SlideShare a Scribd company logo
1.C
explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a
pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the
IT resource actually used, resulting in directly proportional costs. This gives an organization
access to IT resources without having to purchase its own, resulting in reduced investment
requirements
2.B
explanation
The availability of an IT resource is the probability that it will be accessible. The probability
value is generally expressed with a percentage representing the amount of time that the IT
resource is accessible during a given period. The percentage is calculated as follows: 1. Divide
the amount of hours the IT resource was unavailable (within a measured period) by the total
amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value
from 100
3.D
explanation;
Horizontal scaling refers to the allocation or releasing of resources of the same type. The
horizontal allocation of resources is referred to as scaling out and the horizontal releasing of
resources is referred to as scaling in. Horizontal scaling is a common form of scaling within
cloud environments
4.C
explanation;
Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud
consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally
need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its
organizational boundary to encompass the cloud.
5.C
explanation;
An organization will often have existing IT resources that are already paid for and operational.
The prior investment that has been made in these on-premise IT resources is referred to as sunk
costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs,
the up-front costs for on-premise IT resources is significantly lower. It can therefore be more
difficult to justify the leasing of cloud- based IT resources as an alternative
6.D
explanation
the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT
resources shared by multiple cloud consumers
7.D
explanation
all r correct
8.B
explanation
Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant
implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then
Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service
Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for
Cloud Service A. By spanning the failover system across both clouds, the overall reliability and
availability will be higher than the maximum reliability and availability of either cloud
9.C
explanation
Different physical and virtual IT resources are dynamically assigned and reassigned according to
cloud consumer demand, typically followed by execution through statistical multiplexing.
Resource pooling is commonly achieved through multitenancy technology, and therefore
encompassed by this multitenancy characteristic.
10.B
explanation
Cloud-based environments rely heavily on the use of system-level and custom service agents to
perform much of the runtime monitoring and measuring required to ensure that features, such as
elastic scaling and pay-for-use billing, can be carried out instantaneously.
11.C,D
explanation
Workload Prioritization – workloads are scheduled, queued, discarded, and distributed
workloads according to their priority levels
12.c
explanation
Cloud computing emerged from a combination of business drivers and technology innovations.
Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational
Agility Technology Innovations: Grid Computing Technology Clustering Technology
Virtualization Technology
13.C
14.A
15.c
16.b
17.
Solution
1.C
explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a
pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the
IT resource actually used, resulting in directly proportional costs. This gives an organization
access to IT resources without having to purchase its own, resulting in reduced investment
requirements
2.B
explanation
The availability of an IT resource is the probability that it will be accessible. The probability
value is generally expressed with a percentage representing the amount of time that the IT
resource is accessible during a given period. The percentage is calculated as follows: 1. Divide
the amount of hours the IT resource was unavailable (within a measured period) by the total
amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value
from 100
3.D
explanation;
Horizontal scaling refers to the allocation or releasing of resources of the same type. The
horizontal allocation of resources is referred to as scaling out and the horizontal releasing of
resources is referred to as scaling in. Horizontal scaling is a common form of scaling within
cloud environments
4.C
explanation;
Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud
consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally
need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its
organizational boundary to encompass the cloud.
5.C
explanation;
An organization will often have existing IT resources that are already paid for and operational.
The prior investment that has been made in these on-premise IT resources is referred to as sunk
costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs,
the up-front costs for on-premise IT resources is significantly lower. It can therefore be more
difficult to justify the leasing of cloud- based IT resources as an alternative
6.D
explanation
the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT
resources shared by multiple cloud consumers
7.D
explanation
all r correct
8.B
explanation
Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant
implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then
Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service
Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for
Cloud Service A. By spanning the failover system across both clouds, the overall reliability and
availability will be higher than the maximum reliability and availability of either cloud
9.C
explanation
Different physical and virtual IT resources are dynamically assigned and reassigned according to
cloud consumer demand, typically followed by execution through statistical multiplexing.
Resource pooling is commonly achieved through multitenancy technology, and therefore
encompassed by this multitenancy characteristic.
10.B
explanation
Cloud-based environments rely heavily on the use of system-level and custom service agents to
perform much of the runtime monitoring and measuring required to ensure that features, such as
elastic scaling and pay-for-use billing, can be carried out instantaneously.
11.C,D
explanation
Workload Prioritization – workloads are scheduled, queued, discarded, and distributed
workloads according to their priority levels
12.c
explanation
Cloud computing emerged from a combination of business drivers and technology innovations.
Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational
Agility Technology Innovations: Grid Computing Technology Clustering Technology
Virtualization Technology
13.C
14.A
15.c
16.b
17.

More Related Content

Similar to 1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf

Cloud computing
Cloud computingCloud computing
Cloud computing
Misha Ali
 
L1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptxL1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptx
estabraqhm
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
ijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questions
piyushchawala
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
ijsrd.com
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
Obul Naidu
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
Sonali Parab
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data Mining
IOSR Journals
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud Computing
Sean Teague
 
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
tacticaltauji
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
Steven Wallach
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
E0332427
E0332427E0332427
E0332427
iosrjournals
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
Editor IJCATR
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
RuturajJadhav25
 

Similar to 1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
L1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptxL1- Introduction to cloud computing.pptx
L1- Introduction to cloud computing.pptx
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questions
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloudcomputing document
Cloudcomputing documentCloudcomputing document
Cloudcomputing document
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data Mining
 
The Economic Benefits of Cloud Computing
The Economic Benefits of Cloud ComputingThe Economic Benefits of Cloud Computing
The Economic Benefits of Cloud Computing
 
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
E0332427
E0332427E0332427
E0332427
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
 

More from akkhan101

1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf
akkhan101
 
What are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdfWhat are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdf
akkhan101
 
The given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdfThe given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdf
akkhan101
 
OrderTest.javapublic class OrderTest {       Get an arra.pdf
OrderTest.javapublic class OrderTest {         Get an arra.pdfOrderTest.javapublic class OrderTest {         Get an arra.pdf
OrderTest.javapublic class OrderTest {       Get an arra.pdf
akkhan101
 
In the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdfIn the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdf
akkhan101
 
Information privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdfInformation privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdf
akkhan101
 
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdfH2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
akkhan101
 
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdfGene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
akkhan101
 
Four parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdfFour parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdf
akkhan101
 
Each Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdfEach Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdf
akkhan101
 
correctSolutioncorrect.pdf
correctSolutioncorrect.pdfcorrectSolutioncorrect.pdf
correctSolutioncorrect.pdf
akkhan101
 
Code of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdfCode of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdf
akkhan101
 
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdfBibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
akkhan101
 
synthesis .pdf
                     synthesis                                      .pdf                     synthesis                                      .pdf
synthesis .pdf
akkhan101
 
LiOH is a strong base so we assume it dissociates.pdf
                     LiOH is a strong base so we assume it dissociates.pdf                     LiOH is a strong base so we assume it dissociates.pdf
LiOH is a strong base so we assume it dissociates.pdf
akkhan101
 
With Sp3d hybridization, a seesaw or linear shape.pdf
                     With Sp3d hybridization, a seesaw or linear shape.pdf                     With Sp3d hybridization, a seesaw or linear shape.pdf
With Sp3d hybridization, a seesaw or linear shape.pdf
akkhan101
 
Two-photon transition probability .pdf
                     Two-photon transition probability                .pdf                     Two-photon transition probability                .pdf
Two-photon transition probability .pdf
akkhan101
 
this is because Nitrogen has a lone pair and and .pdf
                     this is because Nitrogen has a lone pair and and .pdf                     this is because Nitrogen has a lone pair and and .pdf
this is because Nitrogen has a lone pair and and .pdf
akkhan101
 
There is no easy way to remember the ionization l.pdf
                     There is no easy way to remember the ionization l.pdf                     There is no easy way to remember the ionization l.pdf
There is no easy way to remember the ionization l.pdf
akkhan101
 
My opinion is to carry out in the complete absenc.pdf
                     My opinion is to carry out in the complete absenc.pdf                     My opinion is to carry out in the complete absenc.pdf
My opinion is to carry out in the complete absenc.pdf
akkhan101
 

More from akkhan101 (20)

1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf1) WBC count is high and this level indicates that the person has le.pdf
1) WBC count is high and this level indicates that the person has le.pdf
 
What are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdfWhat are the four steps of a process involving a heterogeneous catal.pdf
What are the four steps of a process involving a heterogeneous catal.pdf
 
The given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdfThe given function is-Strictly increasing from 2 to infinityHen.pdf
The given function is-Strictly increasing from 2 to infinityHen.pdf
 
OrderTest.javapublic class OrderTest {       Get an arra.pdf
OrderTest.javapublic class OrderTest {         Get an arra.pdfOrderTest.javapublic class OrderTest {         Get an arra.pdf
OrderTest.javapublic class OrderTest {       Get an arra.pdf
 
In the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdfIn the span of several decades, the Kingdom Protista has been disass.pdf
In the span of several decades, the Kingdom Protista has been disass.pdf
 
Information privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdfInformation privacy It refers to the collection of data and disse.pdf
Information privacy It refers to the collection of data and disse.pdf
 
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdfH2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
H2SO4 --- 2H+ + SO42-1 mole of H2SO4 produces 2 moles of H+ ions.pdf
 
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdfGene editing of somatic cellsThere are grave concerns regarding th.pdf
Gene editing of somatic cellsThere are grave concerns regarding th.pdf
 
Four parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdfFour parts of compare and contrastSolutionFour parts of compar.pdf
Four parts of compare and contrastSolutionFour parts of compar.pdf
 
Each Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdfEach Restriction enzymes has a unique restriction site and therefore.pdf
Each Restriction enzymes has a unique restriction site and therefore.pdf
 
correctSolutioncorrect.pdf
correctSolutioncorrect.pdfcorrectSolutioncorrect.pdf
correctSolutioncorrect.pdf
 
Code of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdfCode of main classpublic class LBmain {    public static void m.pdf
Code of main classpublic class LBmain {    public static void m.pdf
 
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdfBibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
BibliographyHall, J. E. (2015). Guyton and Hall textbook of medic.pdf
 
synthesis .pdf
                     synthesis                                      .pdf                     synthesis                                      .pdf
synthesis .pdf
 
LiOH is a strong base so we assume it dissociates.pdf
                     LiOH is a strong base so we assume it dissociates.pdf                     LiOH is a strong base so we assume it dissociates.pdf
LiOH is a strong base so we assume it dissociates.pdf
 
With Sp3d hybridization, a seesaw or linear shape.pdf
                     With Sp3d hybridization, a seesaw or linear shape.pdf                     With Sp3d hybridization, a seesaw or linear shape.pdf
With Sp3d hybridization, a seesaw or linear shape.pdf
 
Two-photon transition probability .pdf
                     Two-photon transition probability                .pdf                     Two-photon transition probability                .pdf
Two-photon transition probability .pdf
 
this is because Nitrogen has a lone pair and and .pdf
                     this is because Nitrogen has a lone pair and and .pdf                     this is because Nitrogen has a lone pair and and .pdf
this is because Nitrogen has a lone pair and and .pdf
 
There is no easy way to remember the ionization l.pdf
                     There is no easy way to remember the ionization l.pdf                     There is no easy way to remember the ionization l.pdf
There is no easy way to remember the ionization l.pdf
 
My opinion is to carry out in the complete absenc.pdf
                     My opinion is to carry out in the complete absenc.pdf                     My opinion is to carry out in the complete absenc.pdf
My opinion is to carry out in the complete absenc.pdf
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

1.Cexplanation; Cloud consumers that use cloud-based IT resources .pdf

  • 1. 1.C explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the IT resource actually used, resulting in directly proportional costs. This gives an organization access to IT resources without having to purchase its own, resulting in reduced investment requirements 2.B explanation The availability of an IT resource is the probability that it will be accessible. The probability value is generally expressed with a percentage representing the amount of time that the IT resource is accessible during a given period. The percentage is calculated as follows: 1. Divide the amount of hours the IT resource was unavailable (within a measured period) by the total amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value from 100 3.D explanation; Horizontal scaling refers to the allocation or releasing of resources of the same type. The horizontal allocation of resources is referred to as scaling out and the horizontal releasing of resources is referred to as scaling in. Horizontal scaling is a common form of scaling within cloud environments 4.C explanation; Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its organizational boundary to encompass the cloud. 5.C explanation; An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premise IT resources is referred to as sunk costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs, the up-front costs for on-premise IT resources is significantly lower. It can therefore be more difficult to justify the leasing of cloud- based IT resources as an alternative 6.D explanation
  • 2. the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT resources shared by multiple cloud consumers 7.D explanation all r correct 8.B explanation Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for Cloud Service A. By spanning the failover system across both clouds, the overall reliability and availability will be higher than the maximum reliability and availability of either cloud 9.C explanation Different physical and virtual IT resources are dynamically assigned and reassigned according to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and therefore encompassed by this multitenancy characteristic. 10.B explanation Cloud-based environments rely heavily on the use of system-level and custom service agents to perform much of the runtime monitoring and measuring required to ensure that features, such as elastic scaling and pay-for-use billing, can be carried out instantaneously. 11.C,D explanation Workload Prioritization – workloads are scheduled, queued, discarded, and distributed workloads according to their priority levels 12.c explanation Cloud computing emerged from a combination of business drivers and technology innovations. Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational Agility Technology Innovations: Grid Computing Technology Clustering Technology Virtualization Technology 13.C 14.A
  • 3. 15.c 16.b 17. Solution 1.C explanation; Cloud consumers that use cloud-based IT resources can generally lease them with a pay-for-use model. With this model, cloud consumers pay a usage fee for only the amount of the IT resource actually used, resulting in directly proportional costs. This gives an organization access to IT resources without having to purchase its own, resulting in reduced investment requirements 2.B explanation The availability of an IT resource is the probability that it will be accessible. The probability value is generally expressed with a percentage representing the amount of time that the IT resource is accessible during a given period. The percentage is calculated as follows: 1. Divide the amount of hours the IT resource was unavailable (within a measured period) by the total amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value from 100 3.D explanation; Horizontal scaling refers to the allocation or releasing of resources of the same type. The horizontal allocation of resources is referred to as scaling out and the horizontal releasing of resources is referred to as scaling in. Horizontal scaling is a common form of scaling within cloud environments 4.C explanation; Cloud-based IT resources that are used by a cloud consumer reside outside of the cloud consumer’s organizational boundary. To use the IT resources, the cloud consumer will generally need to trust them. As a result, the cloud consumer’s trust boundary is expanded beyond its organizational boundary to encompass the cloud. 5.C explanation; An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premise IT resources is referred to as sunk
  • 4. costs. When comparing cloud-based IT resources to on-premise IT resources with sunk costs, the up-front costs for on-premise IT resources is significantly lower. It can therefore be more difficult to justify the leasing of cloud- based IT resources as an alternative 6.D explanation the fact that trust boundaries overlap can lead to opportunities for an attacker to attack IT resources shared by multiple cloud consumers 7.D explanation all r correct 8.B explanation Cloud A provides Cloud Service A as part of a failover system that encompasses a redundant implementation of Cloud Service A on Cloud B. If Cloud Service A on Cloud A fails, then Cloud Service A on Cloud B is automatically provisioned transparently to Cloud Service Consumer A. Each cloud has a specific level of reliability and availability that it guarantees for Cloud Service A. By spanning the failover system across both clouds, the overall reliability and availability will be higher than the maximum reliability and availability of either cloud 9.C explanation Different physical and virtual IT resources are dynamically assigned and reassigned according to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and therefore encompassed by this multitenancy characteristic. 10.B explanation Cloud-based environments rely heavily on the use of system-level and custom service agents to perform much of the runtime monitoring and measuring required to ensure that features, such as elastic scaling and pay-for-use billing, can be carried out instantaneously. 11.C,D explanation Workload Prioritization – workloads are scheduled, queued, discarded, and distributed workloads according to their priority levels 12.c explanation Cloud computing emerged from a combination of business drivers and technology innovations.
  • 5. Business drivers: Capacity Planning Cost reduction and Operating Overhead Organizational Agility Technology Innovations: Grid Computing Technology Clustering Technology Virtualization Technology 13.C 14.A 15.c 16.b 17.