Term
|
Definition
| a model that shows how the application is deployed across networks and computers |
|
|
Term
|
Definition
| broad design of the overall system structure; also called general design or conceptual design |
|
|
Term
|
Definition
| low level design that includes the design of the specific program details |
|
|
Term
|
Definition
| a computer network in which the cabling and hardware are confined to a single location |
|
|
Term
|
Definition
| the computers at which the users work to perform their computational tasks |
|
|
Term
|
Definition
| the central computer that provides services( such as database access) to the client computers over network |
|
|
Term
| Client Server Architecture |
|
Definition
| a computer network configuration with users computers and central computers that provide common services |
|
|
Term
| Hypertext Markup Language (HTML) |
|
Definition
| The predominant language for constructing web pages and which consist of tags and rules about how to display pages |
|
|
Term
| Transmission Control protocal/ internet protocal (TCP/IP) |
|
Definition
| The foundation protocal of the internet; used to provide reliable delivery of messages between networked computers |
|
|
Term
|
Definition
| a client/ server architecture that divides an application into view layer, business logic layer and data layer |
|
|
Term
|
Definition
| the part of the three layer architecture that contains the user interface |
|
|
Term
|
Definition
| which manages stored data usually in one or more databases |
|
|
Term
| Hypertext transfer protocal secure |
|
Definition
| an encrypted form of information transfer on the internet that combines HTTP and TLS |
|
|
Term
| Transport layer security (TLS) |
|
Definition
| an advances version of secure sockets layer |
|
|
Term
| Content delivery network (CDN) |
|
Definition
| a set of server computers, separate from the hosting computers used to deliver such static content as images or videos |
|
|
Term
|
Definition
| the process of providing physical servers at a secure location and selling those services to other business that wish to deploy websites |
|
|
Term
|
Definition
| The hardware environment must be completely reliable because customers and other parties usually have a very low tolerance for systems that aren't available. This often requires mirroring computers, hard drives, database records. Back up recovery must be well established |
|
|
Term
|
Definition
| The systems hardware and software must be secure. The current legal regulations for financial and health care data require a very high level of security. Penalties are severe |
|
|
Term
|
Definition
| To ensure reliability and security, special rooms or even special buildings are often required. In addition, internet connectivity frequently requires multiple access routes to the internet backbone. Electrical power must be secure, which often means having backup generators on site. And air conditions units must be adequate with back up facilies, to ensure a constant physical environment. |
|
|
Term
|
Definition
| To ensure reliability and security a well qualifies technical staff needs to be on site 24/7 |
|
|
Term
|
Definition
| External systems often grow dramatically as a business expands, increasing the number of servers needed to respond to the traffic. |
|
|
Term
|
Definition
| A hosting service with a secure location but in which the computers are usually owned by the client business |
|
|
Term
|
Definition
| a method to partition the services of a physical web server so it appears as multiple independent internet servers |
|
|
Term
|
Definition
| an extenstion of virtual servers in which the resources available include computing storage and internet access and appear to have unlimited availability |
|
|
Term
| Service Level Agreement (SLA) |
|
Definition
| part of the contract between a business and hosting company that guarantees a specific level of system availability |
|
|
Term
|
Definition
| A closed network with security and closed access built on top of a public network such as the internet |
|
|