This document discusses the processes of ICT services, the forecasted high-demand IT careers, the importance of IT in a career, and the problems associated with cloud computing. It also explains data volatility and its impact on data analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Processes of ICT services 1.An introduction of yourself (your work, hobby, interests). I am an ambitious person who has a great interest in technology. My vision is to create a career in IT. My hobbies include reading novels, reading blog posts of technology and business topics, and taking part in discussion forums. I also have an interest in swimming, and I am a football fan. 2.What IT careers are forecasted to be in high demand? Explain why. IT careers that are predicted to be in high demand include, cloud computing, data analytics, artificial intelligence and cybersecurity. These careers are on high demand due to the impact they have on business organizations. All these fields have revolutionized the way business is conducted today. Businesses are adopting cloud services in place of traditional methods of storing data in warehouses. Also, organizations are using big data and data analytics to predict customer and market trends and making crucial company decisions(Roussey, 2018). 3.Why is IT important to your career? What do you want to get by studying this subject?What is your plan when you finish your study? With the daily advancements in the IT field, organizations are opting to use IT systems rather than human resource. However, these IT systems need people to manage. Thus a career in IT will remain marketable even in future. IT will give me marketable skills that I will use to develop my career. I plan to work in a technology consulting firm. 4.Explain what is meant by data volatility. How does it affect the use of databases for dataanalysis? Data volatility can be explained as the rate at which stored data changes over time. This implies that databases that are used for data analysis will give different results when the data
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
changes (Coric, 2019). Databases are volatile because data is constantly being added, deleted and updated. The rate of data changing will cause variations in the results since different inputs are used. For proper results to be obtained, then data volatility should be factored while doing the analysis. 5.What are the problems associated with cloud computing? The past few years have seen an influx in the growth and adoption of cloud computing services. While cloud computing technology brings many benefits, IT experts are aware of the problems that are associated with cloud computing technology. Some of the problems associated with cloud computing include: Unauthorized access to proprietary and confidential data. The private and confidential property and data must be secured by the ‘Business Cloud’ that contains trading secrets, customer’s information, and other data. It is the primary responsibility of businesscloud to ensure proper security of data. A security breach can cause permanent damage to the business that leads towards bankruptcy and other legal complications(Francis and Vadivel, 2012). Privacy and security of data. Cloud computing is based on public clouds that make it accessible to the general users of the internet, although the data and intellectual assets of the companies are protected by effective security measures the concept still seems vulnerable to some users. The transfer and access of information on public clouds increase chances of eavesdropping, intrusion and man-in-the-middle attacks as compared to the transmission of data on private clouds. Therefore, the decreasing control of security and privacy proves to be one of the inhibitions regarding the usage of cloud computing services(Lynch & Hayes, 2011).
References Coric, B. (2019). Variations in output volatility: Evidence from international historical data. Economics Letters,178, 102–105.https://doi.org/10.1016/j.econlet.2019.03.008[Accessed 14.3.2019] Francis,T.Y., & Vadivel,S. (2012). Cloud computing security: Concerns, strategies and best practices.2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM). doi:10.1109/iccctam.2012.6488099[Accessed 14.3.2019] Lynch,L., & Hayes,T. (2011). Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit.Auditing Cloud Computing, 161-174. doi:10.1002/9781118269091.ch9[Accessed 14.3.2019] Roussey, B. (2018, August 10). Hottest IT jobs and job trends in 2018-19. Retrieved March 14, 2019, fromhttp://techgenix.com/hottest-it-jobs/[Accessed 14.3.2019]