Chapter 4 Virtualization and Cloud Computing Key Terms Flashcards
virtualization
The process of creating an environment in which operating systems or applications run on a software-created simulation of a computer rather than
directly on the computer hardware itself.
IaaS
a type of cloud computing in which users can
lease cloud-based network services, servers, storage space, and other resources
SaaS
software programs that can be run from the cloud
without downloading an app.
PaaS
a cloud computing category designed for developing
and deploying apps.
public cloud computing
Use of cloud services provided over the public Internet.
private cloud computing
Use of a privately owned cloud that is accessible only to authorized users. More secure than public cloud services
hybrid cloud computing
A type of computing that shares characteristics of
private and public clouds. A hard disk drive with a small solid-state drive (SSD)
onboard is used to improve disk access time
community cloud computing
A type of cloud computing in which organizations
with common concerns or goals share cloud infrastructure
rapid elasticity
A characteristic of cloud computing referring to how quickly and
easily more or fewer cloud resources can be used or set aside as needed.
on-demand
A characteristic of cloud computing, in which users can purchase access to additional resources, as needed
resource pooling
A feature of cloud computing in which multiple clients share a
pool of hardware, software, and services.
virtual network interface card (NIC)
The network interface of a VM that accesses a hardware NIC to enable network communication for the VM.
hypervisor
The program running on a host machine that creates and manages
virtual machines. Most often refers to Type 1 virtualization, in which the hypervisor
connects directly with the hardware rather than running on top of the host’s OS.
virtual machine (VM)
A workspace created by a VMM or hypervisor that imitates a computer
authentication server
A server used to examine and verify or deny credentials of a user attempting to log into secured networks