This is an individual assessment. Questions are to be completed using Microsoft Word for all written responses. All written responses must be fully referenced using Harvard Style referencing....

1 answer below »



  • This is an individual assessment.




  • Questions are to be completed using Microsoft Word for all written responses.




  • All written responses must be fully referenced using Harvard Style referencing.




  • Assessments are to be submitted no later than the due date as per this unit guide.




  • Late submission without application and approval of an extension prior to the due date will forfeit your


    chance for a resubmission.




  • Ask your assessor if you are unsure about any aspect of the assessment.




  • In a new Microsoft Word document, answer the questions ensure you don't include the question in your


    answers document just the number the question relates to.


    ie: 1. This is.............




  • Also Ensure you put The Unit Code and your Full Name and Student ID in the header or Footer of the


    document.


    You are to research and answer the following questions:




    1. What are three (3) key aspects of cloud computing, explain each and what makes it different to other computing solutions?




    2. Explain why would the Cloud computing needs of an organisation change over time?




    3. Explain what are some risks in being too ambitious in a cloud computing plan?




    4. Explain what is meant by the term “mission critical system”?




    5. What is the importance of data backups to an organisation? List and explain two (2) cloud-based solutions are available to help with this?




    6. What components are in the cloud version of Microsoft Office (Microsoft Office 365 Provide some statistics which estimate its uptake/usage across the world.




    7. Is email a ‘critical’ system? Explain your answer.




    8. Why is it wise for an organisation to have a Technology Disaster Plan? Broadly, what types of things will it cover and how can you incorporate cloud-based solutions into this plan.




    9. What are some implications/problems when an organisation has a wide range (brand and model) of peripherals?




    10. Explainhowstaffcouldobtainremoteaccesstotheinternalsystemsofanorganisationandwhat tools/software could they use to do this?




    11. List two (2) future cloud computing needs a business may need or require and explain for each need why it would be required and who in the business would need to be consulted and who these improvements would affect.




    BSBSMB412 - Assessment 1 – Research Folio VU Version 4.0 – Sep 2020 Page 2






  1. Explain under what circumstances might training and coaching of staff not be required as part of the implementation of a cloud-based computing project?




  2. Explain under what circumstances would training and coaching of staff be required as part of the implementation of a cloud-based computing project?




  3. Whatsortsofon-goingactivitiesmightbeneeded,orbeagoodidea,afteralargecloud-basedproject has been successfully implemented?




  4. Nameandexplaintwo(2)set-upcoststhatarelikelytobepartofacloud-basedmigrationbudget.




  5. Nameandexplaintwo(2)on-goingcoststhatarelikelytobepartofacloud-basedmigrationbudget.



Answered Same DayOct 14, 2021

Answer To: This is an individual assessment. Questions are to be completed using Microsoft Word for all written...

Nishtha answered on Oct 19 2021
140 Votes
FNS40217 – CERTIFICATE IV IN ACCOUNTING & BOOKKEEPING
UNIT CODE: BSBSMB412
UNIT NAME: INTRODUCE CLOUD COMPUTING INTO BUSINESS OPERATIONS
ASSESSMENT 1: RESEARCH FOLIO
Table of Contents
1.    3
2.    3
3.    4
4.    4
5.    4
6.    5
7.    5
8.    5
9.    5
10.    6
11.    6
12.    6
13.    6
14.    7
15.    7
16.    7
References    8
1.
On-demand self-service
Cloud computing services can be supplied without the service provider's human involvement. In other words, without passing through to the cloud provider, a manufac
turing company may supply extra computing services as needed. This could be a space for computing, instances of a virtual machine and instance of a database.
Multi-tenancy and resource pooling
Tools for cloud computing are intended to support a multi-tenant model. Multi-tenancy requires various consumers to obtain the same apps or the same basic infrastructure while protecting their data confidentiality and protection. It is common among people living in an apartment complex, sharing the same infrastructure projects, but inside that infrastructure, they still want their own apartments and privacy. It is how the multi-tenancy cloud operates.
Rapid elasticity and scalability
The ability to easily provide cloud services when manufacturing companies require them is one of the best things about cloud computing. Then, once they do not need them, delete them. In line with business demands, cloud computing services may scale up or down quickly and, in some situations, automatically. It is a key cloud-computing feature. Without additional contracts or fines, the use, capability and thus cost may be scaled up or down.
2.
Together with software development and IT operation, technology as code, micro - services and frameworks, organisations are adopting cloud computing, once again we see people and process problems slowing down wide adoption. When accepting cloud computing within a large organisation, it is so important to concentrate on organisational change.
Delivery Speed
Many companies are adopting the software development and IT operation revolution in order to satisfy the business demands of bringing new services to market more quickly. The enterprises, which are effective in moving toward that agile development model, are more often able to launch smaller sets of changes to output (Mazzara, et al., 2018).
Agility vs. Power
To protect the business from the possibility of security threats, highly controlled businesses also deploy very strict controls. Most of these controls are applied with a set of, mostly manual, procedures that slow down the SDLC dramatically. It is mentioned that developers should function under these constraints in an environment where we produce about once 3 to 6 months (Ayma, et al., 2019).
3.
The risks are unauthorised access to consumer and business information, vendor protection risks, regulatory and legal risks, inadequate control risks and accessibility risks. When business use a cloud service, the threat of government interference often rises. It is indicated that when business rely on a cloud service for a business-critical mission (Drissi, et al., 2016). The place company's confidence in other people's hands and the efficiency of the work is always a risky task. The reputation no longer relies on the credibility of only company, but now it also relies on the credibility of the company of the vendor. Moreover, that is a risk from cloud computing. Also, bear in mind that cloud information is maintained from anywhere on the internet, meaning that business data can be compromised if a data breach occurs through hacking, a disgruntled former employee, or sloppy username / password protection. Moreover, all the time, cyber-attacks occur more to secure government businesses.
4.
A mission critical system is the process that is vital to a corporation or organisation's survival. Company activities are greatly disrupted when a mission critical device fails or is disrupted. Aircraft management systems, power grid systems and crisis communications systems are instances of mission critical systems. However, with many organisations relying on business-critical systems to conduct work and generate value, human existence does not want to be on the track (Tchernykh, et al., 2019). A business-critical activity or method may be important for the long-term success of a business or even its existence. The failure of a job or process that is mission-critical instantly stops an organisation or a system in its path. According to the mission-critical functions of the system, emergency alert centres, computerised health worker records, data storage centres, stock exchanges and some other operations based on networking and telecommunication systems have to be secured against breakdowns.
5.
If there is, a system lets or hard drive malfunction, the key purpose for backup data is to save valuable files. If the initial backup results in the data manipulation or hard drive malfunction,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here