Professional Documents
Culture Documents
ANSWERS :
Gmail is a free email service provided by Google.
As of 2019, it had 1.5 billion active users worldwide. In many ways, Gmail is like any other
email service: send and receive emails, block spam, create an address book, and perform
other basic email tasks.
A Google account is needed to access Gmail because it is just one of the many
services offered by Google to registered users.
Spam filtering. Spam is another name for junk email. Gmail uses advanced technologies to
keep spam out of your inbox. Most spam is automatically sent to a separate spam folder, and
after 30 days it is deleted.
Two-step verification makes it impossible for hackers to gain access to a user’s account as it
requires a user to enter a unique code that is generated every time, they try to access their
account in addition to their passwords. Once the user enters the code, they will be asked to
enter the password. Since the code is unique and generated on the spot, it is impossible for
hackers to get a hold of user's Gmail account.
Review suspicious activity: When Google identifies any suspicious activity on a Gmail
account, it sends the user a notification regarding the same. Many-a-times when the email is
logged in from an unfamiliar location or a device, Google quickly informs the user about the
activity on their registered mobile number or recovery email address. Users can then review
their account by clicking on the check activity to find out the details.
Security Sandbox: First announced at the Google Cloud Next '19 in San Francisco, the
Security Sandbox for Gmail beta detects the presence of unknown malware in attachments by
'executing' them in a private, secure sandbox environment. It analyses the side effects on the
operating system to determine malicious behaviour.
Advanced phishing and malware protection: This feature of Gmail helps identify emails that
have unusual attachment types and it automatically displays a warning message, sending the
mail to spam. It also provides new controls to place emails into quarantine, protect against
anomalous attachment types and protect Google Groups from inbound spoofing emails.
• High performance computing is the ability to process data and perform complex calculations
at high speeds. To put it into perspective, a laptop or desktop with a 3 GHz processor can
perform around 3 billion calculations per second. While that is much faster than any human
can achieve, it pales in comparison to HPC solutions that can perform quadrillions of
calculations per second.
Applications of HPC:
HEALTHCARE
Medicine and computing are as intimately intertwined as DNA’s double helix. Computers already
store confidential patient information, track vital signs and analyse drug efficacy. The rise of HPC
has allowed medical professionals to digitize even more complex processes, too, like genome
sequencing and drug testing.
ENGINEERING
Engineering is all about boosting a machine’s realworld performance, but testing prototypes
is expensive (and occasionally dangerous). To work around this, engineers often test new
designs in massive computer simulations. Just like the real world, these simulated worlds
have gravity, heat, wind and a sprinkling of chaos. Unlike the real world, they run on HPC
systems. Thus far, simulations have been used to test the functionality
of airplane parts, streamline racing bike frames and much more.
SPACE RESEARCH
Outer space is full of unknowns. Is it inhabited by aliens? If so, are they friendly? (Probably.
And probably not.) Is a meteorite poised to collide with the Earth — and hit you, personally?
More seriously: Where did the universe come from, and what’s the weather like on the sun?
Those questions have major implications for us Earthlings, but it takes a lot of resources and
technological savvy to gather the data that’s necessary to find answers. That’s where models
rooted in HPC come in handy. They make the most of information gleaned by probes and
satellites.
b. Cluster Computing
Types of Cluster computing
1. Load-balancing clusters: Here workload is equally distributed across multiple installed
servers in the cluster network.
2. High availability (HA) clusters: A group of clusters which ensure to maintain very high
availability. computers pulled from these systems are considered to be very much reliable and
may not face a downtime even possibly on any instance.
3. High performance (HP) clusters: This computer networking tactic use supercomputers and
Cluster computing to resolve complex and highly advanced computation problems.
Advantages
1. Cost efficiency: Compared to highly stable and more storage mainframe computers these
form of cluster computing systems are considered to be largely cost-efficient and cheaper.
Moreover, most of these systems offer higher performance than mainframe computer systems.
2. Processing speed: The speed of processing also equitable to the mainframe systems and other
forms of supercomputers in the market.
3. Expandability: Scalability and expandability is the next key advantage of these clustered
systems. because they instantiate the opportunity to add any number of additional resources or
systems to the existing computer network.
4. High availability of resources: computers face failure very often. High Availability is
concurrent in a straight line to our increasing dependence on computers because at the present
they include a vital role mainly in companies whose most important functionality is accurately the
offer of some stable computing service, such as e-business, databases, among others.
c. Grid Computing
Ans.
• Through the cloud, you can assemble and use vast computer grids for specific time periods
and purposes, paying, if necessary, only for what you use to save both the time and expense
of purchasing and deploying the necessary resources yourself. Also, by splitting tasks over
multiple machines, processing time is significantly reduced to increase efficiency and
minimise wasted resources.
• Unlike with parallel computing, grid computing projects typically have no time dependency
associated with them. They use computers which are part of the grid only when idle and
operators can perform tasks unrelated to the grid at any time. Security must be considered
when using computer grids as controls on member nodes are usually very loose. Redundancy
should also be built in as many computers may disconnect or fail during processing.
• Grid Computing can be defined as a network of computers working together to perform a task
that would rather be difficult for a single machine. All machines on that network work under
the same protocol to act like a virtual supercomputer. The task that they work on may include
analysing huge datasets or simulating situations which require high computing power.
Computers on the network contribute resources like processing power and storage capacity to
the network.
• The main difference between cluster and grid computing is that the cluster computing is a
homogenous network in which devices have the same hardware components and the same
operating system (OS) connected together in a cluster while the grid computing is a
heterogeneous network in which devices have different hardware components and different
OS connected together in a grid.
d. Cloud Computing
Answer.
Cloud computing is the delivery of different services through the Internet. These resources
include tools and applications like data storage, servers, databases, networking, and software.
Rather than keeping files on a proprietary hard drive or local storage device, cloud-based
storage makes it possible to save them to a remote database. As long as an electronic device
has access to the web, it has access to the data and the software programs to run it.
Cloud computing is a popular option for people and businesses for a number of reasons
including cost savings, increased productivity, speed and efficiency, performance, and
security.
3.
three layers of cloud-based computing. PaaS shares some similarities with SaaS, the
primary difference being that instead of delivering oftware online, it is actually a
platform for creating software that is delivered via the Internet. This model includes
platforms like Salesforce.