Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

captive requires that the cloud accommodate multiple compliance regimes.

A. licensed
B. policy-based
C. variable
D. all of the mentioned
Answer» C. variable
2.

Which of the following services that need to be negotiated in Service Level Agreements?

A. logging
B. auditing
C. regulatory compliance
D. all of the mentioned
Answer» E.
3.

Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A. scalability
B. portability and interoperability
C. flexibility
D. none of the mentioned
Answer» C. flexibility
4.

Which of the following is considered an essential element in cloud computing by CSA?

A. multi-tenancy
B. identity and access management
C. virtualization
D. all of the mentioned
Answer» B. identity and access management
5.

Amazon Web Services supports Type II Audits.

A. sas70
B. sas20
C. sas702
D. none of the mentioned
Answer» B. sas20
6.

The percentage of time the system is up and running smoothly is referred as .

A. system up time
B. system scalability
C. system availability
D. system efficiency
Answer» D. system efficiency
7.

[ =n/Ttotal=n [kTo+Te(n,m)] The above equa on calculates the value of which of the following?

A. scalability
B. throughput
C. availability
D. effectiveness
Answer» C. availability
8.

Cloud are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» C. sals
9.

. as a utility is a dream that dates from the beginning of the computing industry itself

A. model
B. computing
C. software
D. all of the mentioned
Answer» C. software
10.

Which of the following is the highest degree of integration in cloud computing?

A. saas
B. iaas
C. paas
D. all of the mentioned
Answer» B. iaas
11.

The degree to which actors are directly linked to one another through cohesive bonds is called as .

A. closeness
B. cohesion
C. centralized
D. path length
Answer» C. centralized
12.

The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A. node degree
B. path length
C. social circle
D. bridge
Answer» B. path length
13.

Which of the following was developed an alternative to XML syndication by IETF?

A. atom publishing protocol
B. atom subscribing protocol
C. atom subscribe protocol
D. none of the mentioned
Answer» B. atom subscribing protocol
14.

Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A. cas
B. csa
C. sac
D. all of the mentioned
Answer» B. csa
15.

Which of the following operating system support operating system virtualization ?

A. windows nt
B. sun solaris
C. windows xp
D. compliance
Answer» C. windows xp
16.

Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2?

A. cloudwatch
B. amazon elastic block store
C. aws import/export
D. all of the mentioned
Answer» C. aws import/export
17.

Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A. cloudwatch
B. amazon elastic block store
C. aws import/export
D. all of the mentioned
Answer» C. aws import/export
18.

Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request iii) VM in operation iv) VM Provision

A. ii, i, iii, iv
B. i, ii, iii & iv
C. ii, iii, iv & i
D. ii, iv, iii & i
Answer» E.
19.

Which of the following service provider provides the least amount of built in security?

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» D. all of the mentioned
20.

has many of the characteristics of what is now being called cloud computing

A. internet
B. softwares
C. web service
D. all of the mentioned
Answer» B. softwares
21.

Which of the following instance class is best used for applications that are processor or compute-intensive?

A. standard instances
B. high memory instances
C. high cpu instances
D. none of the mentioned
Answer» D. none of the mentioned
22.

Amazon Relational Database Service is a variant of the 5.1 database system.

A. oracle
B. mysql
C. sql server
D. all of the mentioned
Answer» C. sql server
23.

Which of the following provides access for developers to charge Amazon s customers for their purchases?

A. fws
B. fas
C. fps
D. all of the mentioned
Answer» D. all of the mentioned
24.

Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?

A. storage
B. network
C. software
D. none of the mentioned
Answer» B. network
25.

Which of the following type of virtualization is found in hypervisor such as Microsoft s Hyper-V ?

A. paravirtualization
B. full virtualization
C. emulation
D. none of the mentioned
Answer» B. full virtualization
26.

Which of the following can manage data from CIFS and NFS file systems over HTTP networks?

A. storagegrid
B. datagrid
C. diskgrid
D. all of the mentioned
Answer» B. datagrid
27.

Which of the following backup create a cloned copy of your current data or drive ?

A. continuous data protection
B. open file backup
C. reverse delta backup
D. none of the mentioned
Answer» B. open file backup
28.

In para-virtualization, VMs run on hypervisor that interacts with the hardware.

A. true
B. false
Answer» C.
29.

An operating system running on a Type VM is full virtualization.

A. 1
B. 2
C. 3
D. all of the mentioned
Answer» B. 2
30.

Amazon cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB.

A. s1
B. s2
C. s3
D. s4
Answer» D. s4
31.

Full virtualization Full virtualization

A. Simulates hardware within software
B. Has VMs with the same OS
C. Clones images
D. Alters the guest OS
Answer» B. Has VMs with the same OS
32.

virtualization abstracts networking hardware and software into a virtual network that can be managed.

A. storage
B. network
C. software
D. none of the mentioned
Answer» C. software
33.

Virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made

A. true
B. false
Answer» B. false
34.

Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

A. real
B. virtual
C. cloud
D. none of the mentioned
Answer» C. cloud
35.

where a VM can be moved from one physical machine to another even as it continues to execute.

A. load balancing
B. migration
C. live migration
D. server consolidation
Answer» D. server consolidation
36.

Which of the following is most important feature of cloud storage listed below ?

A. logon authentication
B. bare file
C. multiplatform support
D. adequate bandwidth
Answer» B. bare file
37.

Which of the following type of virtualization is also characteristic of cloud computing?

A. storage
B. application
C. cpu
D. all of the mentioned
Answer» E.
38.

Vehicle mount solutions Handheld solutions Hands-free and voice solutions

A. mobile enterprise
B. wireless wide area network (wwan)
C. typical mobile devices used in warehouses
D. interactive voice response (ivr)
Answer» D. interactive voice response (ivr)
39.

Which of the following type of virtualization is also characteristic of cloud computing

A. storage
B. application
C. cpu
D. all of the mentioned
Answer» E.
40.

A virtual machine running on a server of a particular make cannot be relocated to b the server of another make.

A. True
B. false
Answer» C.
41.

Which of the following is used for Web performance management and load testing?

A. vmware hyperic
B. webmetrics
C. univa ud
D. tapinsystems
Answer» C. univa ud
42.

Which of the following tool is used for measuring I/O of your systems to estimate these transaction costs?

A. ebs
B. iostat
C. esw
D. all of the mentioned
Answer» C. esw
43.

Arrange the stages in supply chain management:i. Material and Equipment Suppliesii. Delivery of Productsiii. After Sale Service and Returnsiv. Planning and Coordinationv. Manufacturing and Testing

A. iv, v, i, ii, iii
B. iv, i, v, iii, ii
C. iv, i, v, ii, iii
D. i, ii, iv, v, ii
Answer» D. i, ii, iv, v, ii
44.

Dynamic content presented in Google crawling isn t normally indexed.

A. ajax
B. java
C. javascript
D. all of the mentioned
Answer» B. java
45.

Publishing messages is handled through Class.

A. client()
B. server()
C. publish()
D. batch()
Answer» B. server()
46.

Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?

A. on-demand instance
B. reserved instances
C. spot instance
D. all of the mentioned
Answer» D. all of the mentioned
47.

Annotation which allows the Jaxb2Marshaller marshaller to detect a class s (i.e., object s) fields.

A. @xmlrootelement
B. @xmlroot
C. @notnull
D. none of the mentioned
Answer» B. @xmlroot
48.

Which of the following has infrastructure security managed and owned by the vendor?

A. hybrid
B. private/community
C. public
D. none of the mentioned
Answer» C. public
49.

In a scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.

A. paravirtualization
B. full virtualization
C. emulation
D. none of the mentioned
Answer» C. emulation
50.

is used by Amazon Web Services to store copies of a virtual machine.

A. ami
B. emi
C. imi
D. application services
Answer» B. emi