Chapter 5 Flashcards

1
Q

What are the Characteristics of Cloud Computing?

A

MORE PW

Elasticity and Scalability
Pay per Use
On-demand
Resiliency
Multi-Tenancy
 Workload Movement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of Cloud Computing

A

QUICK and EASY BACKUP ALMOST COST AUTOMATIC hote hai

Cost Efficient
Almost Unlimited storage
Backup and recovery
Automatic Software Integration
Easy access to information
Quick deployment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages of Cloud Computing

A

Technical Issues
Security in the Cloud
Prone to Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Objectives of BPA

A

CIAT

Confidentiality
Integrity
Availbility
Timeliness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Controls?

What are the moajor control objectives of BPA?

A

SAVE CAP

Authorization
Completeness
Accuracy
Validity
Error-Handling
Physical safeguards and security
Segregation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Applications based on NATURE OF PROCESSING

A

Batch processing
On-line processing
Real tine processing (extension of on-line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Applications based on SOURCE OF APPLICATION

A

Custom built application
Packaged software
Leased application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Applications based on SIZE & COMPLEXITY OF BUSINESS

A

Small & Medium Enterprise business

Large Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Applications based on NATURE OF APPLICATIONS (TYPES)

A
Accounting Applications
Office management software
Compliance Applications
Industry specific Applications
ERP software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network virtualization?

A

In IT, VIRTUALIZATION is the process of creating logical computing resources from available physical resources.

The core concept of network virtualization lies in Partitioning, which divides a single physical server into multiple logical servers.
Once the physical server is divided, each logical server can run an operating system and applications independently

This is accomplished using virtualization software to create a layer of abstraction between workloads and the underlying physical hardware.

NV is intended to optimize network speed, reliability, flexibility and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Storage Virtulization

A

SV is the apparent pooling of data from multiple storage devices, even different type of storage devices, into what appears to be a single device that is managed from a central console

SV helps the storage administrator perform the tasks of backup, archiving and recovery more easily and in less time

SV is sometimes described as “abstracting the logical storage from the physical storage”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Grid computing?

A

It is a computer network in which each computer’s resources are shared with every other computer in the system.

It is a special kind of distributed computing.

This system can be as simple as a collection of similar computers running on the same operating system or as complex as inter-networked systems comprised of every computer platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reasons for using GRID comouting

A
# An insurance company mines data from partner hospital for Fraud detection
#An application service provider offloads excess load to a compute cycle provider
#Civil engineers collaborate to design, execute & analyse shake table experiments
#An Enterprise configures internal & external resources to support e-business workload.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Benefits of Grid computing

A
  1. Making use of under-utilized resources
  2. Resource Balancing
  3. Parallel CPU Capacity
  4. Virtual resource and virtual organisation for collaboration
  5. Access to additional resource
  6. Reliability
  7. Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Constraints to be considered when developing a Grid computing architecture
OR
Grid Computing Security

A
  1. Single Sign-on
  2. Protection of Credentials
  3. Inter-portability with local security solutions
  4. Exportability
  5. Support for secure group communication
  6. Support for multiple implementations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steps in implementing BPA?

A

Step 1: Define why we plan to implement a BPA
Step 2: Understand the rules / regulation under which enterprise needs to comply with
Step 3: Document the process, we wish to automate
Step 4: Define the objectives/goals to be achieved by implementing BPA
Step 5: Engage the business process consultant
Step 6: Calculate the ROI for project
Step 7: Developing the BPA
Step 8: Testing the BPA