What do you mean by cloud in cloud computing?
A. Data exchanged among grid nodes.
B. Provides tools to monitor and distribute the number of licenses.
C. Provides logical view of data.
D. Set of hardware, software, network, storage, services and interfaces.

1 Answer

Answer :

Set of hardware, software, network, storage, services and interfaces.

Related questions

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : _________ computing refers to applications and services that run on a distributed network using virtualized resources. a) Distributed b) Cloud c) Soft d) Parallel View Answer

Last Answer : Cloud

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : What is cloud computing replacing? a) Corporate data centers b) Expensive personal computer hardware c) Expensive software upgrades d) All of the above

Last Answer : All of the above

Description : Amazon Web Services is which type of cloud computing distribution model? A. Software as a service B. Platform as a service C. Infrastructure as a service D. Storage as Service

Last Answer : Infrastructure as a service

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : What facet of cloud computing helps to guard against downtime and determines costs? A. Service-level agreements B. Application programming interfaces C. Virtual private networks D. Bandwidth fees

Last Answer : Service-level agreements

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities? a) View data and error logs b) Analyze your network traffic c) View the application’s scheduled tasks d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of these companies specializes in cloud computing management tools and services?A. RightScale B. Google C. Salesforce.com D. Savis

Last Answer : RightScale

Description : Which of these companies specializes in cloud computing management tools and services? A. RightScale B. Google C. Salesforce.com D. Savis

Last Answer : RightScale

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : Which of these is not a major type of cloud computing usage? A. Hardware as a Service B. Platform as a Service C. Software as a Service D. Infrastructure as a Service

Last Answer : Hardware as a Service

Description : Which of these is not a major type of cloud computing usage? A. Hardware as a Service B. Platform as a Service C. Software as a Service D. Infrastructure as a Service

Last Answer : Hardware as a Service

Description : Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? a) CAS b) CSA c) SAC d) All of the mentioned

Last Answer : CSA

Description : What exactly is cloud computing? a) A way to organize desktop computers b) Lightweight software that takes up little space on a hardware c) Computing resources that can be accessed on demand, like electricity from a utility d) The World Wide Web

Last Answer : Computing resources that can be accessed on demand, like electricity from a utility

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud

Description : The _______________ provides static resources and has been used in grid computing for many years. a) event driven method b) popularity-driven method c) demand-driven method d) access driven method

Last Answer : demand-driven method

Description : Cloud computing architecture is a combination of? A. service-oriented architecture and grid computing B. utility computing and event-driven architecture. C. service-oriented architecture and event-driven architecture. D. virtualization and event-driven architecture.

Last Answer : service-oriented architecture and event-driven architecture.

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : D. All of the above

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : All of the above

Description : .Which technology allows use of read/write web, blogs & interactive web application etc. ? a) Mobile Computing b) Grid Computing c) Cloud Computing d) Web 2.0

Last Answer : Web 2.0

Description : Which of the following are correct technologies working behind the cloud computing platforms? a) Virtualization b) SOA c) Grid Computing d) All of the above

Last Answer : ) All of the above

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : _______ allows servers and storage devices to increasingly share and utilize applications by easy migration from one server to another a) Grid Computing b) Artificial Intelligence c) Virtualization d) Web 3.0

Last Answer : Virtualization

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : How Cloud Federation provides benefits to Cloud providers? a) allows providers to earn revenue from computing resources that would otherwise be idle or underutilized b) enables cloud providers to expand their ... -level agreements (SLAs) into their partner provider's data centers. d) All the above

Last Answer : All the above

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Managed IT services are based on the concept of? A. Virtualization B. SOA C. Grid Computing D. Utility Computing

Last Answer : Utility Computing

Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level

Last Answer : Infrastructure Level

Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing

Last Answer : Virtualization

Description : Amazon Web Services is which type of cloud computing distribution model? A. Software as a Service B. Platform as a Service C. Infrastructure as a Service

Last Answer : Infrastructure as a Service

Description : Amazon Web Services is which type of cloud computing distribution model? A. Software as a Service (SAAS) B. Platform as a Service (PAAS) C. Infrastructure as a Service (IAAS)

Last Answer : Infrastructure as a Service (IAAS)

Description : Amazon Web Services is which type of cloud computing distribution model? A. Software as a Service B. Platform as a Service C. Infrastructure as a Service

Last Answer : Infrastructure as a Service

Description : _________ is a service that creates and manages virtual network interfaces. a) VMware vStorage b) VMware vNetwork c) VMware vCompute d) Application services

Last Answer : VMware vNetwork

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses