Cloud Computing Questions and Answers: Quiz on MCQs, True False, Fill in the Blanks, Matching options in Cloud Computing

This post provides you a myriad collection of questions along with their answers on Cloud Computing quizzes, Multiple Choice Questions (MCQs), True/False with reasoning, Fill in the Blank and Matching the options questions.

Best efforts have been taken to provide answers (where possible) with the Cloud Computing fundamental courses for engineering students.

MCQs in Cloud Computing (25 Qs)

1. What is private cloud?

  • A standard cloud service offered via the Internet
  • A cloud architecture maintained within an enterprise data center
  • A cloud service inaccessible to anyone but the cultural elite

 

  1. Which of the following isn’t an advantage of cloud?
    1. No worries about running out of storage
    2. Easier to maintain a cloud network
    3. Immediate access to computing resources
    4. Paying only for what you use

 

  1. Which of these services is not platform as a service?
    1. Force.com
    2. Microsoft Azure
    3. Amazon EC2
    4. Joyent

 

  1. What feature does not belong in a private cloud?
    1. Metered billing
    2. Self-service portal
    3. Dial-home support
    4. Rapid elasticity

 

  1. Which of the following should a company consider before implementing cloud computing technology?
    1. Employee satisfaction
    2. Potential cost reduction
    3. Information sensitivity
    4. All of these

 

  1. What is cloud computing replacing?
    1. Corporate data centers
    2. Expensive personal computer hardware
    3. Expensive software upgrades
    4. All of above

 

  1. What is the number one concern about cloud computing?
    1. Too expensive
    2. Too many platforms
    3. Security concerns
    4. Payment method for individuals
Related articles suggested by Google

Network Security Quiz Questions – Information Security analysis Questions.

SSL Deployment Models based on Cloudflare

Here are 5 analytical security questions to develop understanding of how various systems in Information and Network Security world work; the broad security areas covered are HTTP Strict Transport Security (HSTS), SSL and deployment, Wireshark and Packet sniffing, Web Server Vulnerabilities, WEP Cracking. Continue reading

Cloud Computing Course (Elective COM XXX.3) (Pokhara University)

Cloud Computing Word Cloud

Course Title :                                       Cloud Computing

Course Code :                                      COM XXX.3

Credit :                                                 3

Class Load :                                         3 hours

Practical+Theory                                 (50+50 = 100) marks

Cloud Computing Course Objective:

The main objective of this course covering the concept of three main domains of Cloud Systems: Cloud Systems, Cloud applications and paradigms, and challenge in cloud.

 

  1. Introduction                              (6 Hrs)

Defining the Cloud, The Emergence of Cloud Computing, Grid Computing or Cloud Computing, Types of Cloud, Cloud Computing Paradigms and Services, Components of Cloud Computing, Ethical issues in Cloud Computing, Cloud Vulnerabilities, and Characteristic of Cloud Computing.

 

  1. Networks in Cloud Computing                              (6 Hrs)

Parallel Computing, Distributed Systems, Network Architecture for Cloud: Data Center Network, Data Center Interconnect Network and Internet, Foundations of Cloud Computing Infrastructures: Virtualization Technology, Automation in Cloud Computing, Network Architecture for Hybrid Deployment, Concept of Autonomic Computing.

 

  1. Roles of Grid Computing and Autonomic Computing in Cloud Computing                                                                                                                                              (6 Hrs)

Grid Computing, Interaction of Models of Grid and Cloud Computing, Distributed Computing in Grid and Cloud, Layered Models and Usages Patterns in Grid and Cloud, Interoperability in Grids and Clouds, Autonomic Computing, System Models of Autonomic Computing, Roles and Importance of Autonomic Computing in Cloud, Autonomic Cloud Computing.

 

  1. Cloud Service Models and Cloud Infrastructure                              ( 9 Hrs)

Jericho Cloud Cube Model, Infrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service, Communication-as-a-Service, Database-as-a-Service, Cloud Computing at Amazon, Amazon Web Services, Cloud Computing from the Google Perspective, Window Azure and Online Services, Open Source Software Platforms for Private Clouds.

 

  1. Cloud Computing Applications and Paradigms                              ( 6 Hrs)

Existing Cloud Application: Processing Pipelines, Batch Processing Systems, Web Applications, Architecture Style for Cloud Applications, Workflow in Cloud Applications, Coordination Models, Hadoop System, Social Computing and Cloud Computing.

 

  1. Cloud Networks                              ( 6 Hrs)

Evolution  from Managed Service Providers (MSP) to Cloud Computing, Single Purpose Architecture to Multi-purpose Architecture, Data Center Virtualization, Cloud Data Center, Service Oriented Architecture (SOA), Combining and SOA, Characteristic of SOA, Open Source Software in Data Centers.

 

  1. Security in Cloud Computing                              ( 6 Hrs)

Cloud Security Challenges, Dimensions of Cloud Security: Security and Privacy, Compliance, and Legal or Contractual Issues, Risk Management, Security Monitoring, Incident Response Planning, Security Architecture Design, Vulnerability Assessment, Data and Application Security, Virtual Machine Security, Handling Disasters management in Cloud.

 

Cloud Computing Practical:

There shall be application lab exercises covering all features of Cloud System

 

References:

  1. Cloud Computing: Principle and Paradigms, Rajkumar Buyya and Willliam Voorsluys, James Broberg, Wiley Publication Inc.
  2. Cloud Computing: Theory and Practice, Dan C. Marinescu, MK Publications.
  3. Cloud Application Architeture, George Reese, O’Reilly Media Inc.
  4. Cloud Computing for Dummies, Judith Hurwitz, Robin Bloor, Marcia Kufman, Wiley Publication Inc.
  5. Handbook of Cloud Computing, Borko Furht, Armando Escalante, Springer, 2010.
  6. Cloud Computing and SOA Convergence in Your Enterprise, a Step by Step Guide, David S. Linthcum, Addison Wesley Publication.

Redesigned course on Cloud Computing for Bachelor’s of Engineering students (Pokhara University)

  1. Introduction to the Cloud Computing
    • Defining the cloud
    • The Emergence of Cloud Computing
    • Possibilities and issues of Cloud Computing
    • Business vs Technology of Cloud Computing (Cloudonomics)

 

  1. Cloud Computing as remote computing
    • Parallel Computing & Distributed Systems
    • Data Center: Network, Interconnection
    • Virtualization Technology
    • Autonomic Computing

 

  1. Cloud Service Models and Cloud Infra
    • Jericho Cloud Cube Model
    • XaaS, X = cloud service
      • SaaS
      • PaaS
      • IaaS
      • CaaS
      • DaaS
    • Cloud Model
      • Private Cloud
      • Hybrid Cloud
      • Public Cloud
      • Government Cloud

 

  1. Cloud Service Provisioning
    • Industry wise Cloud Computing
      • Microsoft Azure (SPI all)
      • RackSpace
      • Amazon Web Services (AWS)
      • Google Cloud Compute
    • Open Source Software Platforms
    • Managed Service Providers (MSP) & challenges

 

  1. Cloud applications and future of Cloud computing
    • Web applications
    • Social and cloud computing
    • Big Data and IoT
    • Cloud Security, Compliance and Standards
    • BPC & DRRM

 

Cloud Computing Course Materials

  1. Regular class discussion – everything presented and talked about
  2. https://collaboration.opengroup.org/jericho/cloud_cube_model_v1.0.pdf
  3. https://www.cloudendure.com/blog/top-6-cloud-computing-books-read-2016/
  4. Service provider’s Home page and documentation (eg: AWS documentation)
  5. OwnCloud – best example of personal cloud

 

 

Ch Name of Chapter No of classes
(2h each)
Weightage Mode of delivery (Supplement to Lecture) Remarks
1 Introduction 3 10 Experience sharing
2 Cloud Computing as remote computing

 

4 20 Paper Presentation
3 Cloud Service Models and Cloud Infra 6 30 80% Hands-on (practical)

Paper Presentation

4 Cloud Service Provisioning 5 20 60% Hands-on (practical)

Group Work

5 Cloud applications and future of Cloud computing 5 20 40% Hands-on (practical)
  Total 23 100

 

Network Security Course Syllabus (COM 732.3 Pokhara University)

Crypto codes in Network Information Security Illustration

Course Title: Network Security

Course Code: COM 732.3 (For Bachelor’s of Engineering)

Credit: 3

Class Load: 3 hours

Evaluation:

Theory Practical Total
Sessional 50 50
Final 50 50
Total 100 100

Course Objective of Network Security:

The course objective is to in part fundamental understanding of every facts of information security, from the basics to advanced cryptography, authentication, secure web, email services and emerging best practices with security standards.

Course Contents:

1. Introduction                                                                                                              [4hrs]

Security, Attacks, Attack Types, Viruses, Worms, Trojan, Horses, Hacker, Techniques, Security Services, Network Security Model, Security Levels, Internet Standard and RFCs

 

2. Conventional Encryption/Secret Key Cryptography                                            [9hrs]

Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (ASE), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES

 

3. Public Key Cryptography and Message Digests                                                   [10hrs]

Hashes, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5, Public Key Cryptography Principles, Public Key Cryptography Algorithms, RAS, Digital Signature Standard (DSS)

 

4. Authentication and Public Key Infrastructure (PKI)                                           [6hrs]

Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Turst Models, Revocation, Realtime Communication Security

 

5. Network  Security                                                                                                     [8hrs]

Email Security, PGP, S/MIME, IPSecurity, Architecture, Authentication Header, Security Association, Key Management, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Electronic Transaction (SET), Network Management Security, Different versions of SNMPs

 

6. System Wide Security                                                                                               [3hrs]

Intruders, Viruses, Firewall, DMZ

 

7. Other Issues                                                                                                               [5hrs]

Legal Issues, Various criminal laws related to information Security, Privacy Issues, Policy, Importance of Policy, Various Policies, Risk Management, Measure Risks, Information Security Processes.

 

References:

  1. Charlie Kaufman, Radia perlman, Mike Speciner, Network Security Private Communication in Public World, Second Edition, 2004, Pearson.
  2. William Stallings, Network Security Essentials-Applications & Standards, Pearson.
  3. Eric Maiwald, Fundamentals of Network Security, 2004, Osborne/McGraw Hill, Dreamtech Press
  4. Matt Bishop, Computer Security, Art and Science, Pearson

What is Cloud? Explaining Cloud Computing in an honest way

Cloud computing illustration

What the hell Cloud Computing?
Ever tried to understand cloud at its best and the simplest possible way? Or some people like getting into cloud computing details, as explaining cloud computing to kids or first timers aka novice users; or as funny as Indian Minister explaining cloud computing in this video. Too often we end up at fuzzy meaning of Cloud Computing & what that really mean. It must be sponsored advertorials and videos explaining cloud computing at their favor and delivering them too complicated, otherwise, too worthless for general people. And this is still happening.

Sometimes, I still get stuck with cloud, is it a hype? Is cloud killing small businesses? Is cloud meant only for big and large enterprise organizations? Maybe I don’t have an honest answer to these questions, I definitely have honest way to explain this big things in IT now – the cloud. So what the hell is cloud computing.

Continue reading

Engineering Professional Practice: Sample Case and a solution

Engineering Professional Practice: Sample Case and a solution

Case: A client came to a designer’s and asked to design a multistoried building. The soil type is found not suitable for that type of structure. The designer hesitated to design a building. The revealed his/her intention as that he/she actually is not going to build that structure but he/she wanted to collect fund from outside sources on behalf of that design and he/she wanted to utilize that money in other business.

Problem: What should a designer do in such situation?


Solution:

Engineering is a profession. A professional is that which is acquired thru a specialized training or education having certain skill those ordinary men does not possess. Because of professional’s knowledge and skill that ordinary people do possess, and because of they use their knowledge and skill for the benefit of men and the society as a whole, professionals do have high recognition in the society. Furthermore, their professional practices are also subjected to public evaluation and hence, a professional’s work cannot be remained as a personal matter. In this background, we have to deal the situation.

A designer is supposed to design a project visiting the site and he/she should look for all the things that are readily apparent on the site that is likely to affect the design. Besides this, a designer is also needed to ascertain the nature and load bearing capacity of the soil underneath ground level. In this case given, it is clearly specified that the type of soil is not suitable for that type of building.

Client’s intention in this regard does not matter for an engineer as a professional designer whether a client is going to build that structure or not. A designer’s main duty is to prepare a design for the project created by a client that is technically feasible to erect on the ground. Non-feasible and non-economical design may lead towards the negligence of a designer or they exhibit the incompetence of the designer. If negligence and incompetence are not the case and if the designer perform such task to fulfill the client’s intention only then the designer is not remained as a professional and his/her behavior becomes unethical and immoral. Professionals committing such unethical/immoral acts are subjected to a disciplinary action if not institutionally (as in the case of Nepal) but by the public and their public image will become very low.

It is also to be noted here that a designer’s duty does not end when he/she has completed his/her design. A designer is under a continuing duty to check that his/her design will work in practice and to correct any errors that emerge during the implementation (construction) of that design. In the case given, as the early stage of starting a design work, it has already been known that the soil type is unsuitable. Thus based on the above discussion as a designer, I will not be involved in designing that structure.

Case Studies of Engineering Professional Practice for Bachelors of Engineering

Case studies based on Codes of Ethics, Tort, Liability and Negligence in Professional Engineering

  1. Er Satyaman Shrestha was working as a Project Engineer in a road construction project in Chitwan. Er Ramesh Thapa, close friend of Satyaman was also working as a site engineer in the same project for a construction company. Construction work was in full swing. Ramesh and Satyaman were tired every day after the work.Almost every day, Ramesh proposes Satyaman for drinks and good foods in the restaurant after work. After few days of work Satyaman noticed that the ratio of cement mortar used in the stone masonry was 1:6 instead of 1:4 as per design. Similarly, there was 1:3:6 ratio of mixture instead of 1:2:4 as per design in the PCC and RCC works. Satyaman complained of this and asked for the reason. Ramesh told to Satyaman that the strength required for the construction is still safe in the mortar of 1:6 and concrete of 1:3:6 and also this is only the means to cover the overheads of entertainments and other financial benefits, Ramesh did this. Continue reading

Faith of an Engineer – a tale of engineering

The oath of an engineer in his profession, this is a master piece of the work.

I am an ENGINEER. In my profession I take deep pride, but without vainglory; to it owe solemn obligations that I am eager to fulfill.


As an Engineer, I will participate in none but honest enterprise. To him that he has engaged my service, as employer or client, I will give the utmost of performance and fidelity. Continue reading

Graphics Project : Bar Diagram [A Project work in Computer Graphics]

This was a Computer Graphics Project named Bar Diagram required in the coursework. [A Project work in Computer Graphics]

#include
#include
#include
#include
#include
#include

/*FUNCTION FOR READING DATA FROM USER*/

void input(float ,float,float,float,float,float);

/*FUNCTION FOR DRAWING BAR DIAGRAM*/

void bar1 (float);
void bar2 (float);
void bar3 (float);
void bar4 (float);
void bar5 (float);
void bar6 (float);

/* MAIN PROGRAM */

void main()
{
int gd=DETECT,gm;
initgraph(&gd,&gm,”c:\\tc\\bgi”);

float sub1,sub2,sub3,sub4,sub5,sub6;
setbkcolor(9);
setcolor(BLUE);
settextstyle(3,0,2);
outtextxy(getmaxx()/2-130,0,”TRIBHUWAN UNIVERSITY”);
settextstyle(3,0,2);
outtextxy(getmaxx()/2-145,30,”INSTITUTE OF ENGINEERING”);
settextstyle(3,0,3);
outtextxy(getmaxx()/2-155,60,”WESTERN REGION CAMPUS”);
settextstyle(3,0,1);
outtextxy(getmaxx()/2-135,92,”LAMACHAUR-16,POKHARA”);
settextstyle(3,0,2);
outtextxy(getmaxy()/2+50,getmaxy()/2,”A”);
settextstyle(3,0,2);
outtextxy(getmaxy()/2+15,260,”PROJECT”);
settextstyle(3,0,2);
outtextxy(getmaxy()/2+40,getmaxy()/2+40,”ON”);
settextstyle(3,0,1);
outtextxy(getmaxy()/2-50,300,”COMPUTER GRAPHICS”);
outtextxy(getmaxx()-600,getmaxy()-140,”BY”);
outtextxy(getmaxx()-600,getmaxy()-110,”Archana Shrestha”);
outtextxy(getmaxx()-600,getmaxy()-80,”402/BEX/062″);

delay(2500);
cleardevice();
settextstyle(7,0,3);
outtextxy(getmaxx()/2-250,getmaxy()/2,”PROGRAM TO DRAW A BAR DIAGRAM”);
delay(1500);
input(sub1,sub2,sub3,sub4,sub5,sub6);
getch();
}
/*END OF MAIN PROGRAM*/

/*FUNCTION FOR READING DATA FROM USER */

void input(float sub1,float sub2 ,float sub3,float sub4,float sub5,float sub6)
{
cleardevice();
cout<“);

setcolor(12);
line(50,50,50,400);
line(50,400,600,400) ;
settextstyle(11,0,1);
outtextxy(70,430,”SUBJECT——->”);
setcolor(YELLOW);
settextstyle(2,0,2);
outtextxy(40,400,”00″);
outtextxy(40,380,”10″);
outtextxy(40,360,”20″);
outtextxy(40,340,”30″);
outtextxy(40,320,”40″);
outtextxy(40,300,”50″);
outtextxy(40,280,”60″);
outtextxy(40,260,”70″);
outtextxy(40,240,”80″);
outtextxy(40,220,”90″);
outtextxy(40,200,”100″);
setcolor(BLUE);
/* FUNCTION CALL TO DRAW BARDIAGRAM */
bar1(sub1);
bar2(sub2);
bar3(sub3);
bar4(sub4);
bar5(sub5);
bar6(sub6);
delay(3000);

cleardevice();
setbkcolor(1);
setcolor(5);

for (int j=0;j{
settextstyle(4,0,6);
setcolor(j);
delay(200);
outtextxy(getmaxx()/2-200,getmaxy()/2,” THANK-YOU “) ;
cout<

for(float i=0;i{
line(485,400-i,555,400-i);
delay(60);
}
}