1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
12

From topic 6 (IT Infrastructures and Emerging Technologies) read the Interactive Session: Management “Organizations” (Chapter 5,

page 223) and answer all the following questions:
1. What business benefits do cloud computing services provide? What problems do they solve?

2. What are the disadvantages of cloud computing?

3. How do the concepts of capacity planning, scalability, and TCO apply to this case? Apply these concepts both to Amazon and to subscribers of its services?

4. What kinds of businesses are most likely to benefit from using cloud computing? Why?
From topic 7 (Foundations of Business Intelligence: Database and Information management) read the Interactive Session: Management “Management” (Chapter 6, page 275) and answer all the following questions:

1. Discuss the role of information policy, data administration, and efforts to ensure data quality in improving data management at American Water.

2. Describe roles played by information systems specialists and end users in American Water’s systems transformation project.

3. Why was the participation of business users so important? If they didn’t play this role, what would have happened?

4. Give some examples of problems that would have occurred at American Water if its data were not “clean”?
From topic 8 (Securing Information Systems) read the Interactive Session: Management “Management” (Chapter 8, page 347) and answer all the following questions:

1. Is cyberwarfare a serious problem? Why or why not?

2. Assess the management, organization, and technology factors that have created this problem.

3. What makes Stuxnet different from other cyberwarfare attacks? How serious a threat is this technology?

4. What solutions have been proposed for this problem? Do you think they will be effective? Why or why not?
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0

Answer:

please ask one by one sorry

You might be interested in
Given parameters b and h which stand for the base and the height of an isosceles triangle (i.e., a triangle that has two equal s
schepotkina [342]

Answer:

The area of the triangle is calculated as thus:

Area = 0.5 * b * h

To calculate the perimeter of the triangle, the measurement of the slant height has to be derived;

Let s represent the slant height;

Dividing the triangle into 2 gives a right angled triangle;

The slant height, s is calculated using Pythagoras theorem as thus

s = \sqrt{b^2 + h^2}

The perimeter of the triangle is then calculated as thus;

Perimeter = s + s + b

Perimeter = \sqrt{b^2 + h^2} + \sqrt{b^2 + h^2} +b

Perimeter = 2\sqrt{b^2 + h^2} + b

For the volume of the cone,

when the triangle is spin, the base of the triangle forms the diameter of the cone;

Volume = \frac{1}{3} \pi * r^2 * h

Where r = \frac{1}{2} * diameter

So, r = \frac{1}{2}b

So, Volume = \frac{1}{3} \pi * (\frac{b}{2})^2 * h

Base on the above illustrations, the program is as follows;

#include<iostream>

#include<cmath>

using namespace std;

void CalcArea(double b, double h)

{

//Calculate Area

double Area = 0.5 * b * h;

//Print Area

cout<<"Area = "<<Area<<endl;

}

void CalcPerimeter(double b, double h)

{

//Calculate Perimeter

double Perimeter = 2 * sqrt(pow(h,2)+pow((0.5 * b),2)) + b;

//Print Perimeter

cout<<"Perimeter = "<<Perimeter<<endl;

}

void CalcVolume(double b, double h)

{

//Calculate Volume

double Volume = (1.0/3.0) * (22.0/7.0) * pow((0.5 * b),2) * h;

//Print Volume

cout<<"Volume = "<<Volume<<endl;

}

int main()

{

double b, h;

//Prompt User for input

cout<<"Base: ";

cin>>b;

cout<<"Height: ";

cin>>h;

//Call CalcVolume function

CalcVolume(b,h);

//Call CalcArea function

CalcArea(b,h);

//Call CalcPerimeter function

CalcPerimeter(b,h);

 

return 0;

}

3 0
3 years ago
In order to print multiple worksheets, what needs to happen before printing?
ryzh [129]

Answer:

Explanation:

Click the File tab.

Click Print, or press the control p keyboard command.

On the Print screen, select the printer and other settings.

Click Print.

7 0
3 years ago
How would you "break" a firewall in a laptop computer if you were no longer a administrator? (Cyber Security Related, Computers
4vir4ik [10]
Okay so what you would is press ctrl+alt+delete and click log out i think but if you have a disk put it in and secure everything trust me i am a computer savage. i hack thing all the time.

6 0
3 years ago
If you want to selectively darken an area of an image you could use the
DerKrebs [107]
Create an adjustment layer and create a hue and saturation layer. You'll see sliders so adjust them to your liking. next select a layer mask and fill it will black. then select which areas you want to darken and use the wand tool. Apply a gradient mask if you want. 
5 0
3 years ago
An organization needs to maintain data files of its employees in the form of tables. They also need to access and update over th
olga nikolaevna [1]

Answer:

A

Explanation:

Database software is a software program or utility used for creating, editing and maintaining database files and records. This type of software allows users to store data in the form of structured fields, tables and columns, which can then be retrieved directly and/or through programmatic access.

7 0
2 years ago
Other questions:
  • When presentations are being shown to an audience of over fifty people, how they should be displayed?
    5·2 answers
  • Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?
    10·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Please answer this a due tomorrow!!!
    5·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • When targeting customers of the consumer population at market a product, what type of segmentation information would be most hel
    12·2 answers
  • Which iteration must have an expression that has a true or false value?
    11·2 answers
  • What is a geam in the ggplot2 system?
    5·1 answer
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
  • An agile team has which two characteristics? (choose two. ).
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!