Upgrade to remove ads
Only A$47.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (75)
Cloud
Elastic leasing of pooled computer resources over the Internet
Elastic
▪ Automatically adjusts for unpredictable demand ▪ Limits financial risks
Pooled
▪ Same physical hardware
▪ Economies of scale
The Mainframe Era (1960s-1980s)
- Large-scale high-speed centralized computers.
- Thin clients, no Internet, and no Cloud.
The Client-Server Era (1990s-2000s)
- Allowed clients (users) to send requests across the Internet to servers.
- Internet,
but no modern cloud computing yet.
The Cloud Computing Era (2008-Current)
- Applications, data, and processing power can be used remotely.
- Accessed with a variety of devices including PCs, thin clients, mobile devices, and IoT devices.
Why are organizations moving to the cloud?
• Lower costs - cheap processors, essentially
free data communication and storage.
• Ubiquitous access
• Improved scalability
• Elasticity
• Virtualization technology
• Internet-based standards enable flexible, standardized processing capabilities.
Cloud (Positive)
Small capital requirements
Speedy development
Superior scalability to growing or fluctuating demand
Known cost structure
Possibly best-of-breed security/disaster
preparedness
No obsolescence
Industry-wide economies of scale, hence cheaper
Focus on core business, not infrastructure
In House (Positive)
Control of data location
In-depth visibility of security and disaster preparedness
Cloud (Negative)
Dependency on vendor
Loss of control over data location
Little
visibility into true security and disaster preparedness capabilities
In House (Negative)
Significant capital required
Significant development effort
Difficult (impossible?) to accommodate fluctuating demand
Ongoing support costs
Staff and train personnel
Increased management requirements
Annual maintenance costs
Cost uncertainties
Obsolescence
Economies of Scale
- Average cost decreases as size of operation increases.
- Major cloud vendors operate enormous data centers (Web farms).
SaaS
Employees and Customers
PaaS
Application developers and Application testers
IaaS
Network architects and Systems administrators
SaaS Example
Salesforce.com iCloud
Office 365
PaaS Example
Google App Engine Microsoft Azure
AWS Elastic Beanstalk
IaaS Example
Amazon EC2 (Elastic Compute Cloud) Amazon S3 (Simple Storage Service)
Content Delivery Network (CDN)
- Stores user data in many different geographical locations and makes data available on demand.
- Specialized type of PaaS, but usually considered in its own category.
- Minimizes latency.
- Used to store and deliver content seldom changed.
CDN Benefits
- Decreased, even
guaranteed, load time
- Reduced load on origin server
- Increased reliability
- Protection from DOC attacks
- Reducted delivery costs for mobile users
- Pay as you go
Personal area network (PAN)
Devices connected around a single person
Local area network (LAN)
Computers connected at a single physical site
Wide area network (WAN)
Computers connected between two or more separated sites
The Internet and internets
Networks of networks
K(ilo)
1,000
M(ega)
1,000,000
G(Ina)
1,000,000,000
Communication speeds expressed in
bits
Memory sizes expressed in
Bytes
IEEE 802.3
▪ Wired LAN
▪ 10/100/1000 Mbps
▪ Ethernet
IEEE 802.11
-Wireless LAN
- 802.11ac
-Speeds up to 1.3 Gbps
Bluetooth
-Transmits data short
distances.
-Connect computer, keyboard, mouse, printer, smartphones, smartwatches, automobiles, sports equipment, clothing.
ISP Functions
1. Provide
legitimate Internet address.
2. Provide gateway to Internet.
3. Pay access fees and other charges to telecoms.
WAN wireless average performance
1 Mbps, with peaks of up to 3.0 Mbps.
Typical wireless LAN
50 Mbps
IPv4
- E.g.
137.190.8.10
- Dotted decimal notation
- Only about 4 billion addresses (not enough)
IPv6
- E.g. 0:0:0:0:0:ffff:89be:80a
- Hexadecimal notation
- 340 undecillion addresses
Domain name
▪ Unique name affiliated with a public IP address.
▪ Dynamic affiliation of domain names with IP addresses.
▪ Multiple domain
names for same IP address.
URL (Uniform Resource Locator)
Internet address protocol, such as // or ftp://
Public IP addresses
▪ Identifies a unique device on Internet.
▪ Assigned by ICANN (Internet Corporation for Assigned Names and Numbers).
Private IP addresses
▪ Identifies a device on a private network, usually a
LAN.
▪ Assignment LAN controlled.
Public IP addresses conserved (Benefits)
One public IP address per LAN.
Using private IP addresses (Benefits)
- Eliminates registering public IP address with ICANN-approved agencies.
- Protects against
direct attack.
Net Neutrality Principles
- All data treated equally.
- Carriers should not be allowed to: ▪ Decide which sites load quickly
▪ Decide which apps are allowed on a network ▪ Decide which content is acceptable
WSDL (Web Services Description Language)
Standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service.
SOAP
(no longer an acronym)
Protocol for requesting Web services and for sending responses to Web service requests.
XML
(eXtensible Markup Language)
Used for transmitting documents. Contains metadata to validate format and completeness of a document, includes considerable overhead.
JSON
(JavaScript Object Notation)
Markup language used for transmitting documents. Contains little metadata. Preferred for transmitting volumes of data between servers and browsers. While notation in format of JavaScript objects, JSON documents can be processed by any language.
Machine learning
The ability of computers to learn dynamically rather than being explicitly coded.
Quantum Learning
- Based on the iterative generation of models.
- Adapts models and interprets them differently over
time.
- Allows the computer to identify patterns and other insights independently.
- Quantum computing could advance machine learning due to increased
processing power.
Which of the following is a characteristic of cloud-based hosting?
a. Unknown cost structure
b. Full control of data location
c. No-obsolenscence
d. In-depth visibility of security
...
Which of the following is an example of SaaS?
a. iCloud
b. Microsoft Windows Azure
c. Oracle On Demand
d. Amazon S3
A
Which of the following is an example of IaaS?
a. Apple iCloud
b. Microsoft Azure
c. Office 365
d. Amazon S3
D
Which of the following is defined as the elastic leasing of pooled computer resources over the internet?
a. Broadband
b. Wiki
c. The cloud
d. Bluetooth
C
Cloud resources are _________ because many different organizations use the same physical hardware.
a. elastic
b. pooled
c. programmatic
d. portable
B
The organization responsible for assigning public IP addresses is called _________.
a. CERN
b. IEEE
c. ICANN
d. ISO
C
__________
is wireless protocol designed for transmitting data over short distances, replacing cables.
a. IPv6
b. PaaS
c. Bluetooth
d. IPv4
C
A ________ is a set of rules that programs on two communicating devices follow.
a. codec
b. cloud
c. packet
d. protocol
D
Which of the following statements is true about IEEE
802.3?
a. It is the protocol for wireless LAN connections.
b. It is the protocol for bluetooth.
c. It is the protocol for wired LAN connections
d. It is the universal standard protocol for all WAN connections
C
Which of the following is the most common format for IP addresses?
a. IPv4
b. TCP
c. IPv6
d. http
A
The
term _________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.
a. portable
b. pooled
c. programmatic
d. elastic
D
Which of the following protocols guarantees secure data transmission?
a. http
b. ftp
c. https
d. smtp
C
The ________ protocol standard is also known as ethernet.
a. bluetooth
b. IEEE 802.11
c. IEEE 802.3
d. DSL
C
Which of the following features distinguishes a LAN from a WAN?
a. A LAN connects computers in a single location
b. A WAN has a limit on the number of users
c. a WAN has low bandwidth
d. a LAN has stringent hardware requirements
A
Which of the following is an example of PaaS?
a. Apple iCloud
b. Amazon S3
c. Oracle On Demand
d. Office 365
C
Amazon S3 is an example of ________.
a. cdn
b. PaaS
c. IaaS
d. VPN
C
Which of the following characteristics is a
disadvantage of in-house hosting?
a. dependency on vendor
b. loss of control over data
c. cost uncertainties
d. lack of visibility into security details
C
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain web sites?
a. ftp
b. smtp
c. https
d. http
A
A
_________ detects the speed that a given device can handle and communicates with it at that speed.
a. codec
b. modem
c. switch
d. port
C
Which of the following characteristics is a disadvantage of cloud-based hosting?
a. it involves high dependency on vendor
b. it involves sufficient requirement of capital
c. it involves high annual maintenance costs
d. it involves high ongoing support
costs
A
The _________ tier of the three tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process web pages.
a. user
b. server
c. database
d. data link
A
In cloud computing, resources are said to be "pooled" because organizations _________.
a. use the
public internet to create the appearance of a private connection
b. use open source standards that enable users to modify a program's source code
c. offer their services to each other free of charge, in a give and take arrangement
d. share the same physical hardware through virtualization
D
Which of the following is a characteristic of in-house hosting?
a. in-depth visibility of disaster
preparedness
b. small capital requirements
c. industry-wide economies of scale
d. known cost structure
A
The connection between a VPN client and a VPN server is called a ____________.
a. data highway
b. hyperlink
c. tunnel
d. access point
C
Which of the following TCP/IP application-layer protocols is used
for small transmissions?
a. ftp
b. https
c. smtp
d. IP
A
Sets with similar termsCh. 6 MIS
58 terms
afton_addington
Chapter 6: The Cloud
71 terms
lharlo96
CISB 210 - Chapter 6 mult.
60 terms
hailley725
MIS Ch 6
85 terms
britneytuttle
Sets found in the same folder10SA
12 terms
jvg9277
MIS EXAM 3
136 terms
ryan_arborio
MIS Ch 5
61 terms
cam_iadeluca
MIS Chapter 9
18 terms
rory_isdaner
Other sets by this creatorCHAPTER 8 - MIS 304 - BAKER
22 terms
erikapohlman
Irregular Verb Stems
11 terms
erikapohlman
CHAPTER 4 - MIS 304 - BAKER
45 terms
erikapohlman
CHAPTER 3 - MIS 304 - BAKER
20 terms
erikapohlman
Verified questions
COMPUTER SCIENCE
The three common types of traversal with a binary tree are ________, ________, and ________.
Verified answer
COMPUTER SCIENCE
Write a script beautyofmath that produces the following output. The script should iterate from 1 to 9 to produce the expressions on the left, perform the specified operation to get the results shown on the right, and print exactly in the format shown here. >> beautyofmath 1x8+1=9 12 x 8 + 2 = 98 123 x 8 + 3 = 987 1234 x 8 + 4 = 9876 12345 x 8 + 5 = 98765 123456 x 8 + 6 = 987654 1234567 x 8 + 7 = 9876543 12345678 x 8 + 8 = 98765432 123456789 x 8 + 9 = 987654321
Verified answer
COMPUTER SCIENCE
What keyword parameter is used to send a key-function to the sort method? a) reverse b) reversed c) cmp d) key
Verified answer
COMPUTER SCIENCE
The issue of resource utilization shows up in different forms in different types of operating systems. List what resources must be managed carefully in the following settings: a. Mainframe or minicomputer systems b. Workstations connected to servers c. Mobile computers
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Related questionsQUESTION
Caused when the cable is exposed to strong electromagnetic fields such as fluorescent lights and machinery with motors or transformers
15 answers
QUESTION
What are the two types of ARQ?
10 answers
QUESTION
Explain the major categories of e-commerce.
9 answers
QUESTION
what does layer 1 consist of
6 answers