Skip to main content

Education - IBM - Developing and Deploying Software in the Cloud

 

Developing and Deploying Software in the Cloud

 

01/15

In which phase of the software development lifecycle (SDLC) do you monitor and  manage the performance of your application?

A.      Design

B.      Test

C.      Develop

D.     Deploy

 

02/15

An IT team is managing a company’s complex cloud environment. They’re utilizing an automation tool for the cloud orchestration.

What benefit can they expect from the automation tool?

A.      An increase in their amount of manual work as well as automated tasks

B.      A reduction in their amount of manual work, errors, and delays

C.      An increase in the number of containers resulting in a reduction of management time

D.     A reduction in the size of the applications they manage

 

03/15

Which of the following is a benefit of imperative cloud orchestration?

A.      The developer doesn’t need to write or maintain any scripts or workflows.

B.      The developer has complete control over the exact steps to execute.

C.      The developer doesn’t need to know the exact steps to execute.

D.     The developer never needs to update the orchestration.

 

04/15

During the simulation, which task did you perform that included specifying the target operating system for the app?

A.      Building the Docker image

B.      Tagging the Docker image

C.      Tagging the container

D.     Registering the container

 

05/15

During the simulation, which tool did you use to create the container registry on the cloud?

A.      IBM Cloud command line utility

B.      Kubernetes

C.     Namespace tool

D.     Docker

 

06/15

Which feature of cloud computing enables developers to increase and decrease the number of resources they have available for their applications?

A.      Collaboration

B.      Innovation

C.     Cost-efficiency

D.     Scalability

 

07/15

James plans to orchestrate the deployment of his new web application. He doesn’t know the exact steps to deploy it, but he does know where to deploy it and all the configuration and security settings for it.

Which orchestration method is best suited to his needs?

A.      Preconfigured orchestration

B.      Declarative orchestration

C.     Imperative orchestration

D.     Wizard-based orchestration

 

08/15

During the simulation, where did you push the Docker image to?

A.      The container registry

B.      Kubernetes

C.     Docker

D.     Linux

 

09/15

Ashton is part of a software team developing web applications. He needs to deploy an application that thousands of users around the world will use daily.

How can an automation tool like Kubernetes help him automate his cloud orchestration?

Select all that apply.

 

A.      It can distribute his containers across all available servers.

B.      It can monitor the health and performance of his application.

C.     It can load balance the incoming requests.

D.     It can automate the user help desk for his application.

 

10/15

Complete the sentences. _________ is the process of performing operations on components of a cloud environment without human intervention. _________ is the process of managing and automating tasks involved in running cloud applications.

A.      Cloud automation, Cloud orchestration

B.      Cloud-based deployment, Cloud orchestration

C.     Cloud orchestration, Cloud automation

D.     Cloud automation, Cloud-based deployment

 

11/15

During the simulation, what code did the senior engineer ask you to add to the app-deploy.yaml file?

A.      Code to tell Kubernetes how to deploy the image from the registry

B.      Code to tell Kubernetes to run the app

C.     Code to tell Kubernetes to run the web server

D.     Code to create a service on Kubernetes through which the to-do app will communicate with the outside world

 

12/15

Javier is developing a web application in the cloud and his line manager tells him that the company will be changing its cloud provider soon after he deploys his application.

Which of the following is a best practice Javier should implement to ensure his application is portable?

A.      Use serverless computing

B.      Use standard protocols, data formats, and design patterns

C.     Use microservices

D.     Use encryption

 

 

13/15

Which of the following is a software development approach that combines collaborative principles, tools, and practices to enable frequent updates and rapid evolution of products to users?

A.      Orchestration

B.      Automation

C.     SDLC

D.     DevOps

 

14/15

How does cloud-based development ease the deployment and flexible scaling of applications?

 

A.      It follows a linear development cycle.

B.      It uses an agile development cycle.

C.     It enables developers to work from any internet-connected device anywhere in the world.

D.     It uses a microservices development model.

 

15/15

Which of the following is a correct statement if you compare imperative cloud orchestration with declarative cloud orchestration?

A.      Developers only need to specify the desired outcome when using imperative cloud orchestration.

B.      Developers need to write more detailed instructions or procedures when using declarative cloud orchestration.

C.     Declarative cloud orchestration gives a developer more flexibility over a process than imperative cloud orchestration.

D.     Imperative cloud orchestration gives a developer more control over a process than declarative cloud orchestration.

 

 

 

Comments

Popular posts from this blog

Movie - Se7en (1995)

  My views Plot In an unnamed city overcome with violent crime and corruption, disillusioned police Detective Lieutenant William Somerset is one week from retirement. He is partnered with David Mills, a young, short-tempered, idealistic detective who recently relocated to the city with his wife, Tracy. On Monday, Somerset and Mills investigate an obese man who was forced to eat until his stomach burst, killing him. The detectives find the word " gluttony " written on a wall. Somerset, considering the case too extreme for his last investigation, asks to be reassigned, but his request is denied. The following day, another victim, who had been forced to cut one pound (0.45 kg) of flesh from his body, is found; the crime scene is marked " greed ." Clues at the scene lead Somerset and Mills to the  sloth  victim, a drug-dealing  pederast  whom they find emaciated and restrained to a bed. Photographs reveal the victim was restrained for precisely one year. Somers...

IT - Which Is Faster: find | cpio -pdvm OR rsync?

To determine which is faster between find | cpio -pdvm and rsync for copying a large directory tree locally, we need to consider several factors: the nature of the operation, the tools' design, the system environment, and the specific use case. Let’s break this down based on the information provided in the web results and general knowledge about these tools. Overview of the Tools find | cpio -pdvm : find : Recursively lists all files and directories in a given path. cpio : A tool for copying files into or out of a cpio or tar archive. In this case, with the -pdvm options: -p : Pass-through mode (copy files from one directory tree to another). -d : Create directories as needed. -v : Verbose mod...

Movie - The Gorge (2025)

  My views For 80 years everything was ok ... until they sent a woman For sure is DTV ... really bad Inside the gorge is clearly designed and written by a gamer Plot Two elite  snipers  receive identical missions: travel to an undisclosed location and guard the West and East sides of a deep gorge for one year without any contact with the outside world nor their counterpart on the opposite side. Levi Kane, a former  U.S. Marine  and current  private contractor  accepts the offer to guard the West tower. Drasa, a  Lithuanian  covert operative frequently employed by the  Kremlin , agrees to guard the East side. Upon arriving, Levi relieves his predecessor, J.D., a  British   Royal Marine  of duty and asks for specifics about the mission. J.D. explains that in addition to the towers on the East and West, there are automated turret defenses to the North and South, a powerful signal ‘ cloak ,’ and  explosives on the walls ...