Assignment2
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
222
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
1
Uploaded by JusticeOxideHawk121
1.
What is meant by the term ‘client-server architecture’ and what are the advantages of this
approach? A system that host, delivers, and manages the majority of the resources and
services request by the client.
2.
Compare the client-server architecture with two other architectures. Include a description
of the 3 service models defined by NIST.
Client-server architecture is a computing model in which the server hosts, delivers, and
manages most of the resources and services requested by the client. Peer to peer
architecture shows no difference between clients and servers. Is limited to less than 10
users. A distributed systems architecture involves multiple, interconnected computing
nodes that work together to perform a common task. There is no centralized point of
control. Each node is responsible for performing a portion of the overall task.
Software as a Service (SaaS) – Uses the CSP’s applications running on a cloud interface.
Applications are accessed is through a thin client interface like a web browser. Does not
manage the underlying cloud infrastructure.
Platform as a Service (PaaS) – created or
acquired applications created using
programming languages, libraries, services, and tools supported by the provider. Does not
manage the underlying cloud infrastructure.
Infrastructure as a Service (IaaS) – provision processing,
storage,
networks, and
other fundamental computing resources where the CSC can deploy and run arbitrary
software, which can include operating systems and applications. The CSC
does not
manage or control the underlying cloud infrastructure but has control
over operating
systems, storage, and deployed applications, and possibly limited control of select
networking components (e.g.,host firewalls).
3.
Which cloud computing benefit do you feel is the most important and why? I think data
lost is the most important benefit to cloud computing, I personally believe that’s the
reason it took off the way it did. The safety net of still being able to access files even if
the desktop, laptop, or even cellular device is destroyed is second to none.
4.
Which cloud computing risk do you feel is the most important and why? Data exposure is
the biggest risk, in the day and age of cyber attacks it has been proven why cyber security
is such a sought out and needed career.
5.
Describe the DBMS MS Access. It was created by Microsoft to allow business and end
users to manage and analyze mass amounts of data more efficiently.
6.
How is MS Access used in contrast to SQLite? MS Access is the program and SQLite a
programming tool.
7.
What are the primary uses of MS Access? Database management. This includes a number
of things like data storage, inventory, project, personnel, and business management to
nam
e a few.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help