Cloud Exercise Questions
Cloud Exercise Questions
MULTIPLE CHOICE
Choose one of the most appropriate answers by marking an X on the letter a, b, c, d, or e.
on the answer sheet provided!
1. The use of computer technology for Internet-based development with complete software and
the operating system is also available online, called?
a. Distributed Computing d. Central Computing
b. Cloud Computing e. Parallel Computing
c. Creative Computing
2. The conditions of Cloud Computing services are: Services are fully managed by the provider.
needed by users is a computer supported by...
a. Internet Network d. Hardware Cloud
b. Cloud Services e. Maintenance
c. Software Cloud
3. Characteristics of Cloud Computing Services: A computing concept where users only pay for what they
Does it include characteristics?
a. Grid Computing d. Utility Computing
b. Cloud Application e. Cloud Platform
c. Cloud Storage
4. Which of the following is not a computing activity?
a. Software programming d. Information management with computers
b. Scientific research using computers e. Artificial Intelligence Programming
c. Create limited communication and media
5. Enables computers to communicate with other computers located elsewhere in the world.
is a creation of:
a. Internet d. Extranet
b. Intranet e. Distributed System
c. Grid Computing
6. Every activity that is goal-oriented that requires, benefits from, or creates a computer
referred to as:
a. Utility d. Cluster
b. Grid e. Computing
c. Cloud
7. A computer system in which several interconnected computers share computing tasks.
the one given to the system is called:
a. Cluster Computing d. Grid Computing
b. Cloud Computing e. Distributed Computing
c. Computing System
8. A parallel and distributed system consisting of a collection of standalone computers that interact with each other.
connected partners as data sources are called:
a. Cluster Computing d. Computing System
b. Distributed Computing e. Cloud Computing
c. Grid Computing
19. The main character in cloud computing systems that allows users to choose and order,
therefore, the management of services or features in the cloud according to needs is a characteristic of ...
21. Cloud computing services consist of a collection of computing resources that can be shared.
for customers. This service is usually multi-tenant / many users sharing resources.
computation collaboratively, is a characteristic of...
a. On demand self service d. Rapid elasticity
b. Resource pooling e. Measured service
c. Broad network access
22. A service from Cloud Computing where customers can use the provided software.
by Cloud Provider is a characteristic of...
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
23. There is no need to purchase physical computers, which saves costs. The configuration of virtual computers also
It can be modified as needed. For example, when the storage is almost full, the storage can be increased immediately.
is an advantage of cloud computing with services..
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
24. Developers can focus on the applications they create without worrying about maintenance.
computing platform. It is one of the advantages of cloud computing with services...
a. SaaS d. WaaS
b. PaaS e. EaaS
c. IaaS
25. Below is one example of a service from PaaS (Platform as a Service) which is..
a. iCloud d. MiCloud
b. Office365 e. Amazon Web Service (AWS)
c. Amazon EC2
26. Which of the following is not an example of a service from SaaS is..
Amazon Web Services (AWS) d. Microsoft Outlook
b. Google+ e. Adobe Creative Cloud
c. Office365
27. Which are the types of cloud computing services are...
a. Yahoo d. IaaS, PaaS, SaaS
b. Yandex e. Webmaster
c. Bing
28. The next advantage of cloud security is allowing users to reset connections or
access is granted when changes occur in the local network. Automatically, the previous network that has ever
will be blocked by the system so that user data can no longer be accessed through that route,
is one of the advantages of cloud security based on the understanding....
a. Can be adjusted to the local network d. Susceptible to data theft
b. Supported by data backup features e. Cloud security is very expensive
c. Data security optimization
29. Cloud security is used to store and protect national secret data and archives that must not be disclosed.
known to the public. Of course, the security system implemented in this field is very strict, it is
the implementation of cloud security in the field...
a. Government and national security d. Economy
a. Combination of hardware and software d. Physical hardware and other emulations
b. Catalyst e. Emulator
c. software or other programs
32. An emulator that implements only one instruction at a time is called:
a. Static binary translation d. Dynamic binary translation
b. Design challenges e. Register mapping
c. Interpretation
33. Which of the following is not a goal of Memory Virtualization?
a. Address translation d. Memory protection
b. Choosing the most efficient one e. Establishing access rights
c. Access attribute
34. A computer component that is responsible for handling access to memory requested by the CPU.
called..
a. MMU d. PTBR
b. TLB e. VMM
c. EPT
35. In every memory access operation, the EPT MMU will directly obtain the guest's physical address from the page.
the guest table, and then obtain the physical address from the host by VMM with the mapping table as follows:
a. Virtual d. Otomtais
b. Parallel e. Manual
c. Series
36. A virtualization technique separates physical resources from the virtual environment, standing on top of a
operating system or can be installed directly to hardware by taking physical resources and
dividing it so that the virtual environment can use it is called...
a. Supervisor d. Resistor
b. Advisor e. Hypervisor
c. Submissive
37. With virtualization, the amount of hardware needed can be drastically reduced. Energy savings that
Virtualization adoption includes eliminating the need to build multiple power plants.
Based on the above statement, virtualization can also be categorized as...
a. Green technology ( eco friendly ) d. Bad Sector
b. Bad technology e. A system that is difficult to use
c. Not environmentally friendly
At this time, the majority of virtualization in the world is server virtualization, there are three types of virtualization.
server, a type that represents the computer hardware environment in software, thus one computer
can be installed multiple operating systems are..
a. Paravirtualization d. Software Emulation
b. Container e. Pravirtualization
c. Hardware emulation
39. The type of virtualization that creates an independent representation of an existing operating system to be able to make
applications in certain environments are called...
a. Paravirtualization d. Software emulation
b. Container e. Privatization
Answer the questions below correctly!
Infrastructure as a Service