NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to Internet of Things
Assignment- Week 9
TYPE OF QUESTION: MCQ
Number of questions: 15 Total mark: 15 X 1 = 15
______________________________________________________________________________
QUESTION 1:
We normally take snapshot in Openstack, _______.
a. after the installation of an instance
b. before the installation of an instance
c. it is an inbuilt image in Openstack
d. it should be downloaded from the internet
Correct Answer: a
Detailed Solution:
As a snapshot saves a system state, similar to data backup, it can be taken only after the
installation of an instance.
______________________________________________________________________________
QUESTION 2:
Sensor-Cloud deals with
a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these
Correct Answer: b
Detailed Solution:
evident from lecture 42, title slide (slide-1)
______________________________________________________________________________
QUESTION 3:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
In OpenStack, NOVA is
a. image service
b. object service
c. compute service
d. used for providing the networking service
Correct Answer: c
Detailed Solution:
See lecture on Cloud Computing – Practical, Slide no 6
______________________________________________________________________________
QUESTION 4:
In OpenStack, the duration of service usage is monitored by
a. Cinder
b. Ceilometer
c. Heat
d. Neutron
Correct Answer: b
Detailed Solution:
See lecture on Cloud Computing – Practical, Slide no 8
______________________________________________________________________________
QUESTION 5:
The concept of Sensor-Cloud is
a. based on simple storing the sensor data into cloud
b. based on the accumulating the sensor data from one application region and transmit
these data to another region only
c. based on virtualization of sensor
d. None of the above options is correct
Correct Answer: c
Detailed Solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
See lecture on Sensor-Cloud Part I, Slide no. 10
____________________________________________________________________________
QUESTION 6:
Among the following actors in sensor-cloud architecture, who is responsible for managing the
infrastructure and deals with price?
a. End-users
b. Sensor owners
c. SCSP
d. None of the above
e.
Correct Answer: c
Detailed Solution:
See the research paper on sensor-cloud-
S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm
Shift From Wireless Sensor Network," in IEEE Systems Journal, vol.PP, no.99, pp.1-10
_____________________________________________________________________________
QUESTION 7:
In sensor-cloud, who takes decision whether the data should be provided directly to the end
user or not?
a. Internal Cache
b. External Cache
c. End-user
d. Sensor-owner
Correct Answer: a
Detailed Solution:
See lecture on Sensor-cloud Part II, Slide no. 13
______________________________________________________________________________
QUESTION 8:
What is a good approach to reduce latency?
a. Analyzing data close to the data source
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes
Correct Answer: a
Detailed Solution:
see lec-44, slide 14
______________________________________________________________________________
QUESTION 9:
Which of the following company coined the term “Fog Computing” ?
a. Apple
b. Amazon
c. CISCO
d. Microsoft
Correct Answer: c
Detailed Solution:
See lecture on Fog Computing Part I, Slide no. 2
____________________________________________________________________________
QUESTION 10:
Resource usage information in service accounting is obtained in the form of
a. Data set
b. Tables
c. Records
d. Any form
Correct Answer: c
Detailed Solution:
recall from week 8, lec 39, slide 5
______________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 11:
For which of the following reasons the fog computing should be used?
a. For storing a huge amount of data in the fog device
b. While handling time sensitive data, a millisecond can make a huge difference
c. In the absence of network connectivity with users’ device, the fog device can provide
the data
d. The data rate in a fog device is always very high.
Correct Answer: b
Detailed Solution:
See lecture on Fog Computing Part I, Slide no. 2
____________________________________________________________________________
QUESTION 12:
Which of the following is/are the advantages of Fog computing?
a. Reduce the latency during decision making
b. Data can be stored in local server
c. Fog nodes can be programmed according to the customer’s requirements
d. All the above
Correct Answer: d
Detailed Solution:
See lecture on Fog Computing Part II, Slide no. 14
______________________________________________________________________________
QUESTION 13:
To uninstall the OpenStack, which of the following files is required to be run?
a. Unistack.sh
b. unstack.sh
c. remstack.sh
d. uninstallstack.sh
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Correct Answer: b
Detailed Solution:
See lecture on Cloud Computing – Practical, Slide no 10
______________________________________________________________________________
QUESTION 14:
Why data volume is a problem in IoT-based cloud computing?
a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume of
generated data is growing very fast
d. because IoT device density is decreasing each day and in turn the volume of generated
data are decreasing very fast
Correct Answer: c
Detailed Solution:
see lec-44, slides 4,5,6
_______________________________________________________________________
QUESTION 15:
Blue Pill attack on hypervisor is a threat example of:
a. Host security at PaaS level
b. Host security at SaaS level
c. Host security at IaaS level
d. None of the above
Correct Answer: c
Detailed Solution:
recall from week-8, lec-39, slide 16
_________________________________________________________________________
*******END*******