Cloud Computing and Big Data - Cloud Computing Overview Practice Questions and Answers

Chapter 1 Overview of Cloud Computing Exercises

1.1 multiple choice questions

1. Which of the following statements about cloud computing is wrong (D).

A. Can provide on-demand, pay-as-you-go services

B. It can meet the flexible usage needs of users

C. Users can obtain the required resources through the network at any time and place

D. Mainly based on non-virtualized resource pools

2. Which of the following does not belong to the current typical cloud computing service model (B).

A. Software as a service B. Systems as a service C. Platform as a service D. Infrastructure as a service

3. The following are the basic characteristics of cloud computing (D).

A.utility calculation b. Web-based access C. Users can self-configure resources D. All of the above

4. The main resources provided by the IaaS service model do not include (C).

A. Computing resources B. Storage resources C. Applications D. Network resources

5. The following cloud computing platforms are not IaaS service platforms (C).

A.AWS       B.EC2       C.Windows Azure       D.S3

6. The PaaS service model emphasizes the concept of (A).

A.platform b. resources c. environment D.software

7. Which of the following does not belong to the cloud computing deployment model (C).

A.public cloud b. private cloud c. enterprise cloud d. hybrid cloud

8. The emergence and development of cloud computing integrates many technologies, including (D).

A.virtualization technology b. distributed computing c. utility calculation d. All of the above

9. The main purpose of grid computing and public computing services is (A).

A.Consolidate a large number of machines into a virtual super machine for use by people distributed all over the world

B.Realize that computing power is free and free to use like gas, water, and electricity

C.The scale can be dynamically adjusted and expanded according to the actual needs of users       

D.Guarantee the reliability of the platform through mutual protection of nodes

10. The architecture of cloud computing does not include (C).

A.SOA construction layer B. Physical resource layer C. Network scheduling layer D. Virtualization resource pool layer

11. The management function of (D) is included in the management middleware layer of cloud computing.

A.user b.task c. application D.All of the above

12. Cloud computing has many key technologies, including (D).

A.Distributed data storage technology b. Distributed Parallel Programming Model Technology

C.Green energy-saving technology D. All of the above

13. Cloud computing security technology includes (D).

A.Identity authentication mechanism b. access control mechanism c. Isolation technology d. All of the above

14. Which of the following statements is wrong (A).

A.The location of the data center can only be fixed

B.Areas in the data center that include the work of day-to-day administrative staff

C.The PUE value of the data center is generally not less than 1    

D.Servers in a data center need to be powered and cooled while they are running

15. The core of the blockchain is (D), which is a method for each node in the blockchain network to reach a consensus.

A.data layer b. network layer c. contract layer d. consensus layer

1.2 Fill in the blanks

1. From the perspective of (the core service level of cloud computing), cloud computing can be divided into three service models: IaaS, PaaS and SaaS.

2. Compared with the private cloud, the public cloud is a platform shared and used by different units, institutions and individuals, which is prone to security risks, so modules such as (isolation of user applications) are emphasized.

3. The construction of cloud computing system, optimal scheduling of cloud computing tasks, and root cause tracing can be obtained through (big data) analysis.

4. The essence of blockchain is a kind of non-tamperable distributed database under the peer-to-peer network, which is mainly used in Internet finance, product supply chain and other links and fields that need to be traced.

5. Unlike cloud computing, edge computing puts computing tasks on computing resources close to (data source), which can effectively reduce the delay of computing systems, reduce data transmission bandwidth, and relieve the pressure on cloud computing data centers.

1.3 Short answer questions

1. Please briefly describe the typical characteristics of cloud computing.

answer:

  1. The scale is huge. Cloud computing centers generally have a fairly large scale. For example, Alibaba Cloud currently deploys data centers in dozens of regions around the world, with a total server size of several million units. By integrating massive server clusters, it can provide huge computing and storage ability.
  2. resource aggregation. Cloud computing aggregates large-scale distributed computing resources and storage resources to jointly support users to complete various computing tasks and meet storage needs.
  3. virtual abstraction. Cloud computing provides users with virtualized servers based on physical servers, so that users can use them and improve resource utilization; virtual machines are isolated from each other, which improves security.
  4. Pay as you go. Cloud computing has a huge resource pool. Cloud services enable computing power to be used as a public resource like water and electricity. Users can purchase computing resources as needed, and they are charged according to usage.
  5. high reliability. When there is a problem with the computing nodes in cloud computing, the reliability of the cloud platform can be guaranteed through node mutual protection. The cloud platform uses measures such as data multi-copy backup and resource monitoring to ensure the high reliability of the system.
  6. High scalability. The cloud is composed of massive servers and other resources through the network. Servers can be merged into and out of the cloud relatively conveniently and simply. The scale of the cloud can be dynamically adjusted and expanded according to the actual needs of users.
  7. High utilization rate and high cost performance. Cloud computing makes full use of server resources through resource aggregation and other methods. Through the commercialization model of IT resources and on-demand use, it greatly reduces the cost of software services and realizes the use of fewer resources to provide more services. By renting computing resources such as servers from cloud service providers, small-scale organizations can reduce human and financial expenditures and focus on the company's own business.

2. What are the key technologies in current cloud computing?

answer:

The current cloud computing mainly includes virtualization technology, distributed parallel programming model technology, distributed data storage technology, distributed task scheduling technology, monitoring and management technology, cloud computing security mechanism, cloud computing network technology and green energy-saving technology.

3. Please briefly describe the main components of the data center.

answer:

  1. Computer room. The building space for installing and operating data equipment, including server room, network room and storage equipment room, etc.
  2. auxiliary area. Mainly responsible for installation, commissioning, maintenance, operation, monitoring and management of electronic information equipment and software, including equipment maintenance room, test room, fire protection and security room, etc.
  3. support area. Mainly responsible for providing power support and safety guarantee for the main engine room and auxiliary area, including power distribution room, battery room and air-conditioning room, etc.
  4. administrative area. The area where the daily administrative staff is located, responsible for the management and scheduling of the staff and the status management of the equipment.

4. Please briefly describe the relationship between blockchain and cloud computing.

answer:

The advantages of cloud service providers using cloud platforms to support blockchain are mainly reflected in three aspects: cost efficiency, application ecology, and security and privacy. The blockchain can be loaded on the cloud platform, and can even be integrated with the bottom layer of the cloud platform accordingly. By combining with cloud service providers, blockchain technology can be integrated and packaged for delivery, laying the foundation for application implementation.

Under certain conditions, the blockchain can also support cloud computing in turn. For example, the immutability of the blockchain can make cloud computing itself more secure and reliable, ensuring data integrity.

5. Please compare and analyze the traditional virus defense strategy and the cloud computing-based virus defense strategy.

answer:

Traditional network anti-virus software provides virus defense services for each user. By installing corresponding anti-virus software on each node to monitor the operation of the computer, when it is found that the computer is suspected to be infected by a virus, it starts to scan and kill. Network anti-virus software provider Viruses are also discovered by monitoring some conditions on the Internet, and the virus database is updated. The problem with this method is that there is a large lag in the response to the virus, and the response is not timely enough.

The virus defense system based on cloud computing not only installs anti-virus software on each user terminal, but also installs a probe program, which collects samples of suspected viruses through the probe program, and packages and sends the samples to the cloud data center of the virus defense system. When the system finds that many users have submitted the same or similar suspected virus samples, it may discover new viruses in time, so as to respond to viruses faster and provide virus solutions as soon as possible. The more users you have, the more reliable your security analysis will be based on the collected samples.

The virus defense system based on cloud computing can also make the client antivirus software smaller in size, stronger in virus detection and killing capabilities, and more suitable for mobile devices. With the popularization of smart phones, a large number of viruses targeting smart phones also appear. Cloud security can put the work of virus detection and killing on the cloud for processing. Users can filter access requests and returned results through the cloud security layer every time they access the Internet, and even prevent viruses without installing anti-virus software.

1.4 Answer questions

1. A university intends to build a campus energy management and control system based on cloud computing. Please answer the following questions:

  1. Which cloud computing service model and deployment model is more appropriate to choose, and why?
  2. Which service functions of the management middleware can be used by the campus energy system based on cloud computing?

answer:

  1. The SaaS service model can be selected, and the cloud service provider provides the corresponding software and functional service modules of the energy system, and the deployment model belongs to the private cloud.
  2. Functions such as account management and usage billing in user management middleware; functions such as life cycle management and task execution in task management middleware; functions such as load balancing and monitoring statistics in resource management middleware; identity in security management middleware Authentication, access authorization and other functions.

Guess you like

Origin blog.csdn.net/m0_63394128/article/details/126567915