MIS 350 Module 14 Use It

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Cloud computing services can be delivered at various layers of computing functions depending on what types of configuration changes the customer is able to make and how much responsibility the customer has for security, updates, and maintenance. Identify the type of cloud computing delivery model illustrated in each scenario.

-PaaS: Reid runs his serverless application in the cloud where virtual resources scale automatically to the demand placed on application services. -IaaS: Sulay is setting up a cluster of Web Servers to run in virtual machines hosted in his provider's public cloud. -SaaS: Olivia saves her PowerPoint presentation to her cloud storage application and shares the folder with her co-presenters. -SaaS: While traveling for a conference, Rachael accesses her company's Web-Hosted CRM application from her laptop.

Recent trends in software and service distribution include pull and push technology. These options differ depending on whether information is distributed automatically or only by direct request from the user or application. Identify which distribution technology is being used in each scenario.

Push: -Phillipa discusses weekend plans with a friend in a chat app on her laptop -The notification light on Brian's phone starts blinking, indicating he has a new email Pull: -Ahmed downloads a copy of his research paper from his school's cloud storage -Kara checks her RSS reader app for updated content on her favorite RSS feeds.

You're a sales representative for a vehicle manufacturer that builds custom order cars at affordable price points with low-cost, in-house financing options. Your company has recently deployed an app for customers to configure and order their customized vehicle and apply for financing. The app relies on blockchain technology to improve information sharing with customers and providers that is more accurate and more quickly available to all interested parties. You're meeting with a new customer to help her evaluate her options and configure her order according to her preferences. Customer: I've never ordered something so expensive like a car from a smartphone app before. How can I know this is safe? You: All of your information is encrypted end-to-end so that, even if someone intercepted the data, they couldn't read it. The underlying __________ technology also ensures that once you place your order, it can't be altered. a) Blockchain b) Cryptocurrency c) Encryption d) Quantum

a) Blockchain

Customer: How can they make sure the order doesn't get changed? You: Transactions are recorded across a __________ network so that multiple copies of every transaction exist. Even if someone could tamper with one copy, they couldn't get to all copies. a) Distributed b) Local c) Corporate d) Public

a) Distributed

Your company is considering converting their security surveillance infrastructure to cloud-based solutions, a strategy sometimes called Physical Security as a Service (PSaaS). The existing security cameras are old, producing low quality video output, and requiring high volume storage space and constant human monitoring to detect and respond to problems. The security director has requested an upgrade to cloud-hosted surveillance technology that can automatically scan for signs of security problems such as gunshots or movement outside of office hours. Your job is to investigate the options from a technical perspective and determine how well available options could fit your company's needs. Security director: What does this look like on a practical level? Does all of the security camera data go to the cloud service provider's location for analysis? You: Actually, we need something faster than that. By employing __________ , camera feeds can be partially processed by the devices themselves, and lower priority data is sent to the cloud provider for processing and storage. a) Edge Computing b) Distributed Computing c) Remote Computing d) Secure Computing

a) Edge Computing

Shelle needs a system that is not prohibitively expensive and that can be moved from location to location so training can be brought closer to customers throughout the country. Which technology will best meet these requirements? a) HMD b) CAGR c) CAVE d) VRD

a) HMD

Security director: As you know, we're considering adding three new branch offices in the next two years. How expensive will it be to add security monitoring and surveillance for those properties? You: The expansion will actually allow us to benefit yet again from this migration to cloud-based security. The video surveillance SaaS is highly __________ , so dollar for dollar, each new property will be cheaper to secure than the first one. a) Scalable b) Technical c) Resilient d) Regulated

a) Scalable

Security director: How secure is our data if it's leaving our data center and being handled by someone else? You: Cloud security is handled through a shared responsibility model. For example, we're responsible for encrypting our data before sending it to the cloud provider, but they're responsible for __________ security while the data is being processed by their software and while it's in storage. a) Server Side b) Client Side c) Provider Side d) Customer Side

a) Server Side

Customer: If all those copies of my data are out there, how can you keep it safe? What keeps the wrong people from getting to it? You: Great question. With something like cryptocurrency, the data is publicly available. But with our app, the relevant data is available only to approved third parties, such as suppliers or the bank or insurance companies. You and the people serving you, such as the finance company, can get detailed updates for increased __________ transparency, but the general public has no access to this information. a) Supply Chain b) Audit Trail c) Claims Processing d) Smart Contract

a) Supply Chain

All of the following are a part of cloud computing services except: a) Platform as a Service (PaaS) b) Software as a Service (SaaS) c) Information as a Service (IaaS) d) Infrastructure as a Service (IaaS)

c) Information as a Service (IaaS)

Shelle works for an insurance company that is looking for ways to help its customers improve their driving habits. After conducting some initial marketing surveys, the marketing team has decided to move forward with a training program that occurs in a simulated environment of some kind. Shelle's job is to conduct a feasibility study to determine what kind of investment will be required, what the outcome might look like, and how to best accomplish the project's goals. The marketing team wants the simulated environment to provide a fully immersive experience that will expose drivers to a variety of driving conditions and challenges. What kind of technology is best suited to this purpose? a) CR b) AR c) VR d) MR

c) VR


Set pelajaran terkait

Unit 6- Accounting and Financial Management

View Set

Ch. 8 Gene transfer and genetic engineering

View Set

Ch. 21 Oral-Health systemic connection

View Set

ALL the social psych test questions

View Set

Business Ethics Chapter 1 & 2 Review

View Set