NPTEL Introduction To Internet Of Things Assignment 8

                     

These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8

Course Name: Introduction To Internet Of Things

Link to Enroll: Click Here


Q1. The process of abstracting physical network hardware and resources from the network services and use cases are known as
a. Network Splitting
b. Network Virtualization
c. Network Scaling
d. None of these

Answer: b. Network Virtualization


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q2. ODIN is one of the proposed solutions towards Software Defined WSN and mobility management. As per the architecture of ODIN, which component of ODIN is placed on top of the controller.
a. ODIN master
b. ODIN agent
c. Both ODIN master and agent
d. Neither ODIN Master and agent

Answer: a. ODIN master


Q3. Shared pool of resources with easy configurability are important aspects of cloud computing.
a. True
b. False

Answer: a. True


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q4. In cloud computing, the users have specific knowledge about the exact physical location of the computing hardware with respect to the cloud services.
a. True
b. False

Answer: b. False


Q5. Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true
a. A: Private Cloud, B: Public Cloud
b. A: Public Cloud, B: Private Cloud
c. A: Public Cloud, B: Public Cloud
d. A: Private Cloud, B: Private Cloud

Answer: a. A: Private Cloud, B: Public Cloud


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q6. Which among the following can be considered as a potential service model for cloud computing.
a. Software as a Service
b. Database as a Service
c. Platfom as a Service
d. All of these

Answer: d. All of these


Q7. Which of the following component can be considered as optional for a sensor node?
a. Sensing unit
b. Transceiver
c. Location finding unit
d. None of the above

Answer: c. Location finding unit


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q8. You have bought a spreadsheet processing software in the form of a CD-ROM which you would need to install yourself on your computer to run and then manage. Is it an example of SaaS in cloud computing?
a. Yes
b. No

Answer: b. No


Q9. Suppose two persons A and B both wish to access a particular SaaS feature from a cloud service provider through their respective personal computers. Both of them log into the cloud at the same time. Then which among the following is true.
a. Neither A nor B will be able to access the services
b. A will be able to access the services but not B
c. B wil be able to access the services but not A.
d. Both A and B will be able to access the services

Answer: d. Both A and B will be able to access the services


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q10. Along with Accounting, which among the following is an essential component of cloud service management.
a. Virtualization
b. Billing
c. Deployment
d. None of these

Answer: b. Billing


Q11. Which among the following security paradigms is concerned with securing the in-transit data between the users and the cloud through the Internet.
a. Network Level Security
b. Host Level Security
c. Application Level Security
d. None of these.

Answer: a. Network Level Security


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q12. “Cloud Security ensures that _____________ users can access their data after proper _____________”
Choose which among the following should be the correct order of words to be filled in the blanks.

a. legitimate, authentication
b. illegitimate, authentication
c. malicious, inaction
d. malicious, attack

Answer: a. legitimate, authentication


Q13. Which among the following should be protected with proper access control in cloud computing
a. Database access
b. Server access
c. Virtual resource access
d. All of these

Answer: d. All of these


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8


Q14. Before launching your cloud services as a product to customers, it is always a good idea to test your cloud applications on a cloud simulator first in the pre-deployment phase.
a. True
b. False

Answer: a. True


Q15. With respect to virtualızation in cloud computing, which among the following can be considered as suitable virtualization paradigms.
a. Storage virtualization
b. Hardware virtualization
c. Application virtualization
d. All of these.

Answer: a. Storage virtualization


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8

More of weeks of Introduction To Internet Of Things: https://progies.in/answers/nptel/introduction-to-internet-of-things

More NPTEL Solutions: https://progies.in/answers/nptel


* The material and content uploaded on this website are for general information and reference purposes only. Please do it by your own first.


These are solutions of NPTEL Introduction To Internet Of Things Assignment 8 Week 8