0% found this document useful (0 votes)
64 views7 pages

Q1: What Is Cloud Computing and Its Five Caracterstics?

Here are some common RAM installation issues: - Incompatible RAM - Installing RAM modules that are not compatible with the motherboard in terms of type (DDR2, DDR3, etc.), speed, or size. This can cause stability issues or the RAM not being recognized at all. - Improper seating - The RAM modules are not fully seated in the slots. The clips on the sides of the slots are not fully engaged. This prevents proper contact between the RAM and the slot. - Wrong slots used - Some motherboards have specific slots that must be used in a certain order or configuration. Filling slots out of order can cause problems. - Overheating - Too little clearance between RAM modules can

Uploaded by

Sylvester Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views7 pages

Q1: What Is Cloud Computing and Its Five Caracterstics?

Here are some common RAM installation issues: - Incompatible RAM - Installing RAM modules that are not compatible with the motherboard in terms of type (DDR2, DDR3, etc.), speed, or size. This can cause stability issues or the RAM not being recognized at all. - Improper seating - The RAM modules are not fully seated in the slots. The clips on the sides of the slots are not fully engaged. This prevents proper contact between the RAM and the slot. - Wrong slots used - Some motherboards have specific slots that must be used in a certain order or configuration. Filling slots out of order can cause problems. - Overheating - Too little clearance between RAM modules can

Uploaded by

Sylvester Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Q1: WHAT IS CLOUD COMPUTING AND ITS FIVE CARACTERSTICS?

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a share
pool of configurable computing resources eg: network, server or storage) that can be rapidly
provisioned & released with minimal management effort or service provider

- On-demand: without human interaction a consumer can provision resources when the demand
arises and is needed
- Broad network access: multiple clients can access resources through the network such as
mobile & laptop and workstations
- Resource pooling: provider’s computing resources are pooled to serve multiple consumers using
a multi-tenant model with different physical and virtual resources
- Rapid Elasticity: with consumer needs resources can be provisioned (swing up) or released to
scale rapidly outward or inward
- Measured Service: resources on the cloud systems can be monitored, controlled and reports
taken to allow for transparency for the provider and consumer

Q2: VIRTUALISATION AND ITS ADVANTAGES?

Virtualization is the "creation of a virtual (rather than actual) version of something, such as a server, a
desktop, a storage device, an operating system or network resources".

Maximize resources — Virtualization can reduce the number of physical systems you need to acquire,
and you can get more value out of the servers. Most traditionally built systems are underutilized.
Virtualization allows maximum use of the hardware investment.

Multiple systems — With virtualization, you can also run multiple types of applications and even run
different operating systems for those applications on the same physical hardware.

MINIMIZE Cost: USING VIRTUALISATION WILL ALLOW YOU TO MAKE THE MOST OF YOUR HARDWARE
RESOURCES WHICH WILL MI IMIZE THE COST.

ITS TYPES:

Server Virtualization.

Network Virtualization.

Storage Virtualization.

Advantages

Can use multiple operating system environments on the same computer.

Virtual machines can provide an instruction set architecture, or ISA, structure different than the actual
computer. The ISA serves as the interface between software and hardware.
When you create your virtual machine, you create a virtual hard disk. So, everything on that machine
can crash, but if it does, it won’t affect the host machine.

There are security benefits to running virtual machines. For example, if you need to run an application of
questionable security, you can run it in a guest operating system. So, if the application causes damage,
then it will be only temporary after the guest is shut down. Virtual machines also allow for better
security forensics by monitoring guest operating systems for deficiencies and allowing the user to
quarantine it for analysis.

DISADVANTAGES:

It can have a high cost of implementation.

It still has limitations.

It creates a security risk.

It creates an availability issue.

It requires several links in a chain that must work together cohesively.

May degrade performance

Longer learning Curve

Extra Costs

Maybe you have to invest in the virtualization software and possibly additional hardware might be
required to make the virtualization possible. This depends on your existing network. Many businesses
have sufficient capacity to accommodate the virtualization without requiring much cash. If you have an
infrastructure that is more than five years old, you have to consider an initial renewal budget.

Software Licensing

This is becoming less of a problem as more software vendors adapt to the increased adoption of
virtualization. However, it is important to check with your vendors to understand how they view
software use in a virtualized environment.

Learn the new Infrastructure

Implementing and managing a virtualized environment will require IT staff with expertise in
virtualization. On the user side, a typical virtual environment will operate similarly to the non-virtual
environment. There are some applications that do not adapt well to the virtualized environment.
Q3: WHAT IS CLOUD SECURITY AND ITS SEVEN MECHANISM?

cloud security refers to a broad set of policies, technologies, and controls deployed to protect data,
applications, and the associated infrastructure of cloud

computing. It is a sub-domain of computer security, network security and more broadly, information
security.

SEVEN MECHANISM:

Identity Management:

It is used for identifying the user that is using the cloud environment.

It is used to keep track of the users activity.

Most of the organizations have their own identity mechanism system which is integrated in cloud
environment.

Physical Security:

Used to secure the IT hardware used to provide cloud services

Prevents against physical attacks

Fire, flood or any other accident

Privacy:

All the critical data like credit card number etc. is masked.

Only authorized users have access to data

Digital identities must be protected

Data Security:

Cloud is not only vulnerable to network attacks, but also to the cloud based attacks,

following are the security mechanisms used to minimize the threat:

Confidentiality:

It is used to make sure that the actual content is not available to unauthorized users

Data is kept in encrypted format on the disk

Key is only given to authorized users


Access Control:

Restrictions on access

User should only be able to perform operations he is authorized to

Different user have different access rights

Integrity:

It is related to modification of the data

Data uploaded by the users should not be modified

Bit errors in the data should be recovered

MICs are used to check the data integrity

Q4: COMPARISON OF WINDOW AND LINUX OPERATING SYTSTEM?

Windows Linux
Easiest OS to use for desktop users as it’s user Linux has a learning curve for the average user
friendly with simplicity of basic functions of and requires a deeper understanding of the
system tasks and not difficult to use for novice system and for troubleshooting the system is
users more challenging
Even though windows have improved a lot in Linux is more reliable, secure with a strong focus
terms of reliability over the years it is still on process management, system security and
considered less reliable than Linux uptime
Windows has the largest number of desktop Thousands of programs available to its users are
users and has the largest selection of commercial free and open-source
software available including games and office
productivity
Windows has a user base of mostly gamers, Most of the users are corporate scientific and
novice users and business users who prefer academic organizations
Windows OS
Windows support: FAT, FAT32, NTFS, exFAT, ReFS Ext2, Ext3, Ext4, XFS, JFS
Graphical User Interface Gnome, KDE
Closed-Source OS Open-Source OS
Windows OS is affected by very large number of In comparison, fewer virus and worms are found
viruses & worms in Linux
Q5: functions and characteristics of operating system?

process management

memory management

file system management

mass storage management

protection & security

control program

resource allocation

process management: A process is a program in execution. the OS creates both user process and system
process. OS has the responsibility of allocating memory and other i/o resources for the processes. OS
can also terminate the processes and release the resources.

memory management: all the data, instructions and processes should be in memory before and after
processing. OS has the responsibility to keep track of which part of memory is currently being used by
Which process. OS can also provide and release memory as needed.

file system management: OS organizes data and instructions into files. files are organized into folders.
OS has the responsibility of creating, deleting files/directories.

mass storage management: OS controls disks which are used to store data in large quantity and for long
period of time. OS has the responsibility of free space management, storage read/write, and disk
scheduling.

protection and security: OS has the responsibility to control access of user and processes to resources.
eg: authorized or unauthorized users, user id, group id, passwords etc.

security: OS has the responsibility to defend a system against internal/external attacks. eg: worms,
viruses, identity thefts etc.

resource allocator: Manages all resources AND Decides between conflicting requests for efficient and
fair resource use.

control program: Controls execution of programs to prevent errors and improper use of the computer

Q6: what are the problems of overheating inside computer system? and its solutions?

1) improper installation of system cooling/ system fan/ CPU sink/ CPU fan.

2) overclocking: when you want system to run faster than usual clock speed.
3) problems with rating of power supply.

4) a power supply going faulty.

5) computer is being operating in dust/heat.

solutions: check system temperature from bios set uo to get a good idea.

2) dust on the components can cause overheating. use blower or compressed air to remove dust.

3) check for air flow in the case. fan may need replacement.

4) if there are many expansion cards use a bigger (chassis) case.

5) update the firmware of the motherboard.

Q7: What are RAM installation issues?

1) how much RAM do i need & how much RAM is currently installed.

2) how many and what kind of memory modules (DDR2, DDR3) are currently installed on my
motherboard.

3) how many and what kind of memory modules can i fit on on my motherboard.

4) how do i select and purchase the memory modules.

5) how do i physically install the new memory module.

Q8: briefly identify and define six components of a typical computer motherboard?

Microprocessor: Also known as the microprocessor or the processor, the CPU is the computer's brain. It
is responsible for fetching, decoding, and executing program instructions as well as
performing mathematical and logical calculations.

RAM: Random Access Memory, or RAM, usually refers to computer chips that temporarily store
dynamic data to enhance computer performance while you are working.

Bios: BIOS stands for Basic Input/output System. BIOS is a "read-only" memory, which consists of low-
level software that controls the system hardware and acts as an interface between the operating
system and the hardware.

cache memory: Cache memory is a small block of high-speed memory (RAM) that enhances PC
performance by pre-loading information from the (relatively slow) main memory and passing it to the
processor on demand.

Expansion bus: An expansion bus is an input/output pathway from the CPU to peripheral devices and it
is typically made up of a series of slots on the motherboard. Expansion boards (cards) plug into the bus.
CPU clock: The CPU clock synchronizes the operation of all parts of the PC and provides the basic timing
signal for the CPU.

Custom PC Configuration

Graphic/CAD/CAM Design Workstation

- The suggested processor is a multi-core processor with six or more cores 4GHz clock speed and
large cache with 64bit support
- High end video card support is needed by applications that require faster GPU acceleration and
support like CAD/CAM or Photoshop. Cards from NVIDIA or AMD are recommended like NVIDIA
1080ti or AMD Radeon R9
- Recommended RAM size of 16GB or more DDR3 or DDR4 is needed with matched memory
modules running in multi-channel config that can run 64bit version of the OS

Audio/Video Editing Workstation

- The suggested processor is a multi-core processor with six or more cores 4GHz clock speed and
large cache with 64bit support
- The suggested RAM size is 16GB DDR3 or DDR4 or more with matching memory modules
running multi-channel configurations
- A specialized audio card for better signal-to-noise ratio is needed so there is better audio
performance such as Sound Blaster ZxR
- A specialized video card is required for faster performance when rendering video and graphics
with high GPU speeds such as NVIDIA GTX 1080ti
- Large and faster hard drives are needed for faster reading and writing when retrieval of media is
required such as SATA express or ssd
- A dual display is recommended so two separate screens can be utilized for better productivity,
such as 27inch display or larger with HDMI or Display port compatibility but VGA should be
avoided

You might also like