SlideShare a Scribd company logo
1. What are the different types of application architectures?
a. Host-Based Architectures.
b. Client-Based Architectures.
c. Client Server-Architectures.
d. Peer to Peer Architectures.
e. Choosing Architectures.
f. A monster Client Server Architectures.
g. Cloud Computing Architectures.
2. Describe the four basic functions of an application software
package.
a Data Storage. Storing of data generated by programs (e.g
Files, records).
b. Application Logic. This is inline of Business login such as
work processors, spreadsheets and presentation application.
c. Data access for processing required accessing stored data like
SQL, Oracle data base etc,
d. Presentation logic info to user and acceptance of users
commands.
3. What are the advantages and disadvantages of
host-based networks versus client–server networks?
The advantage for host-based network centralized security Integrated
architecture from single vendor simpler, centralization installation.
Client -Server balanced processing commands and lower cost
inexpensive infrastructure can use software and hardware from different
vendors scalabilities.
The disadvantages. Having all processing on host mat lead to overload
cost of software and upgrades expensive infrastructure terminal totally
dependent on server.
Client to client problems with using software from different vendors is
more complex installation helps greatly in this area.
4. What is middleware, and what does it do?
Middleware manages client -server message transfer and shields
application software from impacts to hardware changes. Middleware
provides standard communication between products of different vendors
through translation.
5. Suppose your organization was contemplating switching
from a host-based architecture to client–server.
What problems would you foresee?
Security would be one area of major concern, since processing can be
done on individual workstations.
6. Compare two-tier, three-tier, and n-tier
client–server architectures. What are the technical differences,
and what advantages and disadvantages does
each offer?
Two-tiered architectures have only client and servers. Three-tiered
architecture typically separate application logic, data access logic,
presentation logic and storage.
7. What are the benefits of cloud computing?
The benefits of cloud computing is to maximize data storage and
potentially lower cost and scalability.
8. Compare the three-cloud computing
models.
9. What is a network computer?
A Computer network support internet access but has no hard drive disk
local storage.
10. For what is HTTP used? What are its major parts?
The standard protocol for communication between a Web browser and a
Web server is Hypertext Transfer Protocol (HTTP). An HTTP request
from a Web browser to a web server has three parts. Only the first part is
required, the other two are optional.
The Major parts is that it request line which start with a command and
provides the URL and ends with HTTP version number that the browser
understands.
The request body which contains information sent to the server, such as
information from a form.
The format of an HTTP response from the server to the browser is very
similar to the browser request. It has three parts, but only the last is
required, the first two is optional. The response status, which contains
the HTTP version number the server has used, a status code and reason
phrase.
The request header which contains a variety of optional information
such as the Web browser being used (e.g) Internet Explorer), the date
and a user ID and Password for use if the Web Page is password
protected.
11. Describe how a Web browser and Web server work
together to send aWeb page to a user
The standard protocol for communication between a Web browser and a
web server is Hypertext Transfer Protocol (HTTP) The user must type
the initernet uniform resources locator. URL for the page to open. The
URL specifies the internet address of the web server and directory and
name of the specific page wanted. In order for the request from the Web
browser to be understood by the web server, they must use the same
standard protocol. The standard protocol for the communication between
a Web browser and a Web server is Hypertext Transfer Protocol (HTTP)
12. What are the major parts of an email message?
The major part of an email is the header that list the source destination
eg. info@idglobaltech.com and on the email, it contains the date and
time of the sender. The body contains the message and also the signature
of the sender below in the body of the message.
Ad

More Related Content

What's hot (20)

REST API
REST APIREST API
REST API
Kanushka Gayan
Ā 
Intro webapps
Intro webappsIntro webapps
Intro webapps
Howard Mao
Ā 
ch8
ch8ch8
ch8
KITE www.kitecolleges.com
Ā 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
pruthvi2898
Ā 
Introduction about Internet
Introduction about InternetIntroduction about Internet
Introduction about Internet
Aadil Khan
Ā 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
Arun Kumar
Ā 
Ado
AdoAdo
Ado
abhay singh
Ā 
webserver overload
 webserver  overload  webserver  overload
webserver overload
Maher Manan
Ā 
Ead pertemuan-7
Ead pertemuan-7Ead pertemuan-7
Ead pertemuan-7
Yudha Arif Budiman
Ā 
INTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project reportINTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project report
KULDEEPSINGH CHAUHAN
Ā 
Web service
Web serviceWeb service
Web service
abhay singh
Ā 
Bdc Screens
Bdc ScreensBdc Screens
Bdc Screens
LiquidHub
Ā 
ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2
Mohammad Chamanpara
Ā 
Java servlets
Java servletsJava servlets
Java servlets
VijayapriyaPandi
Ā 
Json web tokens
Json web tokensJson web tokens
Json web tokens
ElieHannouch
Ā 
e-SUAP - Data access server side (English)
e-SUAP - Data access server side (English)e-SUAP - Data access server side (English)
e-SUAP - Data access server side (English)
Sabino Labarile
Ā 
ip1clientserver model
 ip1clientserver model ip1clientserver model
ip1clientserver model
monikadeshmane
Ā 
ReSTful API Final
ReSTful API FinalReSTful API Final
ReSTful API Final
Claudine Bruyns
Ā 
Web services
Web servicesWeb services
Web services
ishmecse13
Ā 
Mule connectors
Mule connectorsMule connectors
Mule connectors
Krishna_in
Ā 
Intro webapps
Intro webappsIntro webapps
Intro webapps
Howard Mao
Ā 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
pruthvi2898
Ā 
Introduction about Internet
Introduction about InternetIntroduction about Internet
Introduction about Internet
Aadil Khan
Ā 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
Arun Kumar
Ā 
webserver overload
 webserver  overload  webserver  overload
webserver overload
Maher Manan
Ā 
INTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project reportINTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project report
KULDEEPSINGH CHAUHAN
Ā 
Web service
Web serviceWeb service
Web service
abhay singh
Ā 
Bdc Screens
Bdc ScreensBdc Screens
Bdc Screens
LiquidHub
Ā 
ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2
Mohammad Chamanpara
Ā 
Json web tokens
Json web tokensJson web tokens
Json web tokens
ElieHannouch
Ā 
e-SUAP - Data access server side (English)
e-SUAP - Data access server side (English)e-SUAP - Data access server side (English)
e-SUAP - Data access server side (English)
Sabino Labarile
Ā 
ip1clientserver model
 ip1clientserver model ip1clientserver model
ip1clientserver model
monikadeshmane
Ā 
Web services
Web servicesWeb services
Web services
ishmecse13
Ā 
Mule connectors
Mule connectorsMule connectors
Mule connectors
Krishna_in
Ā 

Similar to Application layer assignments (20)

Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
TylerYuli
Ā 
.Net Framework Architecture: All You Need to Know: All You Need to Know
.Net Framework Architecture: All You Need to Know: All You Need to Know.Net Framework Architecture: All You Need to Know: All You Need to Know
.Net Framework Architecture: All You Need to Know: All You Need to Know
dotnetindiaexperts
Ā 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
Ā 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
Ā 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
AlokKumar250045
Ā 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
berihunmolla2
Ā 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
Austina Francis
Ā 
Bt0078 website design 2
Bt0078 website design 2Bt0078 website design 2
Bt0078 website design 2
Techglyphs
Ā 
WP Chap 1 & 2.pptx
WP Chap 1 & 2.pptxWP Chap 1 & 2.pptx
WP Chap 1 & 2.pptx
AnkitaChauhan79
Ā 
Web technology
Web technologyWeb technology
Web technology
Anuj Singh Rajput
Ā 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS
koolkampus
Ā 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
Pamela Wright
Ā 
Web server
Web serverWeb server
Web server
Alieska Waye
Ā 
0130225347
01302253470130225347
0130225347
Dharmendra Gupta
Ā 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGY
Vinay Kumar
Ā 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
FernandoLipardoJr
Ā 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
Ā 
World Wide Web(WWW)
World Wide Web(WWW)World Wide Web(WWW)
World Wide Web(WWW)
Pratik Tambekar
Ā 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
Ā 
Application_layer.pdf
Application_layer.pdfApplication_layer.pdf
Application_layer.pdf
BhoomikaPrajapath
Ā 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
TylerYuli
Ā 
.Net Framework Architecture: All You Need to Know: All You Need to Know
.Net Framework Architecture: All You Need to Know: All You Need to Know.Net Framework Architecture: All You Need to Know: All You Need to Know
.Net Framework Architecture: All You Need to Know: All You Need to Know
dotnetindiaexperts
Ā 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
Ā 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
Ā 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
AlokKumar250045
Ā 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
Austina Francis
Ā 
Bt0078 website design 2
Bt0078 website design 2Bt0078 website design 2
Bt0078 website design 2
Techglyphs
Ā 
WP Chap 1 & 2.pptx
WP Chap 1 & 2.pptxWP Chap 1 & 2.pptx
WP Chap 1 & 2.pptx
AnkitaChauhan79
Ā 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS
koolkampus
Ā 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
Pamela Wright
Ā 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGY
Vinay Kumar
Ā 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
FernandoLipardoJr
Ā 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
Ā 
World Wide Web(WWW)
World Wide Web(WWW)World Wide Web(WWW)
World Wide Web(WWW)
Pratik Tambekar
Ā 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
Ā 
Ad

Recently uploaded (20)

UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
Ā 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
Ā 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
Ā 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
Ā 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
Ā 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
Ā 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
Ā 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
Ā 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
Ā 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
Ā 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
Ā 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
Ā 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
Ā 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
Ā 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
Ā 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
Ā 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
Ā 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
Ā 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
Ā 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
Ā 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
Ā 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
Ā 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
Ā 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
Ā 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
Ā 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
Ā 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
Ā 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
Ā 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
Ā 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
Ā 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
Ā 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
Ā 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
Ā 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
Ā 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
Ā 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
Ā 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
Ā 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
Ā 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
Ā 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
Ā 
Ad

Application layer assignments

  • 1. 1. What are the different types of application architectures? a. Host-Based Architectures. b. Client-Based Architectures. c. Client Server-Architectures. d. Peer to Peer Architectures. e. Choosing Architectures. f. A monster Client Server Architectures. g. Cloud Computing Architectures. 2. Describe the four basic functions of an application software package. a Data Storage. Storing of data generated by programs (e.g Files, records). b. Application Logic. This is inline of Business login such as work processors, spreadsheets and presentation application. c. Data access for processing required accessing stored data like SQL, Oracle data base etc, d. Presentation logic info to user and acceptance of users commands. 3. What are the advantages and disadvantages of host-based networks versus client–server networks? The advantage for host-based network centralized security Integrated architecture from single vendor simpler, centralization installation. Client -Server balanced processing commands and lower cost inexpensive infrastructure can use software and hardware from different vendors scalabilities. The disadvantages. Having all processing on host mat lead to overload cost of software and upgrades expensive infrastructure terminal totally dependent on server.
  • 2. Client to client problems with using software from different vendors is more complex installation helps greatly in this area. 4. What is middleware, and what does it do? Middleware manages client -server message transfer and shields application software from impacts to hardware changes. Middleware provides standard communication between products of different vendors through translation. 5. Suppose your organization was contemplating switching from a host-based architecture to client–server. What problems would you foresee? Security would be one area of major concern, since processing can be done on individual workstations. 6. Compare two-tier, three-tier, and n-tier client–server architectures. What are the technical differences, and what advantages and disadvantages does each offer? Two-tiered architectures have only client and servers. Three-tiered architecture typically separate application logic, data access logic, presentation logic and storage. 7. What are the benefits of cloud computing? The benefits of cloud computing is to maximize data storage and potentially lower cost and scalability. 8. Compare the three-cloud computing models.
  • 3. 9. What is a network computer? A Computer network support internet access but has no hard drive disk local storage. 10. For what is HTTP used? What are its major parts? The standard protocol for communication between a Web browser and a Web server is Hypertext Transfer Protocol (HTTP). An HTTP request from a Web browser to a web server has three parts. Only the first part is required, the other two are optional. The Major parts is that it request line which start with a command and provides the URL and ends with HTTP version number that the browser understands. The request body which contains information sent to the server, such as information from a form. The format of an HTTP response from the server to the browser is very similar to the browser request. It has three parts, but only the last is required, the first two is optional. The response status, which contains the HTTP version number the server has used, a status code and reason phrase. The request header which contains a variety of optional information such as the Web browser being used (e.g) Internet Explorer), the date and a user ID and Password for use if the Web Page is password protected. 11. Describe how a Web browser and Web server work together to send aWeb page to a user The standard protocol for communication between a Web browser and a web server is Hypertext Transfer Protocol (HTTP) The user must type the initernet uniform resources locator. URL for the page to open. The
  • 4. URL specifies the internet address of the web server and directory and name of the specific page wanted. In order for the request from the Web browser to be understood by the web server, they must use the same standard protocol. The standard protocol for the communication between a Web browser and a Web server is Hypertext Transfer Protocol (HTTP) 12. What are the major parts of an email message? The major part of an email is the header that list the source destination eg. [email protected] and on the email, it contains the date and time of the sender. The body contains the message and also the signature of the sender below in the body of the message.