1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
11

Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati

on as a service.
Computers and Technology
1 answer:
Simora [160]3 years ago
4 0

Answer:

Internal Cloud:

An Internal Cloud is also known as a Corporate Cloud. It's a cloud computing service model that is implemented within an organization's dedicated resources and infrastructure. It also apply virtualization mechanism, shared storage and network resources to facilitate full control of an organization's cloud environment.

External Cloud:

An external cloud is a cloud solution that exists outside of an organization's physical boundaries. It allows companies to rent software and delivered security over the web, integrated to the back-end system. The services delivering through cloud solution will match that to a private cloud, but all the physical resources are external to the organization.

The Pros and Cons of the cloud services:

<u>On the up side: </u>

1: Fast start-up:

Cloud computing allows you to test your business plan very quickly for little money. It has changed the game of entrepreneurs. On the launch day, you have the confidence that you scale the world.

2: Business agility:

Cloud computing changes the whole world pattern of agility at a much lower cost.

3: Faster product development:

It reduced the moving applications and data time (one cloud to another) drop from weeks to minutes.

<u>On the down side: </u>

1: Bandwidth could bust your budget:

The network cost would be so large that you might buy the cloud storage rather than paying someone else for it.

2: Limited control and flexibility:

Since the remote software is being used, it usually lacks the features of an application running locally.

3: Increased Vulnerability:

As we know that the cloud based solutions are exposed on the public internet and are a more vulnerable target for malicious users and hackers. Nothing on the internet is completely secure and even the biggest players suffers from serious attacks and security breaches.

You might be interested in
Where do today's computers store almost all motherboard configuration data?
sergij07 [2.7K]
In the mother board of the back door next to the restroom 5 steps left
3 0
3 years ago
A piece of data in a program whose value can change is called a(n) -
Arada [10]

Answer:

it is b variable

Explanation:

7 0
2 years ago
Read 2 more answers
Which C99 function can be used to convert a string to a double?
nordsb [41]

Answer:

atof

Explanation:

atof function is used to convert a string to a double.

It takes a single parameter of type const char * and returns a double value.

The function signature is: double atof (const char* str);

In order to use this function in the code, you need to include the header file <stdlib.h>

For example:

#include <stdio.h>

#include <stdlib.h>  

int main()

{

   char str[5] = "0.01";

   double d = atof(str);

   printf("Value = %f\n", d);

   return 0;

}

5 0
3 years ago
What’s the name of the technology that lets ryzen™ 5 series cpus access the entire gddr memory of radeon™ rx gpus?.
amid [387]

The name of the technology that lets ryzen™ 5 series cpus access the entire gddr memory of radeon™ rx gpus is AMD Smart Access Memory.

<h3>What is AMD Smart Access Memory?</h3>

AMD Smart Access Memory is known to be a type of memory that helps AMD Ryzen processors to use all their  full power of the graphics card memory.

Conclusively, it is a memory that gives room for a person to combine a Radeon RX 6000 series GPU with the used of a Ryzen processor to make your gaming performance better.

Learn more about AMD Memory from

brainly.com/question/18846925

6 0
2 years ago
Which of the following is the best example of market censorship
Papessa [141]
To bleep it out! hopefully this helped
4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the definition of legal intrusion
    14·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
    14·2 answers
  • The diagnostic test that involves watching a computer monitor with alternating checkerboard patterns while an eeg is performed i
    11·2 answers
  • Does this mechanism increase or decrease speed? Why?
    9·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Y'+2y = 5-e^(-4x), y(0)=-11
    9·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!