Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Recent trends in software and service distribution include pull and push technology. These options differ depending on whether information is distributed automatically or only by

Recent trends in software and service distribution include pull and push technology. These options differ depending on whether information is distributed automatically or only by direct request from the user or application.

Identify which distribution technology is being used in each scenario.

Pull Ahmed downloads a copy of his research paper from his school's cloud storage.
Push Kara checks her RSS reader app for updated content on her favorite RSS feeds.
Philippa discusses weekend plans with a friend in a chat app on her laptop.
The notification light on Brian's phone starts blinking, indicating he has received a new email.

Shelle works for an insurance company that is looking for ways to help its customers improve their driving habits. After conducting some initial marketing surveys, the marketing team has decided to move forward with a training program that occurs in a simulated environment of some kind. Shelle's job is to conduct a feasibility study to determine what kind of investment will be required, what the outcome might look like, and how to best accomplish the project's goals.

The marketing team wants the simulated environment to provide a fully immersive experience that will expose drivers to a variety of driving conditions and challenges. What kind of technology is best suited to this purpose?

a. AR
b. MR
c. VR
d. CR

Shelle needs a system that is not prohibitively expensive and that can be moved from location to location so training can be brought closer to customers throughout the country. Which technology will best meet these requirements?

a. CAGR
b. VRD
c. CAVE
d. HMD

Cloud computing services can be delivered at various layers of computing functions depending on what types of configuration changes the customer is able to make and how much responsibility the customer has for security, updates, and maintenance.

Identify the type of cloud computing delivery model illustrated in each scenario.

SaaS Olivia saves her PowerPoint presentation to her cloud storage application and shares the folder with her co-presenters.
IaaS Reid runs his serverless application in the cloud where virtual resources scale automatically to the demand placed on application services.
PaaS Sulay is setting up a cluster of Web servers to run in virtual machines hosted in his provider's public cloud.
While traveling for a conference, Rachel accesses her company's Web-hosted CRM application from her laptop.

Your company is considering converting their security surveillance infrastructure to cloud-based solutions, a strategy sometimes called Physical Security as a Service (PSaaS). The existing security cameras are old, producing low quality video output, and requiring high volume storage space and constant human monitoring to detect and respond to problems. The security director has requested an upgrade to cloud-hosted surveillance technology that can automatically scan for signs of security problems such as gunshots or movement outside of office hours. Your job is to investigate the options from a technical perspective and determine how well available options could fit your company's needs.

Security director:

What does this look like on a practical level? Does all of the security camera data go to the cloud service provider's location for analysis?

You:

Actually, we need something faster than that. By employing Select A) edge computing B) distributed computing C) remote computing D) secure computing, camera feeds can be partially processed by the devices themselves, and lower priority data is sent to the cloud provider for processing and storage.

Security director:

How secure is our data if it's leaving our data center and being handled by someone else?

You:

Cloud security is handled through a shared responsibility model. For example, we're responsible for encrypting our data before sending it to the cloud provider, but they're responsible for Select A) server side B) client side C) provider side D) customer side security while the data is being processed by their software and while it's in storage.

Security director:

As you know, we're considering adding three new branch offices in the next two years. How expensive will it be to add security monitoring and surveillance for those properties?

You:

The expansion will actually allow us to benefit yet again from this migration to cloud-based security. The video surveillance SaaS is highly Select A) scalable B) technical C) resilient D) regulated , so dollar for dollar, each new property will be cheaper to secure than the first one.

You're a sales representative for a vehicle manufacturer that builds custom order cars at affordable price points with low-cost, in-house financing options. Your company has recently deployed an app for customers to configure and order their customized vehicle and apply for financing. The app relies on blockchain technology to improve information sharing with customers and providers that is more accurate and more quickly available to all interested parties. You're meeting with a new customer to help her evaluate her options and configure her order according to her preferences.

Customer:

I've never ordered something so expensive like a car from a smartphone app before. How can I know this is safe?

You:

All of your information is encrypted end-to-end so that, even if someone intercepted the data, they couldn't read it. The underlying Select A) blockchain B) cryptocurrency C) encryption D) quantum technology also ensures that once you place your order, it can't be altered.

Customer:

How can they make sure the order doesn't get changed?

You:

Transactions are recorded across a Select A) distributed B) local C) corporate D) public network so that multiple copies of every transaction exist. Even if someone could tamper with one copy, they couldn't get to all copies.

Customer:

If all those copies of my data are out there, how can you keep it safe? What keeps the wrong people from getting to it?

You:

Great question. With something like cryptocurrency, the data is publicly available. But with our app, the relevant data is available only to approved third parties, such as suppliers or the bank or insurance companies. You and the people serving you, such as the finance company, can get detailed updates for increased Select A) supply chain B) audit trail C) claims processing D) smart contract transparency, but the general public has no access to this information.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

College Physics

Authors: Jerry D. Wilson, Anthony J. Buffa, Bo Lou

7th edition

9780321571113, 321601831, 978-0321601834

Students also viewed these General Management questions

Question

List the differences between ITS and PI.

Answered: 1 week ago