0% found this document useful (0 votes)
16 views

cloud 1

cloud 1

Uploaded by

m.soker111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

cloud 1

cloud 1

Uploaded by

m.soker111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter 1: Introduction to Cloud Computing

What is Cloud?

The term "Cloud" refers to a network or the internet. It provides services over public and
private networks (WAN, LAN, or VPN).

What is Cloud Computing?

Cloud Computing involves manipulating, configuring, and accessing hardware and


software resources remotely. It offers online data storage, infrastructure, and applications.

Cloud Computing Components

Clients: Devices used by end-users (e.g., desktops, laptops, smartphones).

Data Center: Hosts applications used by clients, often involving multiple virtual machines
on a single physical server.

Distributed Servers: Servers distributed across different geographic areas to ensure


reliability and scalability.

Benefits of Cloud Computing

Access applications over the internet.

No need for local software installation.

Offers online development and deployment tools.

Cost-effective and provides load balancing.


Risks related to Cloud Computing

Security and Privacy: Concerns about handing over sensitive information to third-party
providers.

Lock-In: Difficulty in switching providers.

Isolation Failure: Risks of storage, memory, and routing isolation mechanisms failing.

Management Interface Compromise: Public cloud interfaces accessible via the internet.

Insecure or Incomplete Data Deletion: Risks of data not being fully deleted.

Characteristics of Cloud Computing

On-Demand Self-Service: Users can access services as needed.

Broad Network Access: Accessible from anywhere at any time.

Resource Pooling: Multiple tenants share resources.

Rapid Elasticity: Easy to scale resources up or down.

Measured Service: Providers control and monitor all aspects of the service.

Cloud Computing Planning

Strategy Phase: Analyzing strategy problems and establishing a strategy document.

Planning Phase: Analyzing problems and risks, developing business and IT architecture,
and creating a transformation plan.

Deployment Phase: Selecting a cloud provider and ensuring maintenance and technical
services.

This summary covers the key points from the first lecture on Cloud Computing.
Questions and Answers:

1. The term "Cloud" refers to:


A) Physical storage devices
B) A network or the internet
C) Local servers
D) Hardware-only systems
Answer: B) A network or the internet
2. Which types of networks can the cloud provide services over?
A) Only public networks
B) WAN, LAN, or VPN
C) Only private networks
D) Cellular networks
Answer: B) WAN, LAN, or VPN

3. Cloud Computing involves:


A) Installing local software
B) Manipulating, configuring, and accessing hardware and software remotely
C) Directly managing physical servers
D) Limited access to remote resources
Answer: B) Manipulating, configuring, and accessing hardware and software remotely
4. What are some services offered by Cloud Computing?
A) Offline data storage
B) Online data storage, infrastructure, and applications
C) Hardware assembly
D) Local processing only
Answer: B) Online data storage, infrastructure, and applications

5. Which of the following is considered a "Client" in Cloud Computing?


A) Virtual machines
B) Desktops, laptops, and smartphones
C) Data centers
D) Distributed servers
Answer: B) Desktops, laptops, and smartphones
6. What is the function of a data center in Cloud Computing?
A) Hosting applications for clients
B) Acting as a local storage device
C) Replacing distributed servers
D) Providing personal internet access
Answer: A) Hosting applications for clients
7. Distributed servers in cloud computing ensure:
A) Reduced data transfer rates
B) Reliability and scalability
C) Isolation from other resources
D) Local-only operations
Answer: B) Reliability and scalability
8. What can multiple virtual machines (VMs) run on?
A) Separate physical servers
B) A single physical server
C) Cloud-only networks
D) Local user devices
Answer: B) A single physical server

9. What is a major benefit of Cloud Computing?


A) Limited scalability
B) No local software installation required
C) Offline-only access
D) Fixed resources for users
Answer: B) No local software installation required
10. Cloud Computing enables:
A) Online development and deployment tools
B) Restricted resource usage
C) Reduced collaboration
D) Static resource allocation
Answer: A) Online development and deployment tools
11. Which feature makes Cloud Computing cost-effective?
A) High hardware dependency
B) Load balancing and resource optimization
C) Fixed storage capacities
D) Restricted scalability
Answer: B) Load balancing and resource optimization
12. What is load balancing in cloud computing?
A) Assigning more users to one server
B) Distributing workloads across multiple servers
C) Limiting data sharing
D) Disconnecting inactive users
Answer: B) Distributing workloads across multiple servers

13. What is a major concern in cloud computing security?


A) Lack of scalability
B) Handing over sensitive data to third parties
C) No internet access
D) Expensive deployment
Answer: B) Handing over sensitive data to third parties
14. What is a "Lock-In" risk in cloud computing?
A) Difficulty switching cloud service providers
B) Data synchronization issues
C) Permanent loss of resources
D) Limited bandwidth usage
Answer: A) Difficulty switching cloud service providers
15. What is an isolation failure in cloud computing?
A) Failure of a single server
B) Breakdowns in storage, memory, or routing separation between tenants
C) Limited network access
D) Unavailable cloud services
Answer: B) Breakdowns in storage, memory, or routing separation between tenants
16. What is a common risk in public cloud interfaces?
A) Increased processing speed
B) Management interface compromise
C) Local-only resource management
D) Restricted scalability
Answer: B) Management interface compromise
17. What happens during insecure or incomplete data deletion?
A) All data is permanently deleted
B) Extra copies of data remain accessible
C) Only metadata is removed
D) Physical drives are destroyed immediately
Answer: B) Extra copies of data remain accessible

18. What is On-Demand Self-Service in cloud computing?


A) Users request resources from providers manually
B) Users can access services as needed
C) Fixed resource allocation to all users
D) Limited access to resources
Answer: B) Users can access services as needed
19. Which characteristic ensures users can access cloud services from anywhere?
A) Broad Network Access
B) On-Demand Self-Service
C) Resource Pooling
D) Measured Service
Answer: A) Broad Network Access
20. What does Resource Pooling allow?
A) Exclusive resource usage
B) Multiple tenants sharing resources
C) Limiting user access
D) Fixed server allocations
Answer: B) Multiple tenants sharing resources
21. What is Rapid Elasticity in cloud computing?
A) Limited scalability
B) Easy scaling of resources up or down
C) Constant resource availability
D) Restricted resource sharing
Answer: B) Easy scaling of resources up or down
22. What does Measured Service in cloud computing involve?
A) Monitoring and controlling all aspects of services
B) Assigning fixed resources to each user
C) Disabling resource scaling
D) Limiting access based on user roles
Answer: A) Monitoring and controlling all aspects of services
23. What is the first step in the strategy phase of cloud computing planning?
A) Business architecture development
B) Cloud computing value proposition analysis
C) Selecting a cloud provider
D) Maintenance planning
Answer: B) Cloud computing value proposition analysis
24. What is created during the strategy phase?
A) A transformation plan
B) A strategy document
C) A deployment guide
D) A scalability report
Answer: B) A strategy document
25. What is analyzed during the planning phase?
A) Problems and risks in cloud application
B) Maintenance requirements
C) Internet speeds
D) Data export policies
Answer: A) Problems and risks in cloud application
26. What does business architecture development involve?
A) Recognizing risks from a business perspective
B) Developing server configurations
C) Designing new user interfaces
D) Calculating resource costs
Answer: A) Recognizing risks from a business perspective
27. Which phase involves selecting a cloud provider?
A) Strategy phase
B) Planning phase
C) Deployment phase
D) Maintenance phase
Answer: C) Deployment phase
28. What is the focus of the transformation plan?
A) Scaling resources
B) Moving business processes to cloud computing modes
C) Measuring data flow
D) Analyzing value propositions
Answer: B) Moving business processes to cloud computing modes
29. Which document defines the service level a cloud provider will meet?
A) Transformation plan
B) Strategy document
C) Service Level Agreement (SLA)
D) Deployment guide
Answer: C) Service Level Agreement (SLA)
30. What do maintenance and technical services ensure?
A) Constant user training
B) Quality of services
C) Unlimited data storage
D) Hardware replacement
Answer: B) Quality of services

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy