IT 440 Previous Questions
Name four (4) enabling technologies that are driving IoT growth
-Wireless radios (size, cost, and number) -IPv6 -Battery technology -Solar recharging -Mobile data bandwidth, coverage & speed -Cheap sensors -Cheap processing -Smartphones -Big data analytics -Increase in application development -Increasingly connected culture
For the Model View Controller (MVC) software design pattern for web applications find the best match for each statement. 1. Manages the data and the behavior of the applications. 2. This prepares the interface which is shown to the user. 3. This processes user requests and updates the model when the user manipulates the view 4. This responds to the requests for information about its state and responds to the instructions to change state A: Model B: View C:Controller
1. A 2. B 3. C 4. A
Match the best cloud service model that corresponds to the following examples. 1. Amazon EC2 2. Salesforce 3. Google App Engine 4. Windows Azure VMs Options: A. CaaS B. PaaS C. SaaS D. Naas E. IaaS
1. IaaS 2. SaaS 3. PaaS 4. IaaS
Name two (2) barriers to adoption of IoT
1.Market Fragmentation 2.Slowly evolving standards 3.New ecosystem to manage 4.Lack of Specialized Skills & Expertise 5.Complexity & Required Customization
In Python, what would printed for the following code? >>>s="Hello World!" >>>t="This is sample program." >>>r = s+t >>>len(s)
12
By the year 2020 the projected number of connected (IoT) devices will be?
25-50 Billion
What percent of IoT apps are being developed in the Cloud?
40%
Which for cloud describes the authentication and authorization of users to provide secure access to cloud resources? A. IDAM B. NFV C. SDN D. Openflow
A. IDAM
The computing and storage resources provided by cloud service providers are pooled to serve multiple users using multi-tenancy
A. Resource pooling
Provides APIs for requesting, managing and monitoring cloud resources.
A. Service Management Layer
Which is NOT a type of replication where replication is used to create and maintain multiple copies of the data in the cloud A. Web-based replication B. Array-based replication C. Network-based replication D. Host-based replication
A. Web-based replication
Which of the following storage services has a Blob storage service? A. Windows Azure Storage B. Google Cloud Storage C. Amazon S3 D. None of the above
A. Windows Azure Storage
Relational databases provide the following ACID guarantees
Atomicity, Consistency, Isolation, Durability
The AWS CloudWatch Alarms are used to trigger the ______________ policies
Autoscaling
Includes SaaS applications such as Email, cloud storage application, productivity applications, management portals, customer self-service portals, etc
B. Applications Layer
Hadoop scheduler is a pluggable component that makes it open to support different scheduling algorithms.Select the three schedulers mentioned in chapter 4. A. HDF Sceduler B. Fair Scheduler C. Level Scheduler D. FIFO E. Capacity Scheduler F. Round-robin Scheduler
B. Fair scheduler D. FIFO E. Capacity Scheduler
Cloud computing allows the users (individuals, large organizations, small and medium enterprises and governments) to outsource the IT infrastructure requirements to external cloud providers
B. Outsourced Management
Give a brief definition description of IoT
Internet of things is a conglomerate of all devices that have an IP address and some form of connection to the Internet through which they can relay information
This is generally higher for applications deployed in cloud computing environments since the underlying IT infrastructure is professionally managed by the cloud service.
J. Reliability
The __________ is the service within Hadoop that distributes MapReduce tasks to specific nodes in the cluster, ideally the nodes that have the data, or at least are in the same rack.
JobTracker
What is the missing phrase (it is the same for both) In the Map phase description below; 1. Data is read from a distributed file system and partitioned among a set of computing nodes in the cluster. 2. The data is sent to the nodes as a set of _________. 3. The Map tasks process the input records independently of each other and produce intermediate results as _________. 4. The intermediate results are stored on the local disk of the node running the Map task.
Key-value pairs
SDK stands for _________________?
Software Development Kit
As far as scaling approaches, ____________ scaling involves upgrading the hardware resources (adding additional computing, memory, storage or network resources)
Vertical
Select the items below that were identified by the AFCEA International Cyber Committee as IoT "Hot Button Issues" a. Operational Issues b. Cost of deployment c. Privacy & Security d. Public infrastructure e. Human rights violations f. Identity Management & Ownership of Data g. Digital Divide h. Leadership: Ecosystem Roadmap & Standards
a. Operational Issues c. Privacy & Security f. Identity Management & Ownership of Data g. Digital Divide h. Leadership: Ecosystem Roadmap & Standards
Complete with the name of the load balancing algorithm that matches the definition: [a] Assign request in turn to each node. [b] Assign each request to the node with the fastest response time
a: Round robin b: Low latency
Complete the name of the following compute services mentioned in chapter 3. Google Compute [a] Windows [b] VMs [c] EC2
a: engine b: Azure c: Amazon
___________ is a mapping data type or a kind of hash table that maps keys to values. Keys in this can be of any data type, though numbers and strings are commonly used for keys. Values in this can be any data type or object.
dictionary
Apache ______ is an open source framework for distributed batch processing of big data.
hadoop
_____ Cloud is the name of the cloud deployment model that combines multiple clouds (public and private) that remain unique but bound
hybrid
In MapReduce, the Map function emits ______________ pairs.
key value
Unlike relational databases, _____________ databases do not provide ACID guarantees
non-relational or non-sql
A _____________ is a sequence data type that is similar to the list. They consists of a number of values separated by commas and enclosed within parentheses. Unlike lists, the elements of these cannot be changed, so they can be thought of as read-only lists.
tuple
_______ is the key enabling technology of cloud computing that allow pooling of resources
virtualization or VMs
Cloud resources can be rapidly scaled up or down based on demand
F. Rapid elasticity
Partitions the physical hardware resources into multiple virtual resources that enabling pooling of resources
F. Virtualization Layer
__________ is the default scheduler for Hadoop that maintains a work queue in which jobs are queued and there is no concept of priority or size of the job
FIFO
T/F CCM components have the following characteristics: tightly coupled, synchronous communication, and stateful design
False
T/F Google App Engine is the Infrastructure-as-a-service (IaaS) from Google, which includes both storage and the compute engine
False
T/F Windows Azure Notification Hubs is a pull notification service from Microsoft
False
This approach of the cloud allows multiple users to make use of the same shared resources.
G. Multi-tenancy
What is Boto?
Boto is a Python package that provides interfaces to Amazon Web Services (AWS)
Select all that apply. The goals mention in chapter two of load balancing techniques include: A. Minimizing redirections B. Achieve maximum replication of data C. Minimizing the response times D. Achieve maximum utilization of resources E. Maximizing throughput
C, D, & E
This is improved for applications since the resources available to the applications can be scaled up or down based on the dynamic application workloads
C. Performance
Builds upon the IaaS layers below and provides standardized stacks of services such as database service, queuing service, application frameworks and run-time environments, messaging services, monitoring services, analytics services, etc
C. Platform and Middleware Layer
____ or hosted hypervisors run on top of a conventional (main/host) operating system and monitor the guest operating systems A. Type-0 B. Type-1 C. Type-2 D. Hypertext
C. Type-2
Which of the following best matches the following definition. It is effectively an operating system for Hadoop that supports different processing engines on a Hadoop cluster such as MapReduce for batch processing, Apache Tez for interactive queries, Apache Storm for stream processing, etc. A. HDFS B. TaskTracker C. YARN D. Flume
C. YARN
A ________________ consists of a global network of edge locations used to deliver media. It is used to speed up the delivery of static content such as images and videos
CDN: Content Delivery Network
When discussing the design methodology for PaaS service model, in what design step do the developers have to take into consideration the platform specific features.
Component design
A Cloud Component Model (CCM) is an application design methodology that provides a flexible way of creating cloud applications in a rapid, convenient and platform independent manner. The CCM approach for application design involves what three "types" of design?
Component design Architecture design Deployment design
A _______________ (i.e. CDN) is a distributed system of servers located across multiple geographic locations to serve content to end-users with high availability and high performance. They are useful for serving static content such as text, images, scripts, etc., and streaming media.
Content Delivery Network
Includes physical compute, network and storage hardware
D. Hardware Layer
Cloud computing resources are provided to users on a pay-per-use model
D. Measured service
This enables cloud computing resources to be provisioned by the users, without requiring interactions with the cloud service provider. The process of provisioning resources is automated
H. On-demand self-service
Cloud computing resources can be accessed over the network using standard access mechanisms that provide platform-independent access through the use of heterogeneous client platforms such as workstations, laptops, tablets and smartphones
I. Broad network access
The _____ cloud service model has resources provided to the users as virtual machine instances and virtual storage. Users can start, stop, configure and manage the virtual machine instances and virtual storage.
IaaS
When discussing design methodology for IaaS service models, three design areas are mentioned, component design, architecture design, and ______________ design where we map the application components to specific cloud resources (such as web servers, application servers, database servers, etc.)
Deployment
What is Django?
Django is a free and open source web application framework, written in Python, that helps to develop websites faster and easier
Which of the following is NOT considered part of the Hadoop ecosystem A. Pig B. MapReduce C. YARN D. HDFS E. ALL of the above are part of the Hadoop ecosystem
E. ALL of the above are part of the Hadoop ecosystem
Includes the physical infrastructure such as datacenter facilities, electrical and mechanical equipment, etc.
E. Infrastructure and Facilities Layer
This is a benefit for applications as only as much computing and storage resources as required can be provisioned dynamically, and upfront investment in purchase of computing assets to cover worst case requirements is avoid
E. Reduced costs
Select the answer that is NOT one of the persistence approaches for load balancing A. URL re-writing B. Sticky sessions C. Session Database D. Browser cookies E. Session capture
E. Session capture
List at least four of the Python benefits (4-of-6) presented in class.
Easy to learn, read, and maintain Object and Procedure Oriented Extendable Scalable Portable Broad Library Support
What organization developed the following definition of cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
NIST: the US National Institute of Standards and Technology
_______________ (i.e. NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage
Network Function Virtualization
What type of database service does Amazon DynamoDB provide?
Non-Relational (No-SQL)
_____ is the cloud service model that the users, themselves, are responsible for developing, deploying, configuring and managing applications on the cloud infrastructure
PaaS
According to Gartners 2018 Hype Cycle for Emerging Technologies, in what phase is the "Internet of Things"?
Peak of Inflated Expectations
________________ is a set of architectural principles by which you can design web services and web APIs that focus on a system's resources and how resource states are addressed and transferred.
REST: Representational State Transfer
________________ is a well established architectural approach for designing and developing applications in the form of services that can be shared and reused
SOA: service oriented architecture
In the ______ cloud service model the cloud service provider manages the underlying cloud infrastructure including servers, network, operating systems, storage and application software, and the user is unaware of the underlying architecture of the cloud.
SaaS
Name four (4-of-6) design considerations identified for cloud applications
Scalability Reliability Availability Security Maintenance/Upgradation Performance
T/F Google Compute Engine is a compute service provided by Google
True
T/F Python is an interpreted language and does not require an explicit compilation step
True
T/F Python provides an interactive mode in which the user can submit commands at the Python prompt and interact with the interpreter directly
True
T/F Python supports more than one programming paradigms including object-oriented programming and structured programming
True
T/F SDN Architecture decouples the control and data planes and the network controller is centralized
True
T/F Security certificates and Key-pairs are used to securely connect to an instance after it launches
True
T/F TaskTracker accepts Map, Reduce and Shuffle tasks from the JobTracker.
True