1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
11

Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati

on as a service.
Computers and Technology
1 answer:
Simora [160]3 years ago
4 0

Answer:

Internal Cloud:

An Internal Cloud is also known as a Corporate Cloud. It's a cloud computing service model that is implemented within an organization's dedicated resources and infrastructure. It also apply virtualization mechanism, shared storage and network resources to facilitate full control of an organization's cloud environment.

External Cloud:

An external cloud is a cloud solution that exists outside of an organization's physical boundaries. It allows companies to rent software and delivered security over the web, integrated to the back-end system. The services delivering through cloud solution will match that to a private cloud, but all the physical resources are external to the organization.

The Pros and Cons of the cloud services:

<u>On the up side: </u>

1: Fast start-up:

Cloud computing allows you to test your business plan very quickly for little money. It has changed the game of entrepreneurs. On the launch day, you have the confidence that you scale the world.

2: Business agility:

Cloud computing changes the whole world pattern of agility at a much lower cost.

3: Faster product development:

It reduced the moving applications and data time (one cloud to another) drop from weeks to minutes.

<u>On the down side: </u>

1: Bandwidth could bust your budget:

The network cost would be so large that you might buy the cloud storage rather than paying someone else for it.

2: Limited control and flexibility:

Since the remote software is being used, it usually lacks the features of an application running locally.

3: Increased Vulnerability:

As we know that the cloud based solutions are exposed on the public internet and are a more vulnerable target for malicious users and hackers. Nothing on the internet is completely secure and even the biggest players suffers from serious attacks and security breaches.

You might be interested in
En la historia del Computador porque se caracteriza la primera generación? *
Nadusha1986 [10]

D. Por el uso de tubos de vacio.

8 0
3 years ago
What is output by the following?<br><br>print (type("95"))
statuscvo [17]

Answer:

The output is "<class 'str'> ".

Explanation:

In the given python code a print() function is defined. Inside this function, a type() function will use, in which a numeric value is passed in the double quotes (" ") as a function parameter. Double quotes are normally used for print value as a message but in this code, value is not printed because we use the type() function.

  • The type() function Returns the parameter class type of the argument(object).
  • This function is used for debugging. In this function, we pass a single parameter that will return the type of given object.
6 0
3 years ago
What is it called when you define a variable for the first time
Nimfa-mama [501]

Answer:

That is called declaring a variable

Explanation:

6 0
2 years ago
Read 2 more answers
In the circuit seen here, the resistor has a resistance of 3 ohms. If no change in the battery size occurs, what will happen to
Rufina [12.5K]

It will increase by a factor of 2

6 0
3 years ago
Read 2 more answers
Nathan would like to save his PowerPoint presentation as a video that can be replayed easily on any device at full quality. Whic
valentina_108 [34]

Answer:

Presentation Quality

Explanation:

It will be full quality as it is from when your presenting

6 0
3 years ago
Other questions:
  • We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries.
    13·1 answer
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • Why are you unable to modify the budget file, when you have the allow full control ntfs permission?
    5·1 answer
  • 9. The voltage of a replacement capacitor must
    11·1 answer
  • Miguel owns a tile business. He has two employees who work in a small office. One answers phones and schedules appointments. Ano
    11·2 answers
  • You can place an insertion point by clicking in the field or by pressing ____.
    13·1 answer
  • Write the header file Stadium.h for a Stadium class. The Stadium class has the following data members: 1) an array of 1000 Seat
    7·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
  • Explain why a holiday on a cruise liner will be an ideal holiday​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!