You are on page 1of 2

Cloud +

Study online at quizlet.com/_8l3y4j

1. Application is an interface that allows the user to access 13. Direct This is a traditional method of grouping
Programming information from another service and Attached storage devices together for large SCSI disk
Interface integrate this service into their own Storage arrays directly connected to one or more
(API) application. (D.A.S.) servers.
2. Asymmetric is the process of using a public key from a 14. enterprise is an application (or software) that is intended
Encryption public/private key pair to encrypt plaintext, application for large scale use by a (large) business.
and then using the corresponding private key
15. Enterprise software allows a business or organization to
to decrypt the cipher text.
Resource manage a suite of integrated applications
3. Backend as a is a model of cloud computing in which the Planning which are used to collect, manage, and store
service (BaaS) vendor provides web and mobile application (ERP) data on a variety of business activities. ERP
/ mobile developers with tools and services to create solutions are often offered as a service.
backend as a a cloud backend for their applications.
16. Extensibility The ability of a cloud solution to add new
service
runtime and framework support via
(mBaaS)
community buildpacks.
4. BCP Basic Continuity Planning
17. Federated A system in which multiple databases appear
5. Bus Network is a network topology in which nodes are Database to function as a single entity.
directly connected to a common half-duplex
18. Google is a comprehensive cloud platform offered
link called a bus.
Cloud by Google, Inc. that consists of both
6. cloud is a product that gives the user integrated Platform infrastructure as a service (IaaS) and platform
management management of public, private, and hybrid (GCP) as a service (PaaS) offerings.
platform cloud environments.
19. Host Bus is a device that connects multiple peripheral
(CMP)
Adapter devices with a computer.
7. Cloud Native Applications developed specifically for (HBA)
cloud platforms.
20. hypervisor or is a piece of software that allows physical
8. Cloud Service is a company that offers a cloud computing virtual devices to share their resources among
Provider service, such as PaaS, IaaS, or SaaS, to machine virtual machines (VMs) running on top of that
(CSP) individuals or other businesses. monitor physical hardware. The hypervisor creates,
(VMM) runs and manages VMs.
9. Cloud is a deceptive marketing technique used to
washing rebrand old products by connecting them to 21. Infrastructure is a model of cloud computing in which the
the cloud, or at least to the term cloud. as a Service vendor hosts virtualized computing
(IaaS) resources, as well as network and storage
10. CMDB is used to keep track of the state of assets
resources, and provides them to the user as a
(Configuration such as products, systems, software,
service via the internet.
Management facilities, people as they exist at specific
Database) points in time, and the relationship between 22. ipconfig Displays all current TCP/IP network
all assets. configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and
11. container is a virtualization instance in which the kernel
Domain Name System (DNS) settings. When
of an operating system allows for multiple
used without parameters, it displays Internet
isolated user-space instances. Unlike virtual
Protocol version 4 (IPv4) and IPv6
machines (VMs), containers do not need to
addresses, subnet mask, and default gateway
run a full-blown operating system (OS)
for all adapters.
image for each instance. Instead, containers
are able to run separate instances of an 23. ITIL Lifecycle Service Strategy,
application within a single shared OS. Service Design,
Service Transition,
12. content is a network of distributed services that
Service Operation,
delivery deliver content to a user based on the user's
and Continual service improvement
network geographic proximity to servers. CDNs
(CDN) allow speedy content delivery for websites 24. managed is an IT services provider that provides fully
with high traffic volume or large geographic services outsourced network, application, and system
reach. provider services across a network to clients.
(MSP)
25. Mesh is a local network topology in which the 36. Small is a set of American National Standards
Network infrastructure nodes connect directly, Computer Institute (ANSI) standard electronic
dynamically and non-hierarchically to as System interfaces that allow personal computers
many other nodes as possible and cooperate Interface (SCSI) (PCs) to communicate with peripheral
with one another to efficiently route data hardware such as disk drives, tape drives,
from/to clients. CD-ROM drives, printers and scanners
26. name server is a network administration command-line 37. SMTP Simple Mail Transfer Protocol
lookup tool available in many computer operating
38. Software as a is a model of cloud computing in which
(nslookup) systems for querying the Domain Name
service (SaaS) applications (software) are hosted by a
System to obtain domain name or IP address
vendor and provided to the user as a
mapping
service.
27. NTFS which is also sometimes called the New
39. Software also known as a developer's toolkit or
Technology File System, is a process that the
development devkit, is a set of development tools that
Windows NT operating system uses for
kit (SDK) aids or allows the creation of applications
storing, organizing, and finding files on a hard
for a certain platform. SDKs typically
disk efficiently.
include APIs, sample code,
28. On-Demand A cloud computing service model by which a documentation, debuggers and other
Self Service customer can provision additional cloud utilities.
resources on-demand, without involving the
40. Star Topology is a topology for a Local Area Network
service provider. Resources are typically
(LAN) in which all nodes are individually
provisioned through an online control panel.
connected to a central connection point
29. Platform as a is a model of cloud computing in which a
41. Symmetric all parties involved have to exchange the
Service vendor provides the hardware and software
Encryption key used to encrypt the data before they
(PaaS) tools necessary to create, deploy and
can decrypt it.
manage applications at scale to the user via
(AES-256, RC4, DES, RC5, and RC6).
the internet, as a service.
42. traceroute is a computer network diagnostic
30. Recovery The maximum acceptable age of the data that
(tracert ) command for displaying possible routes
Point can be restored (or recovery point) and the
and measuring transit delays of packets
Objective version of data lost.
across an Internet Protocol network.
(RPO)
43. UFS Universal file system
31. Recovery The maximum acceptable length of time
Time required for an organization to recover lost 44. vertical cloud is a cloud computing solutions that is built
Objective data and get back up and running. or optimized for a specific business
(RTO) vertical such as manufacturing, financial
services, or healthcare.
32. Ring is a network topology in which each node
Network connects to exactly two other nodes, forming 45. Virtual desktop is a desktop operating system hosted
a single continuous pathway for signals infrastructure within a virtual machine.
through each node - a ring. (VDI)

33. S.A.N. Storage Area Network 46. Windows WMI provides users with information about
Management the status of local or remote computer
34. service level is a contractual agreement between a
Instrumentation systems.
agreement customer and a cloud service provider (CSP)
(WMI)
(SLA) which defines the level of service, availability
and performance guaranteed by the CSP.
35. Simple is a way for different devices on a network to
Network share information with one another
Management
Protocol
(SNMP)

You might also like