Learning Aim C Flashcards
What are some personal uses of cloud storage
1.File backup and recovery
2.Sharing and collaboration
3.Photo and video
4.Media streaming
5.Convenience
6.Personal projects and hobbies
7.Digital organization
8.Automatic backup for mobile devices
What are the 3 services provided in cloud computing
• Applications, referred to as Software as a Service (SaaS)
• Platforms, referred to as Platform as a Service (PaaS)
• Infrastructure, referred to as Infrastructure as a Service (laaS)
What is software as a service (SaaS)
is a cloud computing model where software applications are delivered over the internet. Instead of purchasing and installing software on individual devices, users access it via a web browser, typically on a subscription basis.
Some features of SaaS
Key Features of SaaS:
1.Accessibility: Available anytime, anywhere with an internet connection.
2.Subscription-Based: Usually involves monthly or annual fees.
3.Maintenance-Free: Providers handle updates, maintenance, and security.
4.Scalability: Easy to scale up or down based on user needs.
What is platform as a service (PaaS)
is a cloud computing model that provides developers with a complete platform to build, deploy, and manage applications without worrying about the underlying infrastructure.
Some key features of PaaS
Key Features of PaaS:
1.Includes tools for application development, testing, and deployment.
2.Offers a managed environment with middleware, databases, and runtime.
3.Simplifies software development by removing infrastructure management.
4.Scalable based on demand.
What is infrastructure as a service (IaaS)
is a cloud computing model that provides virtualised computing resources over the internet. It offers foundational IT infrastructure, such as servers, storage and networking, allowing users to build and manage their own applications and services without maintaining physical hardware.
Key features of an infrastructure as a service
1.Scalability: Easily adjust resources (compute, storage, and networking) as needed.
2.Pay-as-You-Go Pricing: Users only pay for the resources they consume.
3.On-Demand Availability: Resources are available whenever needed without delays.
4.Customisation: Users can configure the operating system, software, and applications.
5.Data Storage: Secure and scalable storage options for files, databases, and backups.
6.Security: Basic security features like firewalls, encryption, and identity management.
Some examples of Saas
Examples of SaaS:
•Google Workspace (Docs, Sheets, Gmail)
•Microsoft 365 (Word, Excel, Teams)
•Dropbox, Slack, Salesforce
Examples of PaaS
Examples of PaaS:
•Google App Engine
•Microsoft Azure App Service
• Google AI Platform
• AWS Elastic Beanstalk (Amazon Web Services)
• Google Cloud SQL
Examples of Iaas
Examples of IaaS Providers:
• Amazon Web Services (AWS EC2)
• Microsoft Azure Virtual Machines
• Google Cloud Compute Engine
• IBM Cloud Infrastructure
What is remote working
is a work arrangement where employees perform their job duties outside of a traditional office environment, typically from home or other locations. Instead of commuting to an office, remote workers use digital tools, such as the internet, video conferencing, and collaboration software, to communicate and complete tasks.
Features of remote working
1.Flexibility: Workers can choose their work environment and often set their own hours.
2.Technology-Dependent: Relies on communication tools like email, video calls, and project management software.
3.Work-Life Balance: Offers more control over personal time, though it can blur boundaries between work and personal life.
4.Cost Savings: Reduces costs related to office space, commuting, and utilities.
Advantages of cloud computing
Cost: Cloud storage is typically less costly than buying sufficient disk storage or equivalent to store all the applications, organisational data and customer data.
Data security: Data held on a server on the premises is always at risk. Cloud providers have data centres located in several different geographical areas, with multiple redundancies so that data is always safe even if one data
centre is catastrophically destroyed.
Reliability: Cloud services and storage are more reliable than in-house applications. System maintenance, software updates and backups are all taken care of.
Scalability: As an organisation expands, its storage needs wil grow accordingly. When a 1TB server is close to filling up, should the company buy another 1Tb server at huge expense, which may not be used to capacity for many years? If the data needs become less, you cannot return the server and get a refund. With cloud storage,the organisation pays for the storage they are actually using, and this expands and contracts according to demand.
Flexibility: Organisations which experience very high activity on certain days of the year may find that a website held on a company server cannot cope with the extra demands, and the users may then experience very slow response times. A cloud-based website wil allocate the necessary resources to cope with any level of activity.
Global access: Applications and data held in the cloud are available from anywhere in the world where there is an Internet connection. Employees working for an organisation with offices in different towns can all access thesame software and data, and can access them from home or while travelling.
Drawbacks of cloud computing
Internet connection speed and reliability
Without a fast broadband connection, users in the office may find that it takes much longer to download data and perform application tasks than when everything is held on the local server.
If the Internet connection fails, no one in the office can access the cloud applications or data if synchronised versions are not held locally. Business could grind to a halt until the connection is restored.
Contingency plans are needed to cope with this situation.
Security threats
Data transmitted over the Internet is vulnerable to hackers. The best protection is to educate all employees:
• to use strong passwords on al their devices
• to recognise possible phishing attacks
• not to open email attachments from unknown sources