0% found this document useful (0 votes)
29 views5 pages

Cloud Computing Concepts and Technologies

The document covers various concepts related to cloud computing, virtualization, and distributed systems, including definitions and characteristics of SaaS, PaaS, IaaS, and edge computing. It discusses the advantages and challenges of cloud services, such as latency, scalability, and security concerns, as well as specific technologies like Docker and Google Cloud services. Additionally, it highlights the importance of resource management, data privacy, and compliance in cloud environments.

Uploaded by

uroojcsurooj63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

Cloud Computing Concepts and Technologies

The document covers various concepts related to cloud computing, virtualization, and distributed systems, including definitions and characteristics of SaaS, PaaS, IaaS, and edge computing. It discusses the advantages and challenges of cloud services, such as latency, scalability, and security concerns, as well as specific technologies like Docker and Google Cloud services. Additionally, it highlights the importance of resource management, data privacy, and compliance in cloud environments.

Uploaded by

uroojcsurooj63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1.

Latency
2. “Google Docs” app is an example of SaaS
[Link] Cloud Interconnect, Microsoft Azure
[Link] technology allows multiple virtual machines to run on a single physical system
or on a cluster of physical system. True
5. A distributed system is typically preferred when the task is: i)Data-intensive;
ii)Computing-
Intensive Both (i) and (ii)
[Link] less data-intensive applications, horizontal scale-out elasticity is the ideal
solution. True
7. XaaS
8. Increase agility , Increase productivity
9. PaaS (Platform as a Service) brings the benefits: (i) Creation of software (ii)
Integration of web services and databases. Both (i) and (ii)
10. Cluster
11. In virtualization, both operating systems run simultaneously, but not in dual
boot.
12. Private cloud
13. Organization should consider-(i) Network Dependency and (ii) Risks from multi-
tenancy while thinking of deploying an outsourced private cloud. Both (i) and
(ii) are true
14. DOM (Document Object Model)
15. The public cloud has a risk of multi-tenancy. True
16. Virtual Machine Monitor
17. Speed and flexibility are the two disadvantages of hardware-assisted
virtualization. True
18. Firewall, Interoperability, Complexity
19. UDDI
20. Three entities (a service provider, a service requestor, and a broker)
21. Encryption algorithm details
22. Corporate, customer, and service levels
23. Uptime percentage
24. Web Service SLAs are narrower in scope than Cloud SLAs
25. 50
26. Multi-node distributed query execution
27. Google Cloud Storage (with Hadoop connector)
28. It supports pipelined execution between stages
29. Reduce phase, because it merges map outputs
30. 150
31. Business Critical Tier
32. They are in separate physical locations
33. 20
34. HTTPS Only setting
35. Firestore
36. Cinder
37. GKE
38. BigQuery + Pub/Sub + Data Studio
39. gcloud app services set-traffic --splits v1=0.7,v2=0.3
40. Neutron router not configured
41. .X is at least 24.44
42. .An increase in power consumption
43. Capital expenditure
44. . 15
45. Virtual Machine
46. Combiner
47. Hypervisor
48. Energy-aware scheduling
49. Statement 1: Economies of scale in cloud computing lead to reduced costs per
unit as the scale increases.
Statement 2: Cloud providers pass all savings from economies of scale directly to
individual users.
Statement 1 is true and Statement 2 is false
50. 2.4
51. Integrity
52. Authenticity
53. Masquerading
54. Disruption
55. Penetration testing
56. Reconnaissance in network security is the phase where attackers or testers
collect information about the target system. True
57. Statement I: Authentication is the process of verifying the identity of a user or
system. Statement II: Non-repudiation ensures that a sender cannot deny sending a
message. Both true
58. IaaS
59. Regulatory Compliance & Audit
60. Difficulty in migrating data to another provider
61. Network latency and dependency
62. Location independence
63. Real-time context parameters such as network bandwidth, latency, and device
battery level
64. Act as a small-scale data center close to mobile users
65. Data confidentiality and privacy during transmission
66. Better support for real-time applications like healthcare monitoring and
autonomous vehicles
67. Edge devices or intermediate nodes such as routers, gateways, or local servers
68. Statement 1: Geospatial Cloud Computing enables large-scale spatial data
analysis by leveraging distributed computing resources.
Statement 2: Traditional desktop GIS systems alone are sufficient to handle petabyte-scale remote sensing
data efficiently. Statement 1 is true, but Statement 2 is false
69. High computational demand and storage requirements for large-scale
raster/vector datasets
70. Fog/Edge computing + Low-latency communication (e.g., 5G)
71. docker ps
72. They persist data independently of containers.
73. A VM can run multiple containers inside it
74. Container orchestration
75. VMware ESXi
76. Energy-Aware VM Consolidation
77. Lack of virtualization support in sensors
78. Cloud servers are usually located far from the devices
79. High volume, velocity, and heterogeneity of sensor data
80. Statement 1: In Sensor Cloud, virtualization of sensor data allows multiple
applications to use the same physical sensor infrastructure.
Statement 2: Without virtualization, each application would require a dedicated
sensor network, increasing cost and inefficiency. Both statements are True
81. Fog computing extends the cloud closer to the edge network, while edge computing processes data
strictly within IoT devices or local gateways.
82. Fog computing
83. edge < Fog < Cloud
84. Horizontal scalability across multiple fog nodes
85. Fog nodes provide intermediate decision-making, while the cloud manages
global policies and optimization.
86. To find available resources in the network that satisfy application requirements,
respect constraints, and optimize the objective, such as minimizing energy
consumption
87. Dynamic variability of wireless network conditions and device mobility
[Link] act as intermediaries that negotiate, discover, and allocate resources across different CSPs.
89. Ensuring SLA compliance, interoperability, and trust across heterogeneous
providers.
90. A federation where resources from public and private clouds are combined to
provide flexible services while maintaining security and control.
91. Pre-copy migration
92. Post-copy migration
93. Hybrid migration
94. Running and managing individual containers on VM instances.
95. Docker Hub
96. Docker volumes are deleted automatically when the container using them is
removed. true
97. Statement 1: Docker networking allows containers to communicate with each
other and the host. Statement 2: By default, containers are launched in host network
mode. 1 is true
98. By default, Docker pulls all images from a private registry. False
99. 9 hours, 9 hours
100. Destination host does not have access to the VM’s disk
101. Execution of services at the local device level with intermittent cloud
connectivity
102. Dew computing emphasizes offline-first functionality, while Fog computing
emphasizes network-level resource management
103. SaaS to Local + Cloud
104. Potential inconsistency during synchronization with the cloud
105. Execution time and allocated memory per function invocation
106. By automatically spawning and terminating stateless function instances in
response to events
[Link] persistence requires external services like databases or object stores
108. Cold start latency during function invocation
109. 15 minutes
110. Performance degradation and resource contention when multiple VMs share
the same physical server
111. Rapid Elasticity
112. Community Cloud
113. Handling large-scale heterogeneous geospatial datasets
114. High round-trip latency between devices and cloud servers
115. Higher bandwidth + Network slicing + Mobile edge computing
116. Massive Machine-Type Communications (mMTC)
117. Vehicles sharing information with road infrastructure like traffic lights and signals
118. Storage, processing, and analysis of sensor-generated data for decision-making
119. Improve traffic flow and transportation planning
120. cost-per-bit for data transmission

You might also like