Computer Fundamental

Cloud computing refers to delivering computing services—such as storage, processing, and software—over the internet. It allows users to access resources on-demand without owning physical infrastructure. Cloud computing offers scalability, cost-efficiency, and flexibility, enabling businesses and individuals to store and process data remotely.

1. What is the full form of LDAP?
A) Light Weight Directory Access Provider
B) Light Weight Directory Access Protocol ✅
C) Light Weight Directory Access Program
D) Light Weight Directory Access Protection

2. What is called the collective term for malicious software, such as viruses, worms, and trojans?
A) Spam
B) Phishing
C) Malware ✅
D) Harm

3. What is the full form of CIA under information security?
A) Confidentiality Integrity Availability ✅
B) Criminal Investigation Agency
C) Cost Information Agency
D) Credit Integrity Assessment

4. What is called a single point of access for several networking services?
A) Phishing
B) Web service
C) Directory service ✅
D) Worms

5. Which activities endanger the sovereignty and integrity of the nation?
A) Cyber Terrorism ✅
B) Cyber vandalism
C) Cyber squatting
D) Carding

6. Which crime involves the use of computer networks to create, distribute, or access materials that sexually exploit underage persons?
A) Assault by Threat
B) Cyber squatting
C) Cyber vandalism
D) Child pornography ✅

7. Which method goes through all the files or network elements with the intention to detect something unusual?
A) Probing
B) Phishing
C) Infecting
D) Scanning ✅

8. Victims of a cyber attack might lose ______.
A) Data
B) Money
C) Both A & B ✅
D) None of them

9. Under information security, CIA stands for ______.
A) Criminal Investigation Agency
B) Confidentiality, Integrity, Availability ✅
C) Cost Information Agency
D) Credit Integrity Assessment

10. Script files sent mostly through email attachment to attack the host computer are called ______.
A) Worms
B) Phishing attacks
C) Trojans ✅
D) Computer Viruses

11. What is called the protection of information and data from unauthorized access?
A) Physical security
B) Link security
C) Risk management
D) Information security ✅

12. Which of the following shows the need for cyber security?
a) Protection from hackers
b) Internet scams
c) Viruses
d) All of the above ✅

13. The first computer virus is_____
a) Creeper ✅
b) Rat virus
c) Worm
d) Blaster

14. Trojan horses are very similar to viruses in the programs that replicate copies of themselves.
a) True
b) False ✅

15. Maintaining computers free from cyber attacks is called ______.
a) Cyber attack
b) Risk management ✅
c) Online fraud
d) Phishing

16. When did the Indian parliament pass the IT Act?
A) 1990
B) 1992
C) 2000 ✅
D) 2005

17. What is called protecting data from online attacks, deletions, malwares?
A) Physical security
B) Cyber security ✅
C) Cyber attack
D) Virus

18. Cyber security is also called _______ security?
a) Criminal
b) Information Technology ✅
c) National
d) International

19. Which of the following is an anti-virus program?
a) Norton
b) K7
c) Quick Heal
d) All of these ✅

20. ______ monitors user activity on the internet and transmits that information in the background to someone else.
a) Malware
b) Spyware ✅
c) Adware
d) None of these

21. Which of the following is a feature of cloud computing?
a) Scalability ✅
b) Limited access
c) High cost
d) Fixed resources

22. Which of the following is an example of a SaaS (Software-as-a-Service) model?
a) Google Drive ✅
b) AWS Elastic Beanstalk
c) Microsoft Azure
d) DigitalOcean

23. Which of the following is an example of a private cloud?
a) VMware vSphere ✅
b) Amazon EC2
c) Google Cloud Platform
d) Microsoft Azure

24. Which of the following is true about the public cloud?
a) It is owned by a single organization
b) It is not available to the general public
c) It is owned and operated by a cloud service provider ✅
d) It does not provide scalability

25. Which of the following services is provided in the IaaS (Infrastructure-as-a-Service) model?
a) Virtual Machines ✅
b) Google Docs
c) Microsoft Office
d) Dropbox

26. What is the main advantage of cloud computing?
a) Cost efficiency ✅
b) Increased storage
c) Unlimited power
d) Reduced network traffic

27. What is the purpose of virtualization in cloud computing?
a) To reduce the number of users
b) To improve the physical hardware
c) To create virtual machines and improve resource utilization ✅
d) To increase cloud service prices

28. What does “elasticity” in cloud computing refer to?
a) The ability to scale resources up or down as needed ✅
b) The ability to make services available to all users
c) The ability to increase security
d) The ability to maintain a single user

29. Which of the following is a key characteristic of cloud computing?
a) On-demand self-service ✅
b) Fixed resources
c) Limited access
d) Long provisioning time

30. What does PaaS (Platform-as-a-Service) provide?
a) A platform for building and running applications ✅
b) Basic computing resources
c) A fully managed database
d) Infrastructure resources

31. Which of the following is an example of a hybrid cloud?
a) Amazon Web Services with on-premises data centers ✅
b) Google Cloud Platform
c) DigitalOcean
d) Dropbox

32. What is the term for the sharing of resources between different customers in cloud computing?
a) Multi-tenancy ✅
b) Single tenancy
c) Shared hosting
d) Data replication

33. What is one of the primary concerns about cloud computing?
a) Data security and privacy ✅
b) Increased storage capacity
c) Lower operational costs
d) Ease of access

34. What does the “cloud” refer to in cloud computing?
a) Data storage on remote servers over the internet ✅
b) Hardware devices used for networking
c) A metaphor for high-speed internet
d) The servers used for database storage

35. Which cloud service model allows users to install their own applications?
a) SaaS
b) PaaS ✅
c) IaaS
d) DaaS

36. Which of the following is a benefit of using the cloud for businesses?
a) Increased scalability ✅
b) Decreased security
c) Fixed pricing
d) Limited accessibility

37. What type of cloud deployment allows organizations to keep some data on-site while using the cloud for other data?
a) Hybrid cloud ✅
b) Public cloud
c) Private cloud
d) Community cloud

38. What is one common cloud service for managing virtual machines?
a) AWS EC2 ✅
b) Google Sheets
c) Microsoft Office
d) Dropbox

39. Which type of cloud deployment is fully operated by a third-party vendor and shared by multiple customers?
a) Private cloud
b) Public cloud ✅
c) Hybrid cloud
d) Community cloud

40. What does “cloud bursting” refer to in cloud computing?
a) A form of data encryption
b) The ability to move workloads from a private cloud to a public cloud during peak demand ✅
c) A method of data recovery
d) The permanent unavailability of a cloud service

41. Which of the following is an example of a cloud-based storage service?
a) Google Drive
b) Dropbox
c) OneDrive
d) All of the above ✅

42. Which of the following is a key feature of cloud computing?
a) On-demand self-service ✅
b) High bandwidth
c) Manual configuration
d) Fixed capacity

43. What is the function of a cloud broker in cloud computing?
a) To manage multiple cloud services and ensure optimal performance ✅
b) To create new cloud services
c) To encrypt data in the cloud
d) To monitor cloud usage

44. Which cloud model provides the most flexibility in terms of management and control?
a) Private Cloud ✅
b) Public Cloud
c) Hybrid Cloud
d) Community Cloud

45. Which of the following is the least secure option in cloud computing?
a) Public Cloud ✅
b) Private Cloud
c) Hybrid Cloud
d) None of the above

46. What does IaaS stand for in cloud computing?
a) Infrastructure-as-a-Service ✅
b) Internet-as-a-Service
c) Interface-as-a-Service
d) Integration-as-a-Service

47. What is the main advantage of using SaaS?
a) No need for hardware or software maintenance ✅
b) More control over infrastructure
c) Easier scalability
d) Requires no internet connection

48. What does the term “elasticity” refer to in cloud computing?
a) The ability to scale resources up or down based on demand ✅
b) The ability to run on multiple devices
c) The flexibility of the user interface
d) The speed of data transfer

49. Which of the following is a challenge of cloud computing?
a) Data security and privacy concerns ✅
b) Unlimited storage capacity
c) Unlimited computing power
d) Faster data processing

50. Which of the following best describes the hybrid cloud model?
a) A cloud environment that uses only public clouds
b) A cloud environment that uses only private clouds
c) A combination of private and public clouds that work together ✅
d) A single cloud used by multiple organizations

51. Who is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider ✅
d) Charles Bachman

52. Which of the following are the features of cloud computing?
a) Security
b) Availability
c) Large Network Access
d) All of the mentioned ✅

53. Applications and services that run on a distributed network using virtualized resources is known as ___
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing ✅

54. Which of the following is the Cloud Platform provided by Amazon?
a) AWS ✅
b) Cloudera
c) Azure
d) All of the mentioned

55. Which of the following monitors the performance of the major cloud-based services in real-time in Cloud Commons?
a) CloudWatch
b) CloudSensor ✅
c) CloudMetrics
d) All of the mentioned

56. Choose the correct relationship of cloud services to customers.
a) One-One
b) One-Many ✅
c) Many-one
d) Many-Many

57. What does the term “elasticity” in cloud computing refer to?
a) Ability to scale down
b) Parallel
c) Ability to scale up
d) Both A and C are correct ✅

58. In cloud computing, the client is on which end.
a) Backend
b) Frontend 
c) Depends
d) Both A and B ✅

59. Internal Cloud or Corporate Cloud is also known as ______
a) Community Cloud ✅
b) Private Cloud
c) Scalability of Cloud
d) Public Cloud

60. Which of the following is not a benefit of cloud computing?
a) Cost savings
b) High performance
c) Limited scalability ✅
d) Accessibility from anywhere