_________ computing refers to applications and services that run on a distributed network using
virtualized resources.
 a) Distributed
 b) Cloud
 c) Soft
 d) Parallel
View Answer

1 Answer

Answer :

Cloud

Related questions

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : Point out the wrong statement. a) Cloud Computing has two distinct sets of models b) Amazonhas built a worldwide network of datacenters to service its search engine c) Azure enables .NET Framework applications to run over the Internet d) None of the mentioned

Last Answer : Amazon

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : _______ is a type of computing that performs computation, storage and even applications as a service across a network. (1) Cloud Computing (2) Distributed Computing (3) Parallel Computing (4) Virtual Computing

Last Answer : Cloud Computing 

Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service

Last Answer : Platform as a Service

Description : Point out the wrong statement. a) All applications benefit from deployment in the cloud b) With cloud computing, you can start very small and become big very fast c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary d) None of the mentioned View

Last Answer : All applications benefit from deployment in the cloud

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Internet consumes roughly 1 percent of the world's total power b) The cost advantages of cloud computing have enabled new software vendors to create ... resources without the need for interaction with cloud service provider personnel d) None of the mentioned

Last Answer : Internet consumes roughly 1 percent of the world’s total power

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description :  _________ is a cloud computing service model in which hardware is virtualized in the cloud. A. IaaS B. CaaS C. PaaS D. None of the mentioned

Last Answer : A. IaaS 

Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned

Last Answer : tenants

Description : _________ model consists of the particular types of services that you can access on a cloud computing platform. A. Service B. Planning C. Deployment D. Application

Last Answer : A. Service

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : The term ______ refers to a Network or Internet. A. Cloud Computing B. Cloud C. Computing D. CRM

Last Answer : Cloud

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : .In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. a) Virtual machine b) Virtual computing c) Virtual cloud d) Load balancer

Last Answer : Load balancer

Description : When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities? a) View data and error logs b) Analyze your network traffic c) View the application’s scheduled tasks d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : . ____________ refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective. A. Virtualization B. SOA C. Grid Computing D. Utility Computing Ans : C

Last Answer : . Grid Computing

Description : ____________is the delivery of on-demand computing services, from applications to storage and processing power, typically over the internet and on a pay-as-you-go basis. a) Cloud computing b) Cloud Infrastructure c) Distributed system d) None of these

Last Answer : Cloud computing

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : Which of the following is a message queue or transaction system for distributed Internet- based applications? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Simple Notification Service d) Amazon Simple Storage System

Last Answer : Amazon Simple Queue Service

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : .Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : The term '‘loud’ in cloud-computing refers to ______. A. The Internet B. Cumulus Clouds C. A ComputerD. Thin Clients

Last Answer : The Internet

Description : The term ‘Cloud’ in cloud-computing refers to ______.A. The Internet B. Cumulus Clouds C. A Computer D. Thin Clients

Last Answer : The Internet