1. The role of a Kafka end-point is
- Data storage
- Data ingestion
- Data broking
- Data encryption
Answer :- c
2. Stream processing enables performing real time queries on incoming data. The statement is
- True
- False
Answer :- a
3. Match the following tiers (in a three-tier edge architecture) to the respective functionality they provide,
Tiers:
1. Data Sources
2. Intelligence
3. Actionable Insights
Functionality:
X. Machine Learning Models and Algorithms
Y. Dashboards and Visualizations, Human-Machine Interaction
Z. Sensors, Databases and Event-Sources
- 1-X, 2-Y, 3-Z
- 1-Z, 2-X, 3-Y
- 1-Y, 2-Z, 3-X
- 1-Z, 2-Y, 3-X
Answer :- b
4. Which of the following is not a component of a Thin Edge?
- Networking Equipment
- Controllers
- Computers / Servers
- On-Premise Edge Data Centers
Answer :- a
5. Which of the following edge-computing paradigm is used at the edge of cellular networks?
- Micro Data Centers
- Multi-Access Edge Computing
- Fog Computing
- Cloud Computing
Answer :- b
6. Match the following components of an Edge-Controller/Orchestrator to their respective functionality,
Components:
1. Application Manager
2. Infrastructure Manager
3. Planner
Functionality:
X. Manages requirements of application tasks
Y. Manages physical and virtual resources
Z. Manages scheduling policy for tasks
- 1-X, 2-Y, 3-Z
- 1-X, 2-Z, 3-Y
- 1-Z, 2-Y, 3-X
- 1-Z, 2-X, 3-Y
Answer :- a
7. Compared to cloud, edge provides
- lower latency
- higher latency
- less resources
- more resources
Answer :- a, c
8. Considering the advantages of edge computing combined with cloud computing, “backbone network alleviation” refers to,
- distributed edge computing nodes can handle a large number of computation tasks without exchanging the corresponding data with the cloud
- services hosted at the edge can significantly reduce the delay of data transmissions and improve the response speed
- the cloud can provide powerful processing capabilities and massive storage when the edge cannot afford
- None of these
Answer :- a
9. Match the following on-demand access (*aaS) service to the functionality they provide,
On-Demand Access:
1. SaaS
2. PaaS
3. IaaS
Functionality:
X. Execution Runtime, Databases, Web-Servers, Development Tools
Y. CRM, E-Mail, Virtual Desktop, Communication, Gaming
Z. Virtual Machines, Servers, Storage, Load-Balancing, Networking
- 1-X, 2-Z, 3-Y
- 1-X, 2-Y, 3-Z
- 1-Y, 2-X, 3-Z
- 1-Y, 2-Z, 3-X
Answer :- c
10. Data sovereignty refers to,
- reducing latency in data access
- moving core cloud services closer to the origin of data
- providing storage, compute, and network services locally
- keeping data where it actually belongs
Answer :- d