1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
4 years ago
12

From topic 6 (IT Infrastructures and Emerging Technologies) read the Interactive Session: Management “Organizations” (Chapter 5,

page 223) and answer all the following questions:
1. What business benefits do cloud computing services provide? What problems do they solve?

2. What are the disadvantages of cloud computing?

3. How do the concepts of capacity planning, scalability, and TCO apply to this case? Apply these concepts both to Amazon and to subscribers of its services?

4. What kinds of businesses are most likely to benefit from using cloud computing? Why?
From topic 7 (Foundations of Business Intelligence: Database and Information management) read the Interactive Session: Management “Management” (Chapter 6, page 275) and answer all the following questions:

1. Discuss the role of information policy, data administration, and efforts to ensure data quality in improving data management at American Water.

2. Describe roles played by information systems specialists and end users in American Water’s systems transformation project.

3. Why was the participation of business users so important? If they didn’t play this role, what would have happened?

4. Give some examples of problems that would have occurred at American Water if its data were not “clean”?
From topic 8 (Securing Information Systems) read the Interactive Session: Management “Management” (Chapter 8, page 347) and answer all the following questions:

1. Is cyberwarfare a serious problem? Why or why not?

2. Assess the management, organization, and technology factors that have created this problem.

3. What makes Stuxnet different from other cyberwarfare attacks? How serious a threat is this technology?

4. What solutions have been proposed for this problem? Do you think they will be effective? Why or why not?
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
5 0

Answer:

please ask one by one sorry

You might be interested in
If any one answered this i will give brilientst what is stimulation program​
7nadin3 [17]

Explanation:

organized programs of enrichment designed to provide developmentally appropriate activities to babies and toddlers who have, or who are at risk for a variety of conditions (environmentally or biologically caused) that might interfere with their ability to ultimately have a full and productive life."

4 0
3 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
zhenek [66]

Answer:

A. Click on the Function Library group and select a function from the drop-down menu.

B. Click on the Function Library group and Insert Function.

E. Type = into any cell.

F. Click on the formula bar above the cells.

3 0
3 years ago
Read 2 more answers
Which of the following is a benifit of googling yourself ?
finlep [7]

Answer:

you are protecting yourself from identity theft

6 0
2 years ago
Complete two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product
asambeis [7]

Answer:

By thinking of ways to create environment friendly products such as biodegradable water bottles

3 0
3 years ago
Other questions:
  • What is the ratio between total bits required for such a cache implementation over the data storage bits?
    10·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • GUI stands for "___ user interface."
    9·2 answers
  • Karel challenges answers
    11·1 answer
  • Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative numbe
    13·1 answer
  • Does any body know how to bypass easy anti cheat on crossout
    7·1 answer
  • Q.drtrdyudoijoemrkdf
    6·2 answers
  • Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary c
    15·1 answer
  • Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environmen
    12·1 answer
  • What is<br> a an<br> output device
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!