Question

Topic: Cloud Computing ~Definition of the topic ~Specific Computer functions or functionality impacted ~ Human Impact...

Topic: Cloud Computing
~Definition of the topic
~Specific Computer functions or functionality impacted
~ Human Impact (How computers are effected by humans and vice versa)
~Information and data impacted (software, personal or company information, etc.)
~Ways to improve security (reliability, availability, confidentiality, and / (or) integrity)
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Cloud Computing is a service which provides you computing services which includes servers, storage, databases, networking, software, analytics, intelligence, hardware virtualization, etc., over the internet and on a pay-as-you-go basis.

It reduces the man power in a company so it gives the cost benefit, and it also have some benefits like speed, global scale, productivity, performance, reliability and security.

By using cloud computing services like databases, storage then there is no need to purchase the high-end computers with huge storage memory. And also there is no need for more computers to maintain the servers and software data. This will gives the more impact on the normal traditional way of organizations.

Cloud Computing reduces the man power in a company because all the major works provided by the cloud company then with a few skilled staff you can run a company. If your staff isn’t skilled enough then you have to train them.

Financial impact like it reduces the staff and the cost to buy your own servers and software applications. You have to pay to the cloud companies for what service you need for your company.

Information and data of yours is highly secured because they maintain the multiple places(twin servers) to store the data. If one place is effected no problem the data is secured in another place.

Many cloud providers offer a broad set of security polices, technologies and controls that strengthen your security posture overall. And they helps to protect your data, apps and infrastructure from potential threats.

We have best providers available for cloud computing like Microsoft, Amazon and some other popular providers. And they provide reliability, availability, confidentiality and integrity to secure your companies software, data and personal or company information.

Add a comment
Know the answer?
Add Answer to:
Topic: Cloud Computing ~Definition of the topic ~Specific Computer functions or functionality impacted ~ Human Impact...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample fee...

    By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample feedback on your draft as well as ideas to improve it, please post your draft to the discussion board this week. This will allow your classmates to offer ideas.   When you examine the drafts submitted by others, please comment on the following: 1) Is the thesis offered by the writer effective? Why/why not? 2) Do you notice any issues with...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • ________ individuals attempt to control situations, including the thoughts and actions of others. Question 1 options:...

    ________ individuals attempt to control situations, including the thoughts and actions of others. Question 1 options: A) Analytical B) Responsive C) Versatile D) Expressive E) Assertive Save Question 2 (1 point) Ken likes to see the big picture when salespeople present to him. He finds it enjoyable to know a little about them and their families. He takes his work very seriously, and the company's overall success, as well as his own personal success, are very important to him. Ken...

  • Which of the following is an advantage of technology in nursing practice? a. inclination of nurses...

    Which of the following is an advantage of technology in nursing practice? a. inclination of nurses to focus on the equipment rather than the patient b. increased ability to monitor patients remotely c. increased confidentiality of patient information d. reliability of internet resources 2. When using computers in direct patient care, it is important to remember to: a. assess the patient and provide care based on the individual's needs b. look up the clinical practice guidelines for each illness use...

  • what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics...

    what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics mie B. Butts OBJECTIVES After reading this chapter, the reader should be able to do the following: 1. Explore the concept of medicalization as it relates to the societal shift away from physician predominance of the 1970s. 2. Differentiate among the following terms: compliance, noncompliance, adherence, nonadherence, and concordance. 3. Examine cultural views with regard to self-determination, decision making, and American healthcare professionals' values...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • 1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow...

    1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow to happen within the myofiber? (5 points) 2. According to the paper, what is the major disadvantage of relying on glycolysis during high-intensity exercise? (5 points) 3. Using Figure 1 in the paper, briefly describe the different sources of ATP production at 50% versus 90% AND explain whether you believe this depiction of ATP production applies to a Type IIX myofiber in a human....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT