Cloud Fundamentals Flashcards

(30 cards)

1
Q

What is a server?

A

A dedicated computer for serving requests over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Cloud?

A

Servers that are accessible over the internet, often stored in large data centres around the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some benefits of using managed data centres over your own?

A

Primarily, it’s cheaper and faster to do so. You pay for what you use, and data closer to a user takes less time to reach them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the three biggest cloud providers.

A

Amazon Web Services, Google Cloud Platform, Microsoft Azure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Infrastructure as a Service? (IaaS)

A

IaaS refers to using a major cloud provider directly (such as AWS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Platform as a Service? (PaaS)

A

PaaS often abstracts a layer of complexity from an IaaS tool, to make it easier for developers to develop on the cloud (Automating deployment, less code required). Examples are: Heroku, Vercel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Software as a Service? (SaaS)

A

A layer of abstraction on top of IaaS and Paas, referring to a single app that uses cloud functionality to benefit users or developers. Examples are: Google Workspace, Dropbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VPC on AWS?

A

Amazon Virtual Private Cloud allows you to launch AWS resources in a logically isolated virtual network that you’ve defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an EC2 instance on AWS?

A

A virtual computer hosted by AWS, of which direct access can be sold to a developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SSH?

A

Secure Socket Shell is a network protocol that gives users a secure way to access a computer over a unsecured network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CI?

A

Continuous Integration is a DevOps software development practice where developers regularly merge their code changes to a central repository, and can automate builds and run unit tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CD?

A

Can refer to continuous delivery and/or continuous deployment. It means having merged code on push ready to be deployed to a live production environment, and then automating the release of the new developer changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a development environment?

A

A workspace where software developers create, test and debug applications without impacting live users or production systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is GitHub Actions?

A

A continuous integration and continuous delivery platform that allows users to automate their build, test and deployment pipeline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is YAML?

A

A human-readable data serialisation language. It is commonly used for configuration files and in applications where data is being stored or transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are secrets used for in GitHub Actions?

A

Secrets allow developers to store sensitive information in their organisation, repository, or repository environments.

17
Q

How can you transfer a file to a remote instance from your local machine? (AWS)

A

You can use the Secure Copy Protocol (SCP). Example:

scp -i /path/key-pair-name.pem /path/my-file.txt ec2-user@instance-public-dns-name:path/

18
Q

On AWS, what is RDS?

A

Amazon Relational Database Service is a web service that makes it easier to set up, operate and scale a relational database in AWS.

19
Q

On AWS, what is IAM?

A

Identity and Access Management helps you securely control access to AWS resources, and manage permissions that control which AWS resources users can access.

20
Q

What are some advantages of RDS on AWS?

A

1) Use database engines you are familiar with.
2) Backups, patching, failure detection, recovery all handled for you.
3) High availability with a primary and secondary database instance.
4) Controlled using AWS IAM, for clear definitions of users and permissions.

21
Q

In AWS, what is a security group?

A

A security group controls the traffic that is allowed to reach and leave the resources that it is associated with.

22
Q

What is a load balancer on AWS?

A

A load balancer serves as the single point of contact for clients. It distributes incoming application traffic across multiple targets, such as EC2 instances, in multiple Availability Zones.

23
Q

What are the role of ports on the cloud?

A

Ports serve as communication gateways for your applications and resources to interact with the world, and each other.

24
Q

Why would you want to run a script as a background task?

A

Running Python scripts on a remote server can stop when the SSH connection closes. This issue stops long-running scripts from finishing their tasks, unless they are run as a background task.

25
What is 'nohup'?
Short for 'no hangup', it is a tool that lets you run processes that keep executing after you log out from a shell.
26
How would you run a python script as a background task?
`nohup python task.py &` The '&' tells the system to run the process in the background.
27
What is Horizontal scaling?
Horizontal scaling on the cloud refers to using more servers or instances to better distribute the workload across them and expand.
28
What is Vertical scaling?
Vertical scaling refers to adding more/faster CPUs, memory, or I/O resources to an existing server, or replacing a server with a more powerful one.
29
Why are environment variables important when working with the cloud?
They enable flexible and secure configuration management across different deployment environments, and prevent developers exposing sensitive credentials to bad actors.
30
In cryptography, what is the difference between public and private keys?
Primarily, the public key is used to encrypt data, whilst the private key is used to decrypt it.