Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) Distinguish between cloud computing, green computing, and quantum computing.

ID: 389919 • Letter: 1

Question

1) Distinguish between cloud computing, green computing, and quantum computing.

2) What makes data mining an important business tool? What types of information does data mining produce? In what type of circumstance would you advise a company to use data mining?

3) Blogs, wikis, and social networking sites were designed for individuals to communicate with each other. What uses do businesses have for these tools? Give specific examples.

4) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

Explanation / Answer

1. Cloud computing

The ability of a company to provide the service to another where the computational input and output are handled by the hardware capabilities of another is essentially known as cloud computing. Based on the requirement, cloud computing can allow us the use of not only computational power to run software but the entire environment and other services as well as the core functionality of a computer environment.

Green Computing

Can be considered as the ability of the manufacturing companies to design their systems in a way that creates the least amount of stress for the environment, as well as can be disposed of with the same footprint and can be utilized in a broader sense, being environmentally friendly in the process.

Quantum computing

We can identify quantum computing as the use of a supercomputer utilizing a powerful hardware so much so that it can perform clusters of calculation and processing requirements that would generally take a large number of systems working simultaneously to perform in a larger capacity with the ease of being able to utilize a single machine.

It can essentially be called as a supercomputer with the power to compute mathematical models with the ease of access and ability.

2. Data mining allows a company the ability to utilize current and past data in order to present a viable statistics model to determine the possible future events. In businesses, it is called as forecasting and allow the company the ability to base their decision-making process on the basis of data and not what we refer to as a gut feeling. It is generally based on trend and demand and can allow a company to relate to the factor of demand better for the sake of both themselves and their potential customers to a point that it can generate better sales figures for them in a relatively shorter term.

All companies should use data mining in some capacity, but, companies which deal directly with their customers should make the most use out of the process of data mining. They need to be able to differentiate the factors of demand and the trend that are being followed and how customer perceived to be of better value to them in order to create better business for themselves, it not only allows the company to reduce their storage and inventory costs but also allows them to endure the period where there is relatively low as well as high demand for particular products.

3. Businesses make effective use of social media in order to create a better relationship with their customers as well as spread their brand as an image to gain better customer loyalty such as by wendy’s, wikis are utilized by the companies in order to present information about their products, such as by a software company.

4. Security can be considered not just as a system but as an environment. We can say that the value a system has is only as good as the people that operate it. It is, therefore, a necessity for the personnel to be as good as they can be. In the most positive sense, we can assume that the security is affected by all these factors and all the factors influence each other as a result. We can say this utilizing the fact that companies that make use of security rely on its implementation by the people, which depends on the organization and the culture that is followed.