Assignment2

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

222

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by JusticeOxideHawk121

Report
1. What is meant by the term ‘client-server architecture’ and what are the advantages of this approach? A system that host, delivers, and manages the majority of the resources and services request by the client. 2. Compare the client-server architecture with two other architectures. Include a description of the 3 service models defined by NIST. Client-server architecture is a computing model in which the server hosts, delivers, and manages most of the resources and services requested by the client. Peer to peer architecture shows no difference between clients and servers. Is limited to less than 10 users. A distributed systems architecture involves multiple, interconnected computing nodes that work together to perform a common task. There is no centralized point of control. Each node is responsible for performing a portion of the overall task. Software as a Service (SaaS) – Uses the CSP’s applications running on a cloud interface. Applications are accessed is through a thin client interface like a web browser. Does not manage the underlying cloud infrastructure. Platform as a Service (PaaS) – created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. Does not manage the underlying cloud infrastructure. Infrastructure as a Service (IaaS) – provision processing, storage, networks, and other fundamental computing resources where the CSC can deploy and run arbitrary software, which can include operating systems and applications. The CSC does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications, and possibly limited control of select networking components (e.g.,host firewalls). 3. Which cloud computing benefit do you feel is the most important and why? I think data lost is the most important benefit to cloud computing, I personally believe that’s the reason it took off the way it did. The safety net of still being able to access files even if the desktop, laptop, or even cellular device is destroyed is second to none. 4. Which cloud computing risk do you feel is the most important and why? Data exposure is the biggest risk, in the day and age of cyber attacks it has been proven why cyber security is such a sought out and needed career. 5. Describe the DBMS MS Access. It was created by Microsoft to allow business and end users to manage and analyze mass amounts of data more efficiently. 6. How is MS Access used in contrast to SQLite? MS Access is the program and SQLite a programming tool. 7. What are the primary uses of MS Access? Database management. This includes a number of things like data storage, inventory, project, personnel, and business management to nam e a few.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help