preview

Nt1330 Unit 1 Assignment

Best Essays

Assignment One Cover Sheet This sheet must be completed and attached to the assignment by all students unless otherwise instructed. PLEASE COMPLETE 1. Student ID RAJPRD1501 Student Name Pathum Rukshan Sarathchandra Rajakaruna Mudalige Class Time / Day Thursday Afternoon Assignment Due Date Friday 21 of August 2015 PLAGIARISM AND COLLUSION • Plagiarism occurs when a student attempts to pass off as their own work, the work of another, without any acknowledgement as to its authorship or source. • Collusion occurs when a student obtains the agreement of another person for a fraudulent purpose with the intent of obtaining an advantage in submitting an assignment or other work. • A definition of plagiarism/collusion …show more content…

This assured requirement forms an inherent dependency on interconnected networking which is known as internetworking. Internetworks, or the Internet, allow for the remote supplying of IT resources to the people and are directly helpful in network access in far and wide. Cloud consumers can access the cloud using only private and dedicated network links in LANs, although most clouds are Internet-enabled. The Cloud platforms generally grows in parallel with improvement in Internet connectivity and service quality, which leads to its potentiality. 2 . Data Center Technology This allows arranging IT resources in close proximity with one another, instead of keeping them geographically distributed. This allows for power sharing, higher efficiency in shared IT resource usage, and enhanced accessibility for IT personnel. These are the benefits that naturally popularized the Data Center concept. Modern data centers exist as specialized IT infrastructure used to house centralized IT resources, such as servers, databases, networking and telecommunication devices, and software systems. Data centers are typically comprised of the following technologies and components: • Virtualization • Standardization and Modularity • Automation • Remote operation and Management • Security – Aware design, operation and Management 3 . Virtualization Technology In computing, virtualization means to create a virtual version of a resource or device, like a server, storage

Get Access