SlideShare a Scribd company logo
1 of 5
Download to read offline
1.C
explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a
pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the
IT resource actually used, resulting in directly proportional costs. This gives an organization
access to IT resources without having to purchase its own, resulting in reduced investment
requirements
2.B
explanation
The availability of an IT resource is the probability that it will be accessible. The probability
value is generally expressed with a percentage representing the amount of time that the IT
resource is accessible during a given period. The percentage is calculated as follows: 1. Divide
the amount of hours the IT resource was unavailable (within a measured period) by the total
amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value
from 100
3.D
explanation;
Horizontal scaling refers to the allocation or releasing of resources of the same type. The
horizontal allocation of resources is referred to as scaling out and the horizontal releasing of
resources is referred to as scaling in. Horizontal scaling is a common form of scaling within
cloud environments
4.C
explanation;
Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud
consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally
need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its
organizational boundary to encompass the cloud.
5.C
explanation;
An organization will often have existing IT resources that are already paid for and operational.
The prior investment that has been made in these on-premise IT resources is referred to as sunk
costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs,
the up-front costs for on-premise IT resources is significantly lower. It can therefore be more
difficult to justify the leasing of cloud- based IT resources as an alternative
6.D
explanation
the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT
resources shared by multiple cloud consumers
7.D
explanation
all r correct
8.B
explanation
Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant
implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then
Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service
Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for
Cloud Service A. By spanning the failover system across both clouds, the overall reliability and
availability will be higher than the maximum reliability and availability of either cloud
9.C
explanation
Different physical and virtual IT resources are dynamically assigned and reassigned according to
cloud consumer demand, typically followed by execution through statistical multiplexing.
Resource pooling is commonly achieved through multitenancy technology, and therefore
encompassed by this multitenancy characteristic.
10.B
explanation
Cloud-based environments rely heavily on the use of system-level and custom service agents to
perform much of the runtime monitoring and measuring required to ensure that features, such as
elastic scaling and pay-for-use billing, can be carried out instantaneously.
11.C,D
explanation
Workload Prioritization – workloads are scheduled, queued, discarded, and distributed
workloads according to their priority levels
12.c
explanation
Cloud computing emerged from a combination of business drivers and technology innovations.
Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational
Agility Technology Innovations: Grid Computing Technology Clustering Technology
Virtualization Technology
13.C
14.A
15.c
16.b
17.
Solution
1.C
explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a
pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the
IT resource actually used, resulting in directly proportional costs. This gives an organization
access to IT resources without having to purchase its own, resulting in reduced investment
requirements
2.B
explanation
The availability of an IT resource is the probability that it will be accessible. The probability
value is generally expressed with a percentage representing the amount of time that the IT
resource is accessible during a given period. The percentage is calculated as follows: 1. Divide
the amount of hours the IT resource was unavailable (within a measured period) by the total
amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value
from 100
3.D
explanation;
Horizontal scaling refers to the allocation or releasing of resources of the same type. The
horizontal allocation of resources is referred to as scaling out and the horizontal releasing of
resources is referred to as scaling in. Horizontal scaling is a common form of scaling within
cloud environments
4.C
explanation;
Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud
consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally
need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its
organizational boundary to encompass the cloud.
5.C
explanation;
An organization will often have existing IT resources that are already paid for and operational.
The prior investment that has been made in these on-premise IT resources is referred to as sunk
costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs,
the up-front costs for on-premise IT resources is significantly lower. It can therefore be more
difficult to justify the leasing of cloud- based IT resources as an alternative
6.D
explanation
the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT
resources shared by multiple cloud consumers
7.D
explanation
all r correct
8.B
explanation
Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant
implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then
Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service
Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for
Cloud Service A. By spanning the failover system across both clouds, the overall reliability and
availability will be higher than the maximum reliability and availability of either cloud
9.C
explanation
Different physical and virtual IT resources are dynamically assigned and reassigned according to
cloud consumer demand, typically followed by execution through statistical multiplexing.
Resource pooling is commonly achieved through multitenancy technology, and therefore
encompassed by this multitenancy characteristic.
10.B
explanation
Cloud-based environments rely heavily on the use of system-level and custom service agents to
perform much of the runtime monitoring and measuring required to ensure that features, such as
elastic scaling and pay-for-use billing, can be carried out instantaneously.
11.C,D
explanation
Workload Prioritization – workloads are scheduled, queued, discarded, and distributed
workloads according to their priority levels
12.c
explanation
Cloud computing emerged from a combination of business drivers and technology innovations.
Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational
Agility Technology Innovations: Grid Computing Technology Clustering Technology
Virtualization Technology
13.C
14.A
15.c
16.b
17.

More Related Content

Similar to 1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf

Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
L1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptxL1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptxestabraqhm
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questionspiyushchawala
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing documentObul Naidu
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud ProviderSonali Parab
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningIOSR Journals
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingSean Teague
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingEditor IJCATR
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 

Similar to 1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
L1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptxL1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptx
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questions
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data Mining
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud Computing
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
E0332427
E0332427E0332427
E0332427
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 

More from akkhan101

1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdfakkhan101
 
What are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdfWhat are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdfakkhan101
 
The given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdfThe given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdfakkhan101
 
OrderTest.javapublic class OrderTest {       Get an arra.pdf
OrderTest.javapublic class OrderTest {         Get an arra.pdfOrderTest.javapublic class OrderTest {         Get an arra.pdf
OrderTest.javapublic class OrderTest {       Get an arra.pdfakkhan101
 
In the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdfIn the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdfakkhan101
 
Information privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdfInformation privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdfakkhan101
 
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdfH2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdfakkhan101
 
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdfGene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdfakkhan101
 
Four parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdfFour parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdfakkhan101
 
Each Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdfEach Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdfakkhan101
 
correctSolutioncorrect.pdf
correctSolutioncorrect.pdfcorrectSolutioncorrect.pdf
correctSolutioncorrect.pdfakkhan101
 
Code of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdfCode of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdfakkhan101
 
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdfBibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdfakkhan101
 
synthesis .pdf
                     synthesis                                      .pdf                     synthesis                                      .pdf
synthesis .pdfakkhan101
 
LiOH is a strong base so we assume it dissociates.pdf
                     LiOH is a strong base so we assume it dissociates.pdf                     LiOH is a strong base so we assume it dissociates.pdf
LiOH is a strong base so we assume it dissociates.pdfakkhan101
 
With Sp3d hybridization, a seesaw or linear shape.pdf
                     With Sp3d hybridization, a seesaw or linear shape.pdf                     With Sp3d hybridization, a seesaw or linear shape.pdf
With Sp3d hybridization, a seesaw or linear shape.pdfakkhan101
 
Two-photon transition probability .pdf
                     Two-photon transition probability                .pdf                     Two-photon transition probability                .pdf
Two-photon transition probability .pdfakkhan101
 
this is because Nitrogen has a lone pair and and .pdf
                     this is because Nitrogen has a lone pair and and .pdf                     this is because Nitrogen has a lone pair and and .pdf
this is because Nitrogen has a lone pair and and .pdfakkhan101
 
There is no easy way to remember the ionization l.pdf
                     There is no easy way to remember the ionization l.pdf                     There is no easy way to remember the ionization l.pdf
There is no easy way to remember the ionization l.pdfakkhan101
 
My opinion is to carry out in the complete absenc.pdf
                     My opinion is to carry out in the complete absenc.pdf                     My opinion is to carry out in the complete absenc.pdf
My opinion is to carry out in the complete absenc.pdfakkhan101
 

More from akkhan101 (20)

1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf
 
What are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdfWhat are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdf
 
The given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdfThe given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdf
 
OrderTest.javapublic class OrderTest {       Get an arra.pdf
OrderTest.javapublic class OrderTest {         Get an arra.pdfOrderTest.javapublic class OrderTest {         Get an arra.pdf
OrderTest.javapublic class OrderTest {       Get an arra.pdf
 
In the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdfIn the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdf
 
Information privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdfInformation privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdf
 
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdfH2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
 
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdfGene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
 
Four parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdfFour parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdf
 
Each Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdfEach Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdf
 
correctSolutioncorrect.pdf
correctSolutioncorrect.pdfcorrectSolutioncorrect.pdf
correctSolutioncorrect.pdf
 
Code of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdfCode of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdf
 
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdfBibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
 
synthesis .pdf
                     synthesis                                      .pdf                     synthesis                                      .pdf
synthesis .pdf
 
LiOH is a strong base so we assume it dissociates.pdf
                     LiOH is a strong base so we assume it dissociates.pdf                     LiOH is a strong base so we assume it dissociates.pdf
LiOH is a strong base so we assume it dissociates.pdf
 
With Sp3d hybridization, a seesaw or linear shape.pdf
                     With Sp3d hybridization, a seesaw or linear shape.pdf                     With Sp3d hybridization, a seesaw or linear shape.pdf
With Sp3d hybridization, a seesaw or linear shape.pdf
 
Two-photon transition probability .pdf
                     Two-photon transition probability                .pdf                     Two-photon transition probability                .pdf
Two-photon transition probability .pdf
 
this is because Nitrogen has a lone pair and and .pdf
                     this is because Nitrogen has a lone pair and and .pdf                     this is because Nitrogen has a lone pair and and .pdf
this is because Nitrogen has a lone pair and and .pdf
 
There is no easy way to remember the ionization l.pdf
                     There is no easy way to remember the ionization l.pdf                     There is no easy way to remember the ionization l.pdf
There is no easy way to remember the ionization l.pdf
 
My opinion is to carry out in the complete absenc.pdf
                     My opinion is to carry out in the complete absenc.pdf                     My opinion is to carry out in the complete absenc.pdf
My opinion is to carry out in the complete absenc.pdf
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf

  • 1. 1.C explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the IT resource actually used, resulting in directly proportional costs. This gives an organization access to IT resources without having to purchase its own, resulting in reduced investment requirements 2.B explanation The availability of an IT resource is the probability that it will be accessible. The probability value is generally expressed with a percentage representing the amount of time that the IT resource is accessible during a given period. The percentage is calculated as follows: 1. Divide the amount of hours the IT resource was unavailable (within a measured period) by the total amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value from 100 3.D explanation; Horizontal scaling refers to the allocation or releasing of resources of the same type. The horizontal allocation of resources is referred to as scaling out and the horizontal releasing of resources is referred to as scaling in. Horizontal scaling is a common form of scaling within cloud environments 4.C explanation; Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its organizational boundary to encompass the cloud. 5.C explanation; An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premise IT resources is referred to as sunk costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs, the up-front costs for on-premise IT resources is significantly lower. It can therefore be more difficult to justify the leasing of cloud- based IT resources as an alternative 6.D explanation
  • 2. the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT resources shared by multiple cloud consumers 7.D explanation all r correct 8.B explanation Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for Cloud Service A. By spanning the failover system across both clouds, the overall reliability and availability will be higher than the maximum reliability and availability of either cloud 9.C explanation Different physical and virtual IT resources are dynamically assigned and reassigned according to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and therefore encompassed by this multitenancy characteristic. 10.B explanation Cloud-based environments rely heavily on the use of system-level and custom service agents to perform much of the runtime monitoring and measuring required to ensure that features, such as elastic scaling and pay-for-use billing, can be carried out instantaneously. 11.C,D explanation Workload Prioritization – workloads are scheduled, queued, discarded, and distributed workloads according to their priority levels 12.c explanation Cloud computing emerged from a combination of business drivers and technology innovations. Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational Agility Technology Innovations: Grid Computing Technology Clustering Technology Virtualization Technology 13.C 14.A
  • 3. 15.c 16.b 17. Solution 1.C explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the IT resource actually used, resulting in directly proportional costs. This gives an organization access to IT resources without having to purchase its own, resulting in reduced investment requirements 2.B explanation The availability of an IT resource is the probability that it will be accessible. The probability value is generally expressed with a percentage representing the amount of time that the IT resource is accessible during a given period. The percentage is calculated as follows: 1. Divide the amount of hours the IT resource was unavailable (within a measured period) by the total amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value from 100 3.D explanation; Horizontal scaling refers to the allocation or releasing of resources of the same type. The horizontal allocation of resources is referred to as scaling out and the horizontal releasing of resources is referred to as scaling in. Horizontal scaling is a common form of scaling within cloud environments 4.C explanation; Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its organizational boundary to encompass the cloud. 5.C explanation; An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premise IT resources is referred to as sunk
  • 4. costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs, the up-front costs for on-premise IT resources is significantly lower. It can therefore be more difficult to justify the leasing of cloud- based IT resources as an alternative 6.D explanation the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT resources shared by multiple cloud consumers 7.D explanation all r correct 8.B explanation Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for Cloud Service A. By spanning the failover system across both clouds, the overall reliability and availability will be higher than the maximum reliability and availability of either cloud 9.C explanation Different physical and virtual IT resources are dynamically assigned and reassigned according to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and therefore encompassed by this multitenancy characteristic. 10.B explanation Cloud-based environments rely heavily on the use of system-level and custom service agents to perform much of the runtime monitoring and measuring required to ensure that features, such as elastic scaling and pay-for-use billing, can be carried out instantaneously. 11.C,D explanation Workload Prioritization – workloads are scheduled, queued, discarded, and distributed workloads according to their priority levels 12.c explanation Cloud computing emerged from a combination of business drivers and technology innovations.
  • 5. Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational Agility Technology Innovations: Grid Computing Technology Clustering Technology Virtualization Technology 13.C 14.A 15.c 16.b 17.