NPTEL

Introduction to Internet of Things Week 9 Quiz Answer

In this article i am gone to shareย NPTEL Course Introduction to Internet of Things Unit 11 – Week 9 Assignment Quiz Answer with you..

Introduction to Internet of Things Week 9 Quiz Answer

Also visit: Google Cloud Computing Foundations Week 8 Quiz Answer

 

Unit 11 – Week 9 Quiz Answer


Assignment 9

Question 1)
We normally take snapshot in Openstack,
  • it is an inbuilt image in Openstack
  • after the installation of an instanceย 
  • before the installation of an instanceย 
  • it should be downloaded from the internet
Question 2)
Sensor-Cloud deals with
  • Sensor-in-Cloud
  • Sensor-for-Serviceย 
  • Sensor-as-a-Serviceย 
  • None of these
Question 3)
In OpenStack, NOVA is
  • object service
  • image serviceย ย 
  • compute serviceย 
  • used for providing the networking service
Question 4)
In OpenStack, the duration of service usage is monitored by
  • Heat
  • Cinder
  • Ceilometerย 
  • Neutron
Question 5)
The concept of Sensor-Cloud is
  • based on simple storing the sensor data into cloud
  • based on virtualization of sensor
  • based on the accumulating the sensor data from one application region and transmit these data to another region only
  • None of the above options is correct
Question 6)
Among the following actors in sensor-cloud architecture, who is responsible for managing the infrastructure and deals with price?
  • SCSPย 
  • End-usersย 
  • Sensor ownersย 
  • None of the above
Question 7)
In sensor-cloud, who takes decision whether the data should be provided directly to the end user or not?
  • End-user
  • Internal Cacheย 
  • External Cacheย 
  • Sensor-owner
Question 8)
What is a good approach to reduce latency?
  • Analyzing data in cloudย 
  • Increasing number of nodesย 
  • Decreasing number of nodes
  • Analyzing data close to the data sourceย 
Question 9)
Which of the following company coined the term “Fog Computing” ?
  • CISCO
  • Apple
  • Amazon
  • Microsoft
Question 10 )
Resource usage information in service accounting is obtained in the form of
  • Tablesย 
  • Records
  • Data setย 
  • Any form
Question 11)
For which of the following reasons the fog computing should be used?
  • The data rate in a fog device is always very high.
  • For storing a huge amount of data in the fog deviceย 
  • While handling time sensitive data, a millisecond can make a huge differences
  • In the absence of network connectivity with users’ device, the fog device can provide the dataย 
Question 12)
Which of the following is/are the advantages of Fog computing?
  • Data can be stored in local server
  • Reduce the latency during decision makingย ย 
  • Fog nodes can be programmed according to the customer’s requirementsย 
  • All the above
Question 13)
To uninstall the OpenStack, which of the following files is required to be run?
  • unstack.shย 
  • remstack.sh
  • Unistack.shย 
  • uninstallstack.sh
Question 14)
Why data volume is a problem in loT-based cloud computing?
  • because data are encrypted and hard to analyzeย 
  • because data coming from loT devices are always in raw format and difficult to store
  • because the density of IoT devices is increasing each day and in turn the volume of generated data is growing very fast
  • because loT device density is decreasing each day and in turn the volume of generated data are decreasing very fast
Question 15 )
Blue Pill attack on hypervisor is a threat example of:
  • Host security at SaaS level
  • Host security at IaaS level
  • Host security at PaaS level
  • None of the above