Cloud Computing terminology Flashcards

1
Q

What is cloud computing?

A

: Cloud computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cloud service provider?

A

A cloud service provider is a company that offers cloud computing services to businesses and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SaaS?

A

SaaS, or software as a service, is a model of cloud computing where software applications are delivered over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is IaaS?

A

IaaS, or infrastructure as a service, is a model of cloud computing where businesses can rent IT infrastructure, such as servers and storage, from a cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PaaS?

A

PaaS, or platform as a service, is a model of cloud computing where businesses can rent a cloud platform for developing, running, and managing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is virtualization?

A

Virtualization is a technique for creating multiple virtual versions of a physical resource, such as a server, storage device, or operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a virtual machine?

A

A virtual machine is a software emulation of a physical computer that can run its own operating system and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

: What is a container?

A

A container is a lightweight and portable software package that contains an application and all its dependencies, enabling it to run consistently across different computing environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

: What is multi-tenancy?

A

Multi-tenancy is a model of cloud computing where a single instance of a software application serves multiple customers, or tenants, using a shared infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hybrid cloud?

A

Hybrid cloud is a model of cloud computing that combines public and private cloud services, allowing businesses to run applications and services across different computing environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Storage

A

A service model in which data is remotely maintained, managed, and backed up on a cloud storage server accessible through the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Cloud Storage

A

A cloud storage service provided by a third-party cloud storage provider that is accessible over the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Private Cloud Storage

A

A cloud storage service provided within an organization’s own network or a private data center, offering better security and control over the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hybrid Cloud Storage

A

A combination of public and private cloud storage services that offer greater flexibility in managing and storing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

: Object Storage

A

A type of cloud storage that stores data as objects, typically using a unique identifier or key, enabling easier retrieval and management of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block Storage

A

A type of cloud storage that divides data into blocks, which can be individually managed and accessed, providing greater control over the data.

17
Q

Cloud Networking

A

A service model that allows organizations to utilize the cloud for networking capabilities, such as routing, switching, and virtual private network (VPN) connectivity.

18
Q

Virtual Private Network (VPN)

A

A secure, encrypted connection between two or more networks over the internet, providing remote access to resources on the network.

19
Q

Software-Defined Networking (SDN)

A

A networking architecture that separates the control plane from the data plane, allowing for centralized control of network functions and greater flexibility in managing network resources.

20
Q

Load Balancing

A

A technique used to distribute network traffic across multiple servers or network resources, improving network efficiency and availability.

21
Q

Domain Name System (DNS)

A

A system that translates domain names into IP addresses, allowing computers to locate resources on the internet.

22
Q

Remote Desktop Protocol (RDP)

A

A protocol that allows a user to remotely connect to and control a computer or server over the internet.

23
Q

Secure Shell (SSH)

A

A cryptographic network protocol used to secure network communications over an unsecured network, such as the internet.

24
Q

Redundancy

A

The use of multiple resources to ensure system availability and faster recovery in case of a failure, with minimal or no data loss.

25
Q

High Availability

A

The ability of a system to recover quickly and without significant impact on its performance or data integrity in case of a failure.

26
Q

Disaster Recovery

A

The process of recovering from a catastrophic event or disruption, often involving a predefined plan to minimize downtime and data loss.

27
Q

Recovery Objectives

A

The goals, metrics, and plans used to measure the effectiveness of a disaster recovery method, including recovery time objectives (RTOs) and recovery point objectives (RPOs).

28
Q

Network Latency

A

The delay or lag in data transmission over a network, often measured in milliseconds (ms) and impacted by distance, congestion, and network quality.

29
Q

Bandwidth

A

The maximum amount of data that can be transmitted over a network in a given period, often measured in bits per second (bps) or megabits per second (Mbps).

30
Q

Network Security

A

The practices and technologies used to protect a network from unauthorized access, attacks, and data breaches, including firewalls, encryption, and authentication protocols.