in a Hadoop Cluster, i.e. suppose you have a job to run and you write
the Job using the MapReduce framework and then if there are a thousand machines available,
the Job could run potentially in those thousand machines.
The Big Data is not stored traditionally in HDFS. The data gets divided into chunks of small
blocks of data which gets stored in respective data nodes. No complete data’s present in one
centralized location and hence a native client application cannot process the information right
away. So a particular framework is needed with the capability of handling the data that stays
as blocks of data into respective data nodes, and the processing can go there to process that
data and bring back the result. In a nutshell, data is processed in parallel which makes
processing faster.
UNIT-V
1. What is Grid Service Protocol Stack?
To put together the resources needed in a grid platform, a layered grid architecture is shown in
the figure below. The top layer corresponds to user applications to run on the grid system. The
user applications demand collective services including collective computing and
communications. The next layer is formed by the hardware and software resources aggregated
to run the user applications under the collective operations. The connectivity layer provides the
interconnection among drafted resources. This connectivity could be established directly on
physical networks or it could be built with virtual networking technology.
The connectivity must support the grid fabric, including the network links and virtual private
channels. The fabric layer includes all computational resources, storage systems, catalogs,
network resources, sensors, and their network connections. The connectivity layer enables the
exchange of data between fabric layer resources. The five-layer grid architecture is closely
related to the layered Internet protocol stack shown on the right-hand side of figure. The fabric
layer corresponds to the link layer in the Internet stack. The connectivity layer is supported by
the network and transport layers of the Internet stack. The Internet application layer supports
the top three layers.
7. Name any three Packages for Grid Software Support and Middleware?
Open source grid middleware packages
The globus toolkit architecture(GT4)
Containers and resources/data management
The ChinaGrid Support Platform(CGSP)