Numerous cloud service providers exist, but the top six cloud computing platforms are Google, Dropbox, Apple, Microsoft, and Amazon, and so on
TrueCorrect
False
On-demand provisioning of resources and scalability allows applications to be accessed without reserving computing resources or paying for additional services This refers to ____
improving reliabilityCorrect
improving data storage and processing power
multi-tenancy
ease of integration
On-demand self-service: Cloud services are automatically made available without human interference when required by a potential consumer
TrueCorrect
False
On-premise private cloud refers to an internal cloud, hosted within an organization's own data center
TrueCorrect
False
Once the different databases are “combined”, ____________ federated database is formed
oneCorrect
One of the following is not an advantage of the private cloud
Not economicalCorrect
Maximum level of scalability
Computational resources
Customizable
Oracle cloud was launched in _____
early 2000s
the late 1990s
2012Correct
2014
PaaS seamlessly allows the developers and technical operations professionals to access the services platform
True
FalseCorrect
Parallel computing has their own memory while Distributed computing can have shared memory.
FalseCorrect
Parallel computing occurs on one system while Distributed computing occurs between multiple system.
TrueCorrect
Platform-as-a-Service (PaaS) allows scholastic organizations to use application software through a cloud platform via the internet
True
FalseCorrect
Programming issues faults is common to
Cluster computingCorrect
Grid computing
Cloud computing
Mainframe systems
Proper VM management and proper capacity management is required orelse VMs can become uncontrollable and create a virtual bottleneck thatcan cause disasters on the performance of virtualized system
TrueCorrect
False
SaaS is typically the Technical layer of the cloud service model
True
FalseCorrect
Scalability: Managing a large number of IoT nodes requires scalable security solutions
TrueCorrect
False
Security must be addressed throughout the IoT lifecycle from the initial design to the services running
TrueCorrect
False
Semantic technologies provide users with integrated access to data by applying search and navigation techniques that are tuned to the computational ontologies of relevance to the organization
TrueCorrect
False
Servers, access points, and other MSS permit strong send/receive signals However, such ability in mobile nodes is comparatively weak This feature is called ____
dissymmetrical network communicationCorrect
frequent disconnection and consistency
diversity of network connections
low reliability
Service interoperability involves
Allows the cloud users to copy stored data objects
Ability to seamlessly migrate to a machine image
Fully-stopped virtual machine instance from one service provider
Cloud users' ability to access their unique data setCorrect
Service providers can pool resources to support an assortment of applications with a multiplicity of users This refers to ____
improving reliability
improving data storage and processing power
ease of integration
multi-tenancyCorrect
Services from diverse service providers can be assimilated through the cloud This refers to ____
ease of integrationCorrect
improving data storage and processing power
multi-tenancy
improving reliability
Smart Cities also address security issues by means of complex security systems for detecting theft, fire or unauthorized entry The stakeholders involved in this scenario constitute a very heterogeneous group
True
FalseCorrect
Smart Cities will be conscious about what happens inside a building, mainly impacting three aspects: resource usage (water conservation and energy consumption), security and comfort
True
FalseCorrect
software development method emphasizes collaboration, communication and integration between developers and other IT personnel with the goal of streamlining software development and quality assurance
DevOpsCorrect
Software is often pro- vided to end users as a recurring service from vendors (SaaS)
TrueCorrect
False
The ____ makes cloud services accessible to cloud consumers
cloud resellers
service intermediation
cloud brokers
cloud carrierCorrect
The _____________ creates, runs and manages VMs
hypervisorCorrect
The ability of a cloud solution to add new runtime and framework support via community buildpacks
extensibilityCorrect
The adoption of Cloud Computing has 3 factors namely: technology factors, organization factors, and national factors
True
FalseCorrect
The advantages of IaaS are
Reliability, almost limitless computing power and storage, cost reduction, business agility, scalability, and privacyCorrect
Reliability, limited computing power and storage, cost reduction, business agility, scalability, and privacy
Not Reliability
Reliability, storage, cost reduction, business agility, scalability, and privacy
The BLE security utilizes a "Security" field after the 4-byte ICMPv6 message header
True
FalseCorrect
The capabilities of virtualization and sharing of infrastructure in the Cloud computing paradigm is fulfilled by three major distribution models, namely, SAAS, PAAS and IAAS
TrueCorrect
False
The cloud computing reference architecture is a practical plan for a system with a distinct range of operations
TrueCorrect
False
The cloud computing technology, everyone using the World Wide Web can enjoy flexible computing power on-demand
TrueCorrect
False
The cloud usage monitor is technically composed of
System admin
A monitoring agent and a resource agentCorrect
Security applications
Dashboard reporting
The core elements of parallel processing are CPUs.
TrueCorrect
The data collected needed to be store somewhere and the data generated anytime, anywhere These huge data given back in raw form back to end user will also consume time, data
TrueCorrect
False
The data with a unique name typically located in folders is called
Block
Dataset
FilesCorrect
Objects
The databases typically involved in this kind of system exists independently of the others
Federated DatabaseCorrect
The decision-making framework to adopt cloud computing was developed based on the technology-organization-environment (TOE) framework
TrueCorrect
False
The disadvantages of cloud computing: Most documented Cloud interfaces have no associated standards
TrueCorrect
False
The focus of virtualization is to escalate the utilization of underlined hardware re-source to its minimum capacity
True
FalseCorrect
The higher the reliability, the higher the cloud service usage risks
True
FalseCorrect
The Internet of Things is a combination of a technological push and a human pull for more and ever-increasing connectivity with anything happening in the immediate and wider environment - a logical extension of the computing power in a single machine to the environment: the environment as an interface
TrueCorrect
False
The main issues faced by SaaS are security and privacy Poorly secured IaaS devices and services can serve as potential entry points for cyber-attack and expose user data to theft by leaving data streams inadequately protected
True
FalseCorrect
The migration to the cloud requires considerable awareness among industry stakeholders to adopt it and tap into a well-established global data pool
TrueCorrect
False
The monitoring agent is?
An event-driven programCorrect
Database
Security applications
Processing program
The physical machine on which the VMM runs is called the host machine and each VM is termed as a guest machine
TrueCorrect
False
The process of distributing computing workloads across multiple resources, such as servers
load balancingCorrect
The process of moving data between two or more storage systems, data formats, warehouses or servers
data migrationCorrect
The spectacle of the technology is that the applications running on top of a virtual machine think that they have their own dedicated operating system and libraries but actually the resources are shared among various applications
TrueCorrect
False
The three main cloud computing models are infrastructure as a service, software as a service, and ____________
platform as a serviceCorrect
The ultimate result in network virtualization is a virtual network which is highly efficient in terms of utilization with less time overhead
TrueCorrect
False
There are 2 types of clouds that you can subscribe to depending on your needs As a home user or small business owner, you will most likely use private cloud services
True
FalseCorrect
There are many firms that provide cloud environments for development, management, and provision of software
TrueCorrect
False
There are three cloud service models, namely, Software-as-a-Service (SaaS), Plat- form-as-Servicevice (PaaS), and Infrastructure-as-a-service (IaaS)
TrueCorrect
False
There is no global clock in parallel computing, it uses synchronization algorithms.
FalseCorrect
These ‘__________' run their own processes and communicate with one another using lightweight mechanisms such as language-agnostic APIs
microservicesCorrect
These cloud services are delivered from a business' data center to internal users
hybrid
elasticity
public
privateCorrect
This applications allow a business to manage relationships with current and future customers by providing the business with tools to manage sales, customer service, and technical support roles SaaS CRM applications, such as Salesforcecom, are very popular
Customer Relationship Management (CRM)Correct
This benefit of cloud computing enables ends users to spin up computing resources for almost any type of workload on-demand
elasticity
hybrid cloud
self-service provisioningCorrect
pay-per-use
This is a cloud computing environment that is comprised of a mix of private cloud, public cloud, and on-premises solutions
hybrid cloudCorrect
This is a company that offers a cloud computing service, such as PaaS, IaaS, or SaaS, to individuals or other businesses
Cloud Service Provider (CSP)Correct
This is a comprehensive cloud platform offered by Google, Inc that consists of both infrastructure as a service (IaaS) and platform as a service (PaaS) offerings
Google Cloud Platform (GCP)Correct
This is a deceptive marketing technique used to rebrand old products by connecting them to the cloud, or at least to the term cloud
Cloud washingCorrect
This is a development model in which a product’s source code is made openly available to the public
Open SourceCorrect
This is a free, open-source cloud platform that is primarily deployed as an infrastructure as a service offering
Open StackCorrect
This is a model of cloud computing in which the vendor hosts virtualized computing resources, as well as network and storage resources, and provides them to the user as a service via the internet
infrastructure as a serviceCorrect
This is a model of cloud computing in which the vendor provides the hardware and software tools necessary to create, deploy and manage applications at scale to the user via the internet, as a service
Platform as a Service (PaaS)Correct
This is a model of computer storage in which data is stored in facilities (often multiple facilities) managed by a hosting company (cloud service provider) and is accessed remotely by the user via a network
Cloud StorageCorrect
This is a product that gives the user integrated management of public, private, and hybrid cloud environments
Cloud Management PlatformCorrect
This is a term used to reference the ability of a system to adapt to changing workload demand by provisioning and deprovisioning pooled resources so that provisioned resources match current demand as well as possible
elasticityCorrect
This is also known as virtual machine
Guest MachineCorrect
This is an example of cloud washing
Personal CloudCorrect
This is an IT services provider that provides fully outsourced network, application, and system services across a network to clients