puzzles - GC new

advertisement

1.

Assignment No : 1

History of grid computing

UNIT-I

2.

QUIZ

1.

What is the act of sharing task over multiple computers called?

Ans> Grid computing

2.

What is the interface layer used in OGSA?

Ans> OGSI

3.

Name few technologies used in grid.

Ans> globus , Network weather service, Netsolve , Iway.

4.

What is the pc based distributed computing called?

Ans> desktop grid.

5.

The communication protocol used between pc and central server is called

Ans> HTTP.

6.

When a PC of a organization is made to participate in Desktop grid then it is called

Ans> required participation

7.

The term grid can be interchangeably used with Desktop grids.

Ans> true

8.

What is reffered to as virtual super computer called?

Ans> desktop grid.

3.

Review of web services (Mind mapping)

4.

Crossword puzzles

5.

Match the following

parallel service distributed different system grid task assign ogsa ogsi

specification

sharing

6.

Word scrumble

o r g a n i z a t i o n o t i r z z u o a g r i a u r t o t o r p z r v a d l o l t l i s r h a r l a g p s g t t r a r d i u i r a g e e s u d d e t u b i r t s i d l r e r g n s d a d i r a i t i a e i o t l u l t a d v a h e z l r l r a e r u i i s i p a a e v o d b g l i d v i o a l

ANS grid shared parallel distributed, virtual organization

7.

Doubble puzzle : WSRF

ANS:

WS-Resource Properties

WS-Resource Lifetime

WS-Base Faults

WS-Service Group component specification for WS-Resource

8.

Letter Tiles : WSRF

ANS:

a family of OASIS-published specifications for web services

UNIT-II

9.

Find me out: GMA

Grid Monitoring Architecture (GMA) of the GGF

Ask for data

Registry

(Directory services) data data address of producer

ANS:

Grid Monitoring Architecture (GMA) of the GGF

Producer register producer data data

Consumer

Ask for data

Registry

(Directory services) address of producer locate producer

10.

WORD SCRAMMBLE

N V R I E E E T T D O Y R

F A O O I I D M I T C N

ANS:EVENT DIRECTOR Y

ANS:MODIFICATION

M T T A E S P I M ANS:TIMESTAMP

I H E E E T T W W A R R R S C O K V N K E ANS:NETWORK WEATHER SERVICE

C L T I E N ANS:CLIENT

11.

Overview of grid computing(Chart work) using mind mapping

11. MCQ:

1.Mandatory type of consumer

(A)job monitoring (B)realtime (C)overview (D)Optional consumer

2.which one is the mandatory component of grid?

(A)producer (b)consumer (c)directoryservice (d)monitor

3.GSH used for

(A)updation (B)deletion (c)search (d)modification

4.GSR used for

(A)deletion (B)abstraction (c)add (d)delete

(C)FIND ME:

E A

H E

C

A

Z

L

C

I

I

P

W

O

C

Z

A

S

E

I

S

Y

Q M G D

S G O K

C

E

M Q G R

S D E Q

I

J

D

U

C

X

H

Q

O

C

A

M

D

P

S

F

G

V

U

E

O

N

M

T

K

R

N

V

E

Z

N

F

P

R U

G L

N G B

W I K

R

Y

S

U

D

A

T M H S

G A

E T

M

L

R

O

F

Q

G

T

S

G

L

O

E

M

E

R

T

A

A

M

O

Z

C

D

UNIT-III

12.

Grid security (Video)

13.

Resource management working principle of scheduling (Role play)

14.

Review of condor (Chart work) using mind mapping

15.

Grid scheduling with QOS (Assignment)

UNIT-IV

16.

Data management( MCQ)

1.

“Data Management" was more important than _________

(a)System management (b) Power management (c) security management

2. Which are not the categories of structured data?

(a) Primary data (b) Public data (c) Private data

3. Data that resides in a fixed field within a _________is called structured data.

(a) Record (b) file (c) both a & b

4. Structured data has the advantage of being__________

(a) Deleted (b) stored (c) update

ANS

:

1. B 2. B 3. C 4. B

17.

Ans:

A flexible software platform gives Collective Data the ability to configure solutions to meet the unique tracking requirements of a variety of fleets.

17.

Grid portals : Group discussion

UNIT-V

18.

Middleware: Seminar

19.

Case studies

20.

Applications : Seminar

21.

GT3 : Puzzles & MCQ

ANS:

a set of primitives that fully implement the interfaces and behaviors defined in the latest version of the OGSI Specification

ANS :

Notification Source Provider

Handle Resolver Provider

Service Group Provider

Factory Provider

Operations of GT3

ANS: 1

. Transport

1.

Hosting

2.

Interface

3.

implementation

ANS:

Multiple Choice Questions

1.

Virtual Hosting allows grid services to be _________ across several remote containers

a)Cetralized b)de-centralized c)distributed

2.

GRAM Architecture rendered in _______ a)OGSI b)OGSA c)SOAP

3.

Which one is not the layers of web service_________ a) OGSI b)SOAP c)EJB

4.

Find the missing circle___________

Registry client

ANS 1. C 2. B 3.C 4. Router HE starter

Service

1. The idea of _________computing originated with Ian Foster, Carl Kesselman and

Steve Tuecke. a. grid. b. cluster. c. peer to peer. d. internet.

Answer: A

2. ____________is the act of sharing tasks over multiple computers. a. Cluster computing b. Grid computing. c. peer to peer computing. d. internet computing.

Answer: B

3. A _________ will use a grid to control a piece of equipment, such as a telescope. a. data grid. b. equipment grid. c. avaki grid. d. desktop grid.

Answer: B

4. In case of ________, the resource allocation is performed by a centralized resource manager and all nodes cooperatively work together as a single unified resource. a. data. b. node. c. clusters. d. distributed.

Answer: C

5. A grid deployment must achieve high level of __________________ to accommodate the unique need for federated control. a. management. b. service level. c. replicas. d. trust.

Answer: D

6. A robust ______________ model should have identity, privacy, authority and policy. a. management. b. service level. c. replicas. d. trust.

Answer: D

Core-Grid Computing-255 B

2

7. The mechanism of asserting and assuring is associated with ____________. a. identity. b. privacy. c. authority. d. policy.

Answer: A

8. The firm need tools for issuing _________ to the users. a. identity. b. privacy.

c. authority. d. policy

Answer: A

9. _____________ is the first step in a robust trust model. a. Authentication. b. Privacy. c. Authority. d. Policy

Answer: A

10. Requirements for access controls include granularity, federation and ___________. a. Authentication. b. Privacy. c. Authority. d. Policy

Answer: D

11. ____________ refers to the ability to specify and enforce access controls on arbitrary small discrete units of computational work. a. Authentication. b. Granularity. c. Authority. d. Policy

Answer: B

12. The model of shared responsibility for the access control regimen is __________ model of access control. a. authentication. b. granularity. c. authority. d. federated.

Answer: D

13. ___________ is used to represent the mechanism for specifying the mapping of access to subsets of the user base. a. Authentication. b. Privacy. c. Authority. d. Policy.

Answer: D

Core-Grid Computing-255 B

3

14. The ____________ report show the degree to which a resource or group of resources are approaching their capacity. a. understanding. b. utilization. c. organization. d. job.

Answer: B

15. A resource usage report should contain the following for each grid resource sorted by_________. a. request processed. b. request succeeded. c. resource id.

d. request id.

Answer: C

16. A __________________ report will identify each job run during a specified time period and the other job details. a. understanding. b. utilization. c. organization. d. job.

Answer: D

17. The ______________ mechanism must be able to sort and filter the data in order to function as a useful management tool. a. understanding. b. utilization. c. reporting. d. job.

Answer: C

18. _____________ should be available based on the type of event. a. understanding. b. utilization. c. reporting. d. filtering.

Answer: D

19. ______________ are by nature complex deployments of various hardware and software components. a. computing grid. b. equipment grid. c. avaki grid. d. desktop grid.

Answer: A

20. _________ can be categorized as minor, moderate, serious or urgent. a. task. b. job. c. event. d. node.

Core-Grid Computing-255 B

5 a. administrative user b. average user. c. new user. d. naïve user.

Answer: B

29. For the ___________ the portal provides a coherent application environment that uniformly enforces access controls and ensures consistent logging. a. administrative user. b. average user. c. new user. d. naïve user.

Answer: A

30. The person administering _______ function must be able to specify the circumstances under which to initiate the replication.

a. replication. b. data catalog. c. meta catalog. d. meta data.

Answer: A

31. _____________ are PC based distributed computing . a. desktop grids. b. grid computing. c. parallel computing. d. server computing.

Answer: A

32. _________ with all the internet based grids rely on enrolled PC’s initiate communication. a. communication and data security. b. resource availability. c. resource management. d. machine heterogeneity.

Answer: C

33. In Communication and data security ___________ is the communication protocol between the PC and the central server. a. FTP. b. GTP. c. HTTP. d. GRAM.

Answer: C

34. In ___________, HTTP is the communication protocol between the PC and the central server. a. communication and data security. b. resource availability. c. resource management. d. machine heterogeneity.

Answer: A

Core-Grid Computing-255 B

6

35. _________________ is a wide variety of machines that are enrolled in Desktop grids. a. communication and data security. b. resource availability. c. resource Management. d. machine heterogeneity .

Answer: D

36. ______________ cause the paradigm of voluntary participation in desktop grids. a. communication and data security. b. resource availability. c. resource Management. d. machine heterogeneity .

Answer: B

37. When a PC of a organization is made to participate in Desktop grid then it is called

__________ a. communication. b. machine heterogeneity.

c. required participation. d. connectivity.

Answer: C

38. Using a shared data warehouse ________________ can eliminate redundant copied of data. a. desktop grids. b. grid computing. c. parallel computing. d. server computing.

Answer: A

39. The term grid can be interchangeably used with Desktop grids. a. true. b. false. c. may be true. d. may be false.

Answer: A

40. _____________ is a central machine that controls and administers the Desktop grid. a. grid. b. grid Server. c. grid Client. d. work Unit.

Answer: B

41. An individual node that is a member of a Desktop grid is called ___________. a. grid. b. grid server. c. grid client. d. work unit.

Answer: B

42. A software that manages all the interaction between the grid client and the grid server is called ______________.

Core-Grid Computing-255 B

7 a. grid client executive. b. grid server. c. grid client. d. work unit.

Answer: A

43. ____________ is a packet of computation assigned to a grid client by the grid server. a. grid. b. grid Server. c. grid Client. d. work Unit.

Answer: D

44. A __________ is sometimes referred to as virtual super computer. a. desktop grid. b. grid server. c. grid client. d. work unit.

Answer: A

45. ____________ creates an opportunity to tap into the essentially free computing

resource represented by the underutilized. a. desktop Grid. b. grid Server. c. grid Client. d. work Unit.

Answer: A

46. ___________ is an example of PC-based distributed computing. a. home based PC’s. b. mini computer. c. micro computer. d. mainframe.

Answer: A

47. ___________ protocol helps in communication between PCs and the central server. a. FTP. b. gopher. c. HTTP. d. SMTP.

Answer: C

48. Software that manages all interaction between the grid client and server is__________. a. work unit. b. grid. c. grid server. d. grid client executive.

Answer: D

49. The other name for desktop grid is ___________. a. super computer. b. virtual super computer.

Core-Grid Computing-255 B

8 c. desktop. d. mainframe.

Answer: B

50. Mission critical computations are supported by ________________ network. a. concurrent. b. tightly coupled. c. loosely coupled. d. parallel.

Answer: C

51. Completing computational jobs with minimal failures is termed as ______________. a. robustness. b. consistency. c. concurrency. d. reliability.

Answer: A

52. ______________capability in desktop grids allows control of grid resources. a. scalability. b. integrity. c. robustness. d. central manageability.

Answer: D

53. No recompilation and relinking process in grid computing is called _____________. a. unobtrusiveness. b. scalability. c. manageability. d. binary level integration.

Answer: D

54. Automated monitoring of all resources is the functionality of ____________. a. scalability. b. security. c. central manageability. d. integration.

Answer: C

55. __________ type of applications process large input datasets in a sequential fashion with no application dependencies among records of dataset. a. data serial. b. data parallel. c. data canonical. d. synchronized data.

Answer: B

56. _______________ applications use an iterative approach to generate multidimensional series of input values to evaluate a particular set of output functions. a. parameter sweep. b. probability. c. data serial. d. data parallel.

Core-Grid Computing-255 B

23

159. _______________ is another tool used got transferring files. a. GridFTP. b. gopher. c. HTTP. d. SMTP.

Answer: A

160. _______________ solves the privacy and integrity of the problems with ftp by encrypting passwords and data. a. GridFTP. b. gopher. c. HTTP. d. SMTP.

Answer: A

161. AFS stands for ____________. a. application file system. b. andrew file system. c. animated file system. d. application file server.

Answer: B

162. Global name space and a set of servers together in a Avaki Data Grid is called

____________. a. data grid access servers.

b. centralized server. c. distributed servers. d. parallel servers.

Answer: A

163. ___________ is an accessing mechanism used in a data grid. a. serial. b. parallel. c. web-based portal. d. symmetrical.

Answer: C

164. ______________ is the administrative unit of a data grid. a. grid range. b. grid domain. c. grid value. d. grid limit.

Answer: B

165. ______________ is a primary component of the data grid. a. grid server. b. grid client. c. memory unit. d. work unit.

Answer: A

166. _____________ is used for creating and defining a domain. a. grid controller.

Core-Grid Computing-255 B

24 b. grid domain controller. c. grid dominant controller. d. grid domain carrier.

Answer: B

167. ______________ is an ADG component that is responsible for bulk data transfer to and from a local disk on a machine. a. client. b. memory unit. c. work unit. d. shared server.

Answer: D

168. It is the main responsibility of ____________ to translate a grid read/write request into an equivalent read/write on the underlying file system. a. client. b. memory unit. c. work unit. d. shared server.

Answer: D

169. ____________ is not a typical NFS. a. FTP. b. NNTP. c. DGAS. d. DGCA.

Answer: C

170. _____________ enables access across a firewall. a. proxy server. b. proxy client. c. shared server. d. shared client.

Answer: A

171. _________________ is a grid server that serves as a backup for the GDC. a. proxy server. b. shared server. c. failover server. d. Passover server.

Answer: C

172. ___________ is a challenge associated with Desktop Grids. a. intermittent Availability b. grid client c. grid Server d. executive

Answer: A

173. ___________ is a challenge associated with Desktop Grids. a. user expectation. b. grid client. c. grid Server.

Core-Grid Computing-255 B

25 d. executive.

Answer: A

174. __________ for a desktop grid is provided at application level, system level and user level. a. robustness. b. security. c. scalability. d. openness.

Answer: B

175. Security at the __________ the grid client executive must encrypt the entire work unit to protect the integrity of the application a. task level. b. system level. c. user level. d. server level.

Answer: A

176. Security at the __________ the grid client executive must be prevented from misuse. a. task level. b. system level. c. user level. d. server level.

Answer: B

177. The grid client should not experience any degradation since it is a part of the

Desktop grids. This is called ________________. a. robustness. b. unobtrusiveness.

c. scalability. d. openness.

Answer: B

178. The Desktop Grid must complete computational jobs with minimal failures, masking underlying resource and failures called ______________. a. robustness. b. security. c. scalability. d. openness

Answer: A

179. Data parallel, ____________ and probabilistic are the different types of application categories of Desktop grids. a. parallel. b. sweep. c. parameter sweep. d. horizontal.

Answer: C

180. ____________, parameter sweep and probabilistic are the different types of application categories of Desktop grids. a. parallel.

Core-Grid Computing-255 B

26 b. sweep. c. data parallel. d. horizontal.

Answer: C

181. Data parallel, parameter sweep and probabilistic are the different types of application categories of _____________. a. desktop Grid. b. server Grid. c. cluster Grid. d. application Grid.

Answer: A

182. The package sent to the Grid client containing the prepared application along with one member of the set of decomposed inputs and instructions for the creation of output are called ____________. a. grid Server. b. grid Client. c. grid Client Executive. d. work Unit.

Answer: D

183. The term ____________ is used to refer to the combination of an application prepared to execute on a Grid client. a. grid enabled application. b. server Grid. c. cluster Grid. d. application Grid.

Answer: A

184. Performing computational jobs with minimal failures is --------------. a. robustness.

b. consistency. c. integrity. d. unobtrusiveness.

Answer: A

185. If a grid enabled application for which a typical work unit executed in 15 minutes on a average grid client consumes 2 MB of input data and produces 0.4MB of output data calculate the compute intensity? a. 4. b. 2.5. c. 1.9. d. 1.5.

Answer: D

186. To determine the desktop grid application is well suited then the CI should be

_____. a. <1. b. >1. c. =0. d. <0.

Core-Grid Computing-255 B

27

Answer: B

187. The goal of grid computing is to _____________. a. aggregating process power. b. dispersing process power. c. maintain database. d. transfer data.

Answer: A

188. ____________ takes the control of the system in grid environment. a. globus software. b. grid software. c. network software. d. datasets.

Answer: B

189.Grid uses ___________________________ for computation. a. resources of single system. b. no resources. c. resources of many systems. d. middleware.

Answer: C

190. The father of grid computing is___________. a. Ahmar Abbas. b. Donald Richard. c. Mike Cotterel. d. Ian Foster.

Answer: D

191. The origin of Grid Computing was on__________. a. 1999. b. 1995. c. 1989. d. 1990.

Answer: B

192. Grid computing resembles a___________. a. electrical grid. b. centered grid. c. collective grid. d. mutual grid.

Answer: A

193. The disadvantage of grid is__________. a. cost effectiveness. b. resource usage. c. computing power. d. security.

Answer: D

194. Grid computing involves______________. a. pooling-in-of resources. b. dispersing of resources.

Core-Grid Computing-255 B

28 c. making resources unavailable. d. loss of resources.

Answer: A

195. Grid uses________________ for communication and manipulation. a. layer of hardware. b. layer of middleware. c. layer of protocols. d. layer of data ware.

Answer: B

196. The significance of grid computing is________________. a. high computing power. b. low computing power. c. integrity of data. d. complex structure.

Answer: A

197. High performance computing is otherwise called as ___________. a. supercomputer. b. mini computers. c. macro computer. d. micro computer.

Answer: A

198. Sharing high performance computing resources among researchers led to development of____________________. a. cloud computing. b. grid computing. c. cluster computing . d. peer –peer computing.

Answer: B

199. Clusters are connected to outside world through_____________. a. single node. b. multiple nodes. c. only two nodes.

d. no nodes.

Answer: A

200. The decentralized model of peer– peer file sharing does not use a _____________to keep track files. a. distributed server. b. server. c. client. d. client server.

Answer: D

201. ______________a firm that is now leader in grid computing developed load balancing tools for clusters. a. cluster computing. b. platform computing. c. internet computing.

Core-Grid Computing-255 B

29 d. peer –peer computing.

Answer: B

202. Expansion of IRC_________________ . a. Internet Rely Chart. b. Internet Relay Chat. c. Intranet Relay Chart. d. Internet Rely Chat.

Answer: B

203. Expansion of FTP______________. a. File Transfer Process. b. File Transfer Protocol. c. File Transmit Protocol. d. File Transmission Protocol.

Answer: B

204. The computing which running a free software operating system such as LINUX or

FreeBSD is called____________. a. cloud computing. b. grid computing. c. cluster computing. d. peer –peer computing.

Answer: C

205. In peer-peer computing internet file exchanges were executed through

_______________. a. file transfer process. b. file transmit protocol. c. file transfer protocol. d. client.

Answer: C

206. ______________is used by centralized model in peer – peer computing. a. Gnutella. b. Ubero. c. Zetagrit. d. Napster.

Answer: D

207. ________________ layer provides access to the resources being shared. a. connectivity. b. application. c. fabric. d. resource.

Answer: C

208. Protocols required for grid-specific network transactions are defined by

________________ layer in grid computing model. a. collective. b. connectivity. c. application. d. fabric.

Core-Grid Computing-255 B

30

Answer: B

209. _________________ provides uniform authentication, authorization and message protection mechanisms. a. grid FTP. b. grid resources allocation management. c. grid security infrastructure. d. grid information service.

Answer: C

210. The protocols required initiating and control sharing of local resources is defined by

_________________ layer. a. resource. b. fabric. c. application. d. GRAM

Answer: A

211. The collective layer includes index or meta-directory services to create a

_________________ view of the resources available on the grid. a. logical. b. custom. c. direct. d. physical.

Answer: B

212. ___________ is an environmental consideration for computing using desktop grids. a. archival. b. sending. c. receiving. d. data cleaning.

Answer: A

213. The services targeted toward s a specific application are defined by

__________________ layer. a. collective. b. resource. c. application. d. connective.

Answer: C

214. The rules provided by the layers of the grid computing model for identifying

resources and accessing them are defined by ______________________. a. users and brokers. b. resources brokers. c. owners and brokers. d. users and owners.

Answer: D

215. Grid computing model is aligned with ______________________ for its functionality. a. interconnect system architecture. b. internet protocol architecture.

Core-Grid Computing-255 B

31 c. grid Security infrastructure. d. resource management architecture.

Answer: B

216. Application Programming interfaces and Software development toolkits provide

______________ and ________________to protocols and facilitate application. development . a. resources ,applications. b. interfaces , resources. c. security , interfaces. d. interfaces , services.

Answer: D

217. RSL stands for___________. a. Remote Sensing Language. b. Resource Specification Language. c. Resource Security Language. d. Remote Specification Language.

Answer: B

218. The protocol which is used for security purpose is ___________. a. secure socket Layer. b. grid resource information service. c. grid security infrastructure. d. resource allocation and management.

Answer: C

219. The major limitation of normal FTP is__________. a. less complication of using resources. b. resources cannot be shared. c. translation of the given input to other machine is not possible. d. inter-operation between heterogeneous system were limited.

Answer: D

220. The GRIS provides______________. a. information about the resources which is situated at a particular server. b. all information about the grid components. c. information about the resources in all servers. d. information about all resources in grid based system.

Answer: A

221. To access resources in remote sites ____________ is used. a. grid resource registration protocol. b. remote procedural call.

c. secured remote protocol. d. specification call for remote area.

Answer: B

222. The merging of grid architecture and grid protocol led to___________. a. grid toolkit. b. access toolkit. c. smart toolkit. d. globus toolkit.

Core-Grid Computing-255 B

32

Answer: D

223. The protocol which is used to query about the resource description is_________. a. GRIS b. GIIS c. GRIP d. GIS

Answer: C

224. The nature of services provided by Globus toolkit is ___________. a. secured. b. reliable. c. open source. d. easy understandability.

Answer: C

225. The certifications for the grid protocols are given by __________. a. global grid forum. b. internet engineering task force. c. certificate revocations. d. registration authorities.

Answer: B

226. A protocol which is above a standard TCP/IP is a. transport layer security. b. secured socket layer. c. handshake mechanism. d. resource specification layer.

Answer: B

227. ______________grids are deployed to solve problems for a particular group of people within an enterprise. a. extraprise grids. b. departmental grids. c. enterprise grids. d. data grids.

Answer: B

228. According to IBM, resource sharing among different groups within an enterprise constitutes a_______________ grid. a. intra grids. b. campus grids. c. extra grids. d. cluster grids.

Answer: A

229. The extraprise grid resources are generally made available through a____________.

a. virtual public network. b. virtual private network. c. virtual protected network. d. virtual global network.

Answer: B

230. _______________ grids defines platform computing between organizations.

Core-Grid Computing-255 B

33 a. inter grids. b. desktop grids. c. partner grids. d. service grids.

Answer: C

231. Grids established over the public internet constitute________________. a. global grids. b. inter grids c. server grids d. departmental grids

Answer: A

232. _______________grid is used by Sun Microsystems that consist of one or more systems together to provide a single point of access to users. a. infra grids b. extra grids c. cluster grids d. campus grids

Answer: C

233. The data grids are optimized for_______________. a. data-oriented operations. b. resource operations. c. performance operations. d. quality operations.

Answer: A

234. _____________grids are also called Grid Resource Providers. a. utility grids. b. data grids. c. service grids. d. inter grids.

Answer: A

235. The desktops are not included in________________ grids. a. server grids. b. data grids. c. cluster grids. d. partner grids.

Answer: A

236. Grid deployments that require access to, and processing of data are called

___________ grids. a. compute grids. b. global grids. c. service grids. d. data grids.

Answer: D

237. OLE has been super ceded by ____________. a. Microsoft b. COM

Core-Grid Computing-255 B

34 c. CORBA d. DCE

Answer: B

238. The ______________ Microsoft Windows operating environment permits isolated products to be focused on points of differentiation while leveraging a common base. a. OLE enabled b. COM enabled c. voice enabled d. signature enabled

Answer: B

239. DCOM is the distributed version of COM, generally equivalent to _______. a. Microsoft b. COM c. CORBA d. DCE

Answer: C

240. SOAP is _________. a. Simple Object Access Protocol. b. Sample Object Access Protocol. c. Simple Object Aim Protocol. d. Simple Object Access Pricing.

Answer: A

241. WSDL is _______________. a. Web Services Definition Language. b. Web Services Description Language. c. Web Services Definition Link. d. Web Software Definition Language.

Answer: B

242. WSIL is ______________. a. Web Service Inspection Language. b. Web Software Inspection Language. c. Win Service Inspection Language. d. Web Service Initiation Language.

Answer: A

243. ____________ mechanisms allows for a accelerated adoption of grid technologies. a. WSIL. b. WSDL. c. SOAP. d. Web Services.

Answer: D

244. ________________ is being proposed to the global grid forum as a standard platform for grid computing. a. WSIL. b. WSDL.

c. OGSA d. OGSF

Core-Grid Computing-255 B

35

Answer: C

245. ____________ is a on demand application services for large scale analysis and simulation. a. commercial data center. b. national fusion collaboratory. c. severe storm prediction. d. online media and entertainment.

Answer: B

246. ______________ is video on demand or online gaming. a. commercial data center. b. national fusion collaboratory. c. severe storm prediction. d. online media and entertainment.

Answer: D

247. __________ in ADG allows access control to users. a. access control list. b. access specifier. c. access allocator. d. access monitor.

Answer: A

248. Stateful web services are supported by ______________. a. OGSA. b. OGSI. c. WSDL. d. XML.

Answer: B

249. __________ is an OGSI mechanism to expose a service instance’s state data. a. serviceData. b. serviceDelay. c. serviceDocument. d. serverData.

Answer: A

250. _______ worsen’s the consistency problems in file handling. a. gridFTP. b. SFTP. c. DMZ. d. SCP.

Answer: C

Download