0% found this document useful (0 votes)
38 views5 pages

Cloud Exercise Questions

The document consists of a multiple-choice questionnaire focused on cloud computing, virtualization, and related technologies. It covers various topics including definitions, characteristics, advantages, and types of cloud services, as well as questions on memory virtualization and security. Additionally, it prompts for explanations and advantages of cloud computing and virtualization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views5 pages

Cloud Exercise Questions

The document consists of a multiple-choice questionnaire focused on cloud computing, virtualization, and related technologies. It covers various topics including definitions, characteristics, advantages, and types of cloud services, as well as questions on memory virtualization and security. Additionally, it prompts for explanations and advantages of cloud computing and virtualization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

A.

MULTIPLE CHOICE
Choose one of the most appropriate answers by marking an X on the letter a, b, c, d, or e.
on the answer sheet provided!
1. The use of computer technology for Internet-based development with complete software and
the operating system is also available online, called?
a. Distributed Computing d. Central Computing
b. Cloud Computing e. Parallel Computing
c. Creative Computing
2. The conditions of Cloud Computing services are: Services are fully managed by the provider.
needed by users is a computer supported by...
a. Internet Network d. Hardware Cloud
b. Cloud Services e. Maintenance
c. Software Cloud
3. Characteristics of Cloud Computing Services: A computing concept where users only pay for what they
Does it include characteristics?
a. Grid Computing d. Utility Computing
b. Cloud Application e. Cloud Platform
c. Cloud Storage
4. Which of the following is not a computing activity?
a. Software programming d. Information management with computers
b. Scientific research using computers e. Artificial Intelligence Programming
c. Create limited communication and media
5. Enables computers to communicate with other computers located elsewhere in the world.
is a creation of:
a. Internet d. Extranet
b. Intranet e. Distributed System
c. Grid Computing
6. Every activity that is goal-oriented that requires, benefits from, or creates a computer
referred to as:
a. Utility d. Cluster
b. Grid e. Computing
c. Cloud
7. A computer system in which several interconnected computers share computing tasks.
the one given to the system is called:
a. Cluster Computing d. Grid Computing
b. Cloud Computing e. Distributed Computing
c. Computing System
8. A parallel and distributed system consisting of a collection of standalone computers that interact with each other.
connected partners as data sources are called:
a. Cluster Computing d. Computing System
b. Distributed Computing e. Cloud Computing
c. Grid Computing

9. Memory that can be accessed by multiple processes simultaneously by providing communication or


a. Central Computing d. Distributed Computing
b. Cloud Computing e. Parallel Computing
c. Sequential
11. Which of the following is not a property and characteristic of Cloud Computing?
a. High scalability and elasticity d. High availability and reliability
b.Top management and interoperability e. High accessibility and portability
c. High power and efficiency
12. Service is the endpoint of a connection. Which of the following is a function of Cloud services?
Computing?
a. Services are well-defined and independent d. Services must depend on context
b. Services do not need to be well defined e. Services are provided according to Working Hours

c. Services should be provided more


Clients can dynamically scale up or down infrastructure resources as needed.
is a tangible form of the concept...
a. Dimencity d. Scalability & Elasticity
b. Divercity e. Dimencity
c. Unity
14. Which of the following is not a benefit of Cloud Computing?
a. Data can be stored centrally on the server d. Data security is more assured
b. High flexibility and scalability e. Investment
c. Strength and Completeness of Hardware
A user need not worry about having to replace or update the version of the program
that they use, because this system can perform automatic renewal or replacement system
a version of the program that does not require input from the user is an advantage of the Cloud
Computing in terms of:
a. Highly Automated d. Increase Storage
b. Reduce Cost e. Flexibility
c. More Mobility
16. Cloud computing is not yet fully supported by regulations set by the government. Like
the banking situation. Banks are required to have a server that is placed in the bank's owned area.
includes Factors of Success in the Implementation of Cloud Computing in the field:
a. Security d. Performance
b. Government Compliance e. Finance
c. Internet network issues
17. We must ask whether our data is completely ours when we have saved that data.
In the Cloud, because data can fully become shared ownership, this is a challenge of the Cloud.
Computing in terms of:
a. Service Level d. Privacy
b. Compliance e. Data Ownership
c. Data Mobility
18. According to the National Institute of Standards and Technology abbreviated as NIST, which is a
According to the United States Department of Commerce, there are 5 main characteristics of cloud computing.
Which of the following is not a main characteristic of cloud computing...
a. On demand self service d. Rapid Rigidity
b. Resource pooling e. Measured service
c. Broad network access

19. The main character in cloud computing systems that allows users to choose and order,
therefore, the management of services or features in the cloud according to needs is a characteristic of ...
21. Cloud computing services consist of a collection of computing resources that can be shared.
for customers. This service is usually multi-tenant / many users sharing resources.
computation collaboratively, is a characteristic of...
a. On demand self service d. Rapid elasticity
b. Resource pooling e. Measured service
c. Broad network access
22. A service from Cloud Computing where customers can use the provided software.
by Cloud Provider is a characteristic of...
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
23. There is no need to purchase physical computers, which saves costs. The configuration of virtual computers also
It can be modified as needed. For example, when the storage is almost full, the storage can be increased immediately.
is an advantage of cloud computing with services..
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
24. Developers can focus on the applications they create without worrying about maintenance.
computing platform. It is one of the advantages of cloud computing with services...
a. SaaS d. WaaS
b. PaaS e. EaaS
c. IaaS
25. Below is one example of a service from PaaS (Platform as a Service) which is..
a. iCloud d. MiCloud
b. Office365 e. Amazon Web Service (AWS)
c. Amazon EC2
26. Which of the following is not an example of a service from SaaS is..
Amazon Web Services (AWS) d. Microsoft Outlook
b. Google+ e. Adobe Creative Cloud
c. Office365
27. Which are the types of cloud computing services are...
a. Yahoo d. IaaS, PaaS, SaaS
b. Yandex e. Webmaster
c. Bing
28. The next advantage of cloud security is allowing users to reset connections or
access is granted when changes occur in the local network. Automatically, the previous network that has ever
will be blocked by the system so that user data can no longer be accessed through that route,
is one of the advantages of cloud security based on the understanding....
a. Can be adjusted to the local network d. Susceptible to data theft
b. Supported by data backup features e. Cloud security is very expensive
c. Data security optimization

29. Cloud security is used to store and protect national secret data and archives that must not be disclosed.
known to the public. Of course, the security system implemented in this field is very strict, it is
the implementation of cloud security in the field...
a. Government and national security d. Economy
a. Combination of hardware and software d. Physical hardware and other emulations
b. Catalyst e. Emulator
c. software or other programs
32. An emulator that implements only one instruction at a time is called:
a. Static binary translation d. Dynamic binary translation
b. Design challenges e. Register mapping
c. Interpretation
33. Which of the following is not a goal of Memory Virtualization?
a. Address translation d. Memory protection
b. Choosing the most efficient one e. Establishing access rights
c. Access attribute
34. A computer component that is responsible for handling access to memory requested by the CPU.
called..
a. MMU d. PTBR
b. TLB e. VMM
c. EPT
35. In every memory access operation, the EPT MMU will directly obtain the guest's physical address from the page.
the guest table, and then obtain the physical address from the host by VMM with the mapping table as follows:
a. Virtual d. Otomtais
b. Parallel e. Manual
c. Series
36. A virtualization technique separates physical resources from the virtual environment, standing on top of a
operating system or can be installed directly to hardware by taking physical resources and
dividing it so that the virtual environment can use it is called...
a. Supervisor d. Resistor
b. Advisor e. Hypervisor
c. Submissive
37. With virtualization, the amount of hardware needed can be drastically reduced. Energy savings that
Virtualization adoption includes eliminating the need to build multiple power plants.
Based on the above statement, virtualization can also be categorized as...
a. Green technology ( eco friendly ) d. Bad Sector
b. Bad technology e. A system that is difficult to use
c. Not environmentally friendly
At this time, the majority of virtualization in the world is server virtualization, there are three types of virtualization.
server, a type that represents the computer hardware environment in software, thus one computer
can be installed multiple operating systems are..
a. Paravirtualization d. Software Emulation
b. Container e. Pravirtualization
c. Hardware emulation

39. The type of virtualization that creates an independent representation of an existing operating system to be able to make
applications in certain environments are called...
a. Paravirtualization d. Software emulation
b. Container e. Privatization
Answer the questions below correctly!

Infrastructure as a Service

Mention the advantages of cloud computing!

3. Explain what is meant by virtualization!

4. Explain why virtualization is widely used!

5. Mention 5 stages that need to be taken to start virtualization!

You might also like