Technology in Organisations
VerifiedAdded on 2023/06/10
|13
|4063
|419
AI Summary
This report discusses the role of cloud computing in modern organizations, key benefits of cloud computing to businesses like Amazon, and security requirements that an organization should implement to protect its data. It also discusses the key networking infrastructure used by Tesco plc of UK in order to manage the smooth function of business. The report includes calculations in a spreadsheet and references.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Technology in Organisations
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Question-1........................................................................................................................................3
Role of cloud computing in modern organisation.......................................................................3
Key benefits Amazon gained after adopting Cloud computing...................................................5
Question-2........................................................................................................................................6
Security requirements that an organisation implement to protect its data...................................6
Question 3........................................................................................................................................8
(a) Key networking infrastructure use by Tesco Plc for their everyday business operations......8
(b) Calculation of following in spreadsheet...............................................................................10
(i) Calculation of total of all countries Quarter, mean, median, maximum and minimum.......11
(ii) Calculation of number of countries during Q2 that have more than £27000 forecast.........11
(iii) Calculation of number of countries during Q4 that have less than £15000 forecast..........11
CONCLUSION..............................................................................................................................11
REFERENCES................................................................................................................................1
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Question-1........................................................................................................................................3
Role of cloud computing in modern organisation.......................................................................3
Key benefits Amazon gained after adopting Cloud computing...................................................5
Question-2........................................................................................................................................6
Security requirements that an organisation implement to protect its data...................................6
Question 3........................................................................................................................................8
(a) Key networking infrastructure use by Tesco Plc for their everyday business operations......8
(b) Calculation of following in spreadsheet...............................................................................10
(i) Calculation of total of all countries Quarter, mean, median, maximum and minimum.......11
(ii) Calculation of number of countries during Q2 that have more than £27000 forecast.........11
(iii) Calculation of number of countries during Q4 that have less than £15000 forecast..........11
CONCLUSION..............................................................................................................................11
REFERENCES................................................................................................................................1
INTRODUCTION
Technology is basically a continuous development result of knowledge and application in all
techniques, skills etc which is basically used in the scientific research and industrial production.
In present world, technology plays a vital role in the smooth functioning as well as success of the
business (Pittaway and et.al., 2004). Hence, in the present time every business in order to reach
to large customer base and understand their needs and demands uses the technology and wireless
network. The current report will discuss the evolving role of cloud computing within the modern
organization using the cloud computing service models. Further, the report will analyse the role
of cloud computing using the real-life examples. In addition, the report will also discuss the key
benefits of cloud computing to the businesses like Amazon. This will cover how the cloud
computing has helped Amazon to gain competitive advantage in national as well as international
market. Further, the report will suggest three security requirement that should implement by
organization for the security and controlling its data. The report will also discuss the key
networking infrastructure used by Tesco plc of UK in order to manage the smooth function of
business. Lastly, with the help of spreadsheet, the report has computed the total, mean, median,
maximum and minimum of specified data.
MAIN BODY
Question-1
Role of cloud computing in modern organisation
The term cloud refers to network or which is present at remote location. Cloud computing
refers to manipulating, configuring and accessing the application online through internet.
Basically it provides data storage, infrastructure and application. In other words it can be said
that it is a computer theory where large number of systems is connected in public and private
network in order to provide dynamic scalable infrastructure for the application(Sadeeq, and et.al.,
2021). The flow of communication between the front and back ends are managed by the central
server and they rely on the protocols which help in exchange of the data. The centre server uses
both software and middleware in order to maintain the connectivity in the device and cloud
server(Mukherjee, 2019) .Cloud computing relies on the virtualisation and automation
technologies. Cloud computing is based three types of services:
Infrastructure as a service(IaaS):IaaS provides the basic storage and various
capabilities as standardised services over the other network. It is the type of
Technology is basically a continuous development result of knowledge and application in all
techniques, skills etc which is basically used in the scientific research and industrial production.
In present world, technology plays a vital role in the smooth functioning as well as success of the
business (Pittaway and et.al., 2004). Hence, in the present time every business in order to reach
to large customer base and understand their needs and demands uses the technology and wireless
network. The current report will discuss the evolving role of cloud computing within the modern
organization using the cloud computing service models. Further, the report will analyse the role
of cloud computing using the real-life examples. In addition, the report will also discuss the key
benefits of cloud computing to the businesses like Amazon. This will cover how the cloud
computing has helped Amazon to gain competitive advantage in national as well as international
market. Further, the report will suggest three security requirement that should implement by
organization for the security and controlling its data. The report will also discuss the key
networking infrastructure used by Tesco plc of UK in order to manage the smooth function of
business. Lastly, with the help of spreadsheet, the report has computed the total, mean, median,
maximum and minimum of specified data.
MAIN BODY
Question-1
Role of cloud computing in modern organisation
The term cloud refers to network or which is present at remote location. Cloud computing
refers to manipulating, configuring and accessing the application online through internet.
Basically it provides data storage, infrastructure and application. In other words it can be said
that it is a computer theory where large number of systems is connected in public and private
network in order to provide dynamic scalable infrastructure for the application(Sadeeq, and et.al.,
2021). The flow of communication between the front and back ends are managed by the central
server and they rely on the protocols which help in exchange of the data. The centre server uses
both software and middleware in order to maintain the connectivity in the device and cloud
server(Mukherjee, 2019) .Cloud computing relies on the virtualisation and automation
technologies. Cloud computing is based three types of services:
Infrastructure as a service(IaaS):IaaS provides the basic storage and various
capabilities as standardised services over the other network. It is the type of
computing infrastructure that is managed over the internet and the benefit of using
this service is that it helps the end users to avoid the unnecessary cost and
complication in purchasing and managing the different types of physical servers. The
various features of these services are they are highly scalable and flexible(Scheuner,
and Leitner, 2019). On the other hand it also performs the automated administrative
tasks. For example: Amazon Web Services, Google compute engine and Digital
Ocean.
Software as a service(SaaS): In this type of service model absolute application of
offered to the customers on demand . In this a single instance of the service is
managed on the cloud and services are provided to many users e.g. via web
browser(Lokawati, and Widyani, 2019). It is common delivery model for much
business which includes office software and management software etc. In this no
direct investment in servers and costs of the users is reduced as there is only single
application that is maintained. Many organisations offer this service i.e. Google and
Microsoft.
Platform as a service(PaaS): It is one of the cloud computing model in which the
third party delivers hardware and software tools to the customers over the internet.
This service hosts the hardware and software on their own software(Mimidis, Ollora,
and Soler, 2018). This type or software is provided through service provider hosted
infrastructure and users frequently access the service through web browser.
In the recent year the role of cloud computing is gaining popularity in the information
technology field. But it has been observed that many companies does not have proper
understanding about the implementing and application of the cloud computing in its business due
to lack of awareness regarding its costs and its security as they have the issue regarding the
security of the data. Furthermore, it is also observed that the main benefit of cloud computing for
modern organization is cost effectiveness but on the other hand the other issue is the security
benefits. It has been observed due to cloud computing it has changed the way companies use
internet. With the help of cloud computing it has provided the users access to all the data,
documents and applications when they are using the internet connectivity. This has also helped
the organisations to reduce its cost and have started implementing virtualisation technology.
this service is that it helps the end users to avoid the unnecessary cost and
complication in purchasing and managing the different types of physical servers. The
various features of these services are they are highly scalable and flexible(Scheuner,
and Leitner, 2019). On the other hand it also performs the automated administrative
tasks. For example: Amazon Web Services, Google compute engine and Digital
Ocean.
Software as a service(SaaS): In this type of service model absolute application of
offered to the customers on demand . In this a single instance of the service is
managed on the cloud and services are provided to many users e.g. via web
browser(Lokawati, and Widyani, 2019). It is common delivery model for much
business which includes office software and management software etc. In this no
direct investment in servers and costs of the users is reduced as there is only single
application that is maintained. Many organisations offer this service i.e. Google and
Microsoft.
Platform as a service(PaaS): It is one of the cloud computing model in which the
third party delivers hardware and software tools to the customers over the internet.
This service hosts the hardware and software on their own software(Mimidis, Ollora,
and Soler, 2018). This type or software is provided through service provider hosted
infrastructure and users frequently access the service through web browser.
In the recent year the role of cloud computing is gaining popularity in the information
technology field. But it has been observed that many companies does not have proper
understanding about the implementing and application of the cloud computing in its business due
to lack of awareness regarding its costs and its security as they have the issue regarding the
security of the data. Furthermore, it is also observed that the main benefit of cloud computing for
modern organization is cost effectiveness but on the other hand the other issue is the security
benefits. It has been observed due to cloud computing it has changed the way companies use
internet. With the help of cloud computing it has provided the users access to all the data,
documents and applications when they are using the internet connectivity. This has also helped
the organisations to reduce its cost and have started implementing virtualisation technology.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Key benefits Amazon gained after adopting Cloud computing
With increase in the technology, many organisations have adopted new and effective tools
and software in order to effectively run their business operations. In the recent years the scope of
cloud computing had gained large popularity in the field of information technology but still
today there are many companies who lack proper knowledge and understanding about this
technology. Some business raises the issues regarding the security associated with the Cloud
computing. But on the other hand the companies that are using this system have undergone a
major change and evolution in its business. The benefits associated with the application of Cloud
Computing in the business are:
Cost efficient: It helps in reducing the cost of managing and maintaining the
information technology systems by decreasing the cost of the business by utilising
the resources of the cloud computing service provider(Attaran, and Woods, 2019).
It also help in saving the overall cost of the business as no wages have to be given
to experts and less energy consumption
Improved customer service: It is observed that customer service plays a very
major role in the success of any business and it is responsibility of the management
to identify the needs and requirements of the customer and plan strategies to
enhance their experience and this method is useful as they help in regularly
connected with the customers and help in responding their queries and ensure the
availability of the service whenever needed(Butt, and et.al., 2019). Through this
method it enhances the communication between the customer and service provider.
Security: There has been increase in the scope of cloud computing and various
organisations are adopting this technology but there still many business have
various concerns regarding this is the security concerns. On the other hand cloud
computing provides full security as they are known to store the data and
confidential information on servers and these servers offers strict security measures
and also prevents the breach of data and confidential information of the company.
Better document control: In the companies lots of transfer and exchange of
information takes place between various departments and with this there is
enhanced need to maintain proper records and documentation of these information
but the problem arise when these files are stored in multiple format but with the
With increase in the technology, many organisations have adopted new and effective tools
and software in order to effectively run their business operations. In the recent years the scope of
cloud computing had gained large popularity in the field of information technology but still
today there are many companies who lack proper knowledge and understanding about this
technology. Some business raises the issues regarding the security associated with the Cloud
computing. But on the other hand the companies that are using this system have undergone a
major change and evolution in its business. The benefits associated with the application of Cloud
Computing in the business are:
Cost efficient: It helps in reducing the cost of managing and maintaining the
information technology systems by decreasing the cost of the business by utilising
the resources of the cloud computing service provider(Attaran, and Woods, 2019).
It also help in saving the overall cost of the business as no wages have to be given
to experts and less energy consumption
Improved customer service: It is observed that customer service plays a very
major role in the success of any business and it is responsibility of the management
to identify the needs and requirements of the customer and plan strategies to
enhance their experience and this method is useful as they help in regularly
connected with the customers and help in responding their queries and ensure the
availability of the service whenever needed(Butt, and et.al., 2019). Through this
method it enhances the communication between the customer and service provider.
Security: There has been increase in the scope of cloud computing and various
organisations are adopting this technology but there still many business have
various concerns regarding this is the security concerns. On the other hand cloud
computing provides full security as they are known to store the data and
confidential information on servers and these servers offers strict security measures
and also prevents the breach of data and confidential information of the company.
Better document control: In the companies lots of transfer and exchange of
information takes place between various departments and with this there is
enhanced need to maintain proper records and documentation of these information
but the problem arise when these files are stored in multiple format but with the
help of cloud computing it has made easy for the employees to access to the data
and share the information. With the application of the company that is presented in
the cloud the company can focus on innovation and various technological
advancement are being taken care by the cloud computing.
Provides multiple options: Cloud not only provide security to the data and
security of the company but also offers various other application such as Software
as a service (SaaS),Platform as a service(PaaS) and Information as a Service(IaaS).
With this service, users have various options to create public, private and also
hybrid network access.
Amazon company offers cloud computing platform known as Amazon Web Servcie(AWS)
which has become one of the important and popular component of e-commerce business
portfolio and it has been primary profit driver for the company. Furthermore with the help
of this cloud computing service, AMS can provide servers, storage , networking , email as
well as security regarding the data and information of the company. The cloud computing
service provided by the company and its cost is modified according to the usage of the
internet of the customers and also provide base for other companies to build their own
cloud servers. AWS is more secure than company having its own hosting and storage. It
has been analysed that with the help of Cloud computing, it can secure the data of the
company and provides adequate security.
Question-2
Security requirements that an organisation implement to protect its data
Every organisation relies on information technology and other related software for their
data security and other confidential information and various security controls are implemented
by the company in order to protect its data and infrastructure that in mandatory for any
organisation. The company has to comply with various laws and regulations and follow various
laws which also include the data protection laws as well. The protection of the data and
confidential information of the customers is the important aspect which the company has to
follow in order to successfully operate its business. In many countries it has become a legal
obligation for the company to follow the data protection laws such as general data protection
regulation.
and share the information. With the application of the company that is presented in
the cloud the company can focus on innovation and various technological
advancement are being taken care by the cloud computing.
Provides multiple options: Cloud not only provide security to the data and
security of the company but also offers various other application such as Software
as a service (SaaS),Platform as a service(PaaS) and Information as a Service(IaaS).
With this service, users have various options to create public, private and also
hybrid network access.
Amazon company offers cloud computing platform known as Amazon Web Servcie(AWS)
which has become one of the important and popular component of e-commerce business
portfolio and it has been primary profit driver for the company. Furthermore with the help
of this cloud computing service, AMS can provide servers, storage , networking , email as
well as security regarding the data and information of the company. The cloud computing
service provided by the company and its cost is modified according to the usage of the
internet of the customers and also provide base for other companies to build their own
cloud servers. AWS is more secure than company having its own hosting and storage. It
has been analysed that with the help of Cloud computing, it can secure the data of the
company and provides adequate security.
Question-2
Security requirements that an organisation implement to protect its data
Every organisation relies on information technology and other related software for their
data security and other confidential information and various security controls are implemented
by the company in order to protect its data and infrastructure that in mandatory for any
organisation. The company has to comply with various laws and regulations and follow various
laws which also include the data protection laws as well. The protection of the data and
confidential information of the customers is the important aspect which the company has to
follow in order to successfully operate its business. In many countries it has become a legal
obligation for the company to follow the data protection laws such as general data protection
regulation.
Network security policy: This policy ensures that information system of the
companies have suitable effective hardware , software and various mechanisms.
This mechanism guarantees confidentiality, integrity and availability of the data
by following certain procedures while reviewing the system software on daily
basis. With the help of this policy, various events such as failed login can be
properly documented(Yang, and Jeong, 2018,). It includes firewalls and activities
around the routers and switches.
Remote access policy: Remote access policy should be implemented as many of
the companies have adopted the work from home culture and data security is one
of the major concern for many business owners. Remote access involves the
connection of any host to network of the company(Ndichu, and et.al., 2020). In
addition to this the policy is designed to avoid the possibility of any damages that
can result into unauthorized use of the information. This policy should be directed
to all the employees working form the remote areas and also includes various
conditions regarding sending and receiving of the information or receiving emails
and from intranet resources in order to avoid unauthorized use of the data and
information of the company.
Password creation and management policy: This is one of the major
requirement and also ensure to educate the employees of the company regarding
the importance of creating strong passwords. This policy ensures and provides
necessary guideline for developing and implementing various procedures for
proper creation and securing the passwords for verifying users identity and also
for the access of information system and software of the company.
It helps in securing the data of the regarding the information of the customers.
Amazon Web Services offered by the Amazon company regularly monitors the changing privacy
related regulations in order to identify the things that is required to be modified in order to
protect the data from being used by the unauthorised users and also maintain the customer trust
and also offer quality services without any security issues. With the help of AWS Regions the
customer can control and access to the data according to the needs(Yıldırım, and Mackie, 2019).
It can be analysed that cloud computing has become an important part that is cost effectives and
companies have suitable effective hardware , software and various mechanisms.
This mechanism guarantees confidentiality, integrity and availability of the data
by following certain procedures while reviewing the system software on daily
basis. With the help of this policy, various events such as failed login can be
properly documented(Yang, and Jeong, 2018,). It includes firewalls and activities
around the routers and switches.
Remote access policy: Remote access policy should be implemented as many of
the companies have adopted the work from home culture and data security is one
of the major concern for many business owners. Remote access involves the
connection of any host to network of the company(Ndichu, and et.al., 2020). In
addition to this the policy is designed to avoid the possibility of any damages that
can result into unauthorized use of the information. This policy should be directed
to all the employees working form the remote areas and also includes various
conditions regarding sending and receiving of the information or receiving emails
and from intranet resources in order to avoid unauthorized use of the data and
information of the company.
Password creation and management policy: This is one of the major
requirement and also ensure to educate the employees of the company regarding
the importance of creating strong passwords. This policy ensures and provides
necessary guideline for developing and implementing various procedures for
proper creation and securing the passwords for verifying users identity and also
for the access of information system and software of the company.
It helps in securing the data of the regarding the information of the customers.
Amazon Web Services offered by the Amazon company regularly monitors the changing privacy
related regulations in order to identify the things that is required to be modified in order to
protect the data from being used by the unauthorised users and also maintain the customer trust
and also offer quality services without any security issues. With the help of AWS Regions the
customer can control and access to the data according to the needs(Yıldırım, and Mackie, 2019).
It can be analysed that cloud computing has become an important part that is cost effectives and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
also provide data security and confidential information of the company with less availability of
resources.
The company make various modifications time to time in order to build effective policies and
procedures for protection their customer personal information and also their business data.
Effective security policies should be implemented in order to monitor and protect the data and
information. The main objective of implementing security policies in order to secure the data i.e.
confidentiality, integrity and availability for taking effective decisions for the company
Question 3
(a) Key networking infrastructure use by Tesco Plc for their everyday business operations
Network infrastructure is a hardware as well as software resources with the help of which the
business can operate its everyday business operation. It enables network connectivity,
communication, operations and management of an enterprise network. The key networking
infrastructure used by Tesco in their regular business operation are as follows:
Wireless LAN (Local Area Network) Technology: This is one of the key networking
infrastructures which is basically used by Tesco Plc of UK in order to manage the smooth
functioning of its daily business operation. In this network infrastructure, the different
pieces of equipment as well as technology is basically linked together with a central
wireless hub (Sheikh, Hyder and Khan, 2006). With the help of this network
infrastructure, management of Tesco company able to create a network within the
organization that basically operate efficiently and effectively with the aim of supporting
the growing business. It increases the mobility as well as the productivity of employee if
they continue to exit in office only. The ownership cost of business due to this network
get reduce which ultimately leads to incorporation of the wifi booster. This has strong
longevity as compared to traditional network.
Cabling:This is another key network infrastructure which is used by Tesco plc within
their organization with the aim of everyday business operation. Cabling is one of the
most common but significant aspect of network infrastructure with the help of which
workforce of Tesco plc able to transfer information and communication throughout the
business. It is also helping the company to communicate the information to external as
well via channel and connections. It is because without cabling the company unable to
resources.
The company make various modifications time to time in order to build effective policies and
procedures for protection their customer personal information and also their business data.
Effective security policies should be implemented in order to monitor and protect the data and
information. The main objective of implementing security policies in order to secure the data i.e.
confidentiality, integrity and availability for taking effective decisions for the company
Question 3
(a) Key networking infrastructure use by Tesco Plc for their everyday business operations
Network infrastructure is a hardware as well as software resources with the help of which the
business can operate its everyday business operation. It enables network connectivity,
communication, operations and management of an enterprise network. The key networking
infrastructure used by Tesco in their regular business operation are as follows:
Wireless LAN (Local Area Network) Technology: This is one of the key networking
infrastructures which is basically used by Tesco Plc of UK in order to manage the smooth
functioning of its daily business operation. In this network infrastructure, the different
pieces of equipment as well as technology is basically linked together with a central
wireless hub (Sheikh, Hyder and Khan, 2006). With the help of this network
infrastructure, management of Tesco company able to create a network within the
organization that basically operate efficiently and effectively with the aim of supporting
the growing business. It increases the mobility as well as the productivity of employee if
they continue to exit in office only. The ownership cost of business due to this network
get reduce which ultimately leads to incorporation of the wifi booster. This has strong
longevity as compared to traditional network.
Cabling:This is another key network infrastructure which is used by Tesco plc within
their organization with the aim of everyday business operation. Cabling is one of the
most common but significant aspect of network infrastructure with the help of which
workforce of Tesco plc able to transfer information and communication throughout the
business. It is also helping the company to communicate the information to external as
well via channel and connections. It is because without cabling the company unable to
operate its daily business activities efficiently (Yu and et.al., 2015). In the Tesco Plc, the
telecom cabling is integrated with the other systems with the aim to cover range of
purposes with only one installation. Basically, the requirement of cabling changes as per
the need of the businesses or can be scaled up & down depending upon the business size.
This has also helped the company such as Tesco to smoothly operate its business from
remote areas during Covid-19 and lockdown restrictions.
Routers: This is also one of the network infrastructures that plays vital role in directing
information and transferring communication within a business. Routers is used by Tesco
Plc in order to manage a smooth communication transfer from one to other department in
business. Basically, the routers send the information to right route within an internal
network. It means the routers first read an incoming data and then within and between
network the router sends that data to their appropriate destinations. Same as cabling, there
are various range of routers that are available to company such as Tesco which changes
needs and demand of business (Lenka and et.al., 2018). This key networking
infrastructure has helped Tesco Plc in increasing the bandwidth capacity of business. Not
only that, it is also best for enhancing the security for their confidential and sensitive
information from hackers.
Switches:This is another most significant networking infrastructure that are sometime be
confused with router but in reality, they are distinct entities which serve different
function. In simple term, router connect network while on the other hand, switches create
network. This is one of the best network resources with the help of which Tesco Plc able
to manage its business day to day operations. With the help of this, the management of
Tesco Plc able to connect with the different layers as well as components of technology
together such as phones, laptops, servers, lights etc. The impact of which the employee
and staff of Tesco able to complete their work on time without any disturbance
(Yarali,Ahsant and Rahman, 2009). The switches help the other element of network to
connect with each other with the aim of creating a smooth communication system within
the organization.
telecom cabling is integrated with the other systems with the aim to cover range of
purposes with only one installation. Basically, the requirement of cabling changes as per
the need of the businesses or can be scaled up & down depending upon the business size.
This has also helped the company such as Tesco to smoothly operate its business from
remote areas during Covid-19 and lockdown restrictions.
Routers: This is also one of the network infrastructures that plays vital role in directing
information and transferring communication within a business. Routers is used by Tesco
Plc in order to manage a smooth communication transfer from one to other department in
business. Basically, the routers send the information to right route within an internal
network. It means the routers first read an incoming data and then within and between
network the router sends that data to their appropriate destinations. Same as cabling, there
are various range of routers that are available to company such as Tesco which changes
needs and demand of business (Lenka and et.al., 2018). This key networking
infrastructure has helped Tesco Plc in increasing the bandwidth capacity of business. Not
only that, it is also best for enhancing the security for their confidential and sensitive
information from hackers.
Switches:This is another most significant networking infrastructure that are sometime be
confused with router but in reality, they are distinct entities which serve different
function. In simple term, router connect network while on the other hand, switches create
network. This is one of the best network resources with the help of which Tesco Plc able
to manage its business day to day operations. With the help of this, the management of
Tesco Plc able to connect with the different layers as well as components of technology
together such as phones, laptops, servers, lights etc. The impact of which the employee
and staff of Tesco able to complete their work on time without any disturbance
(Yarali,Ahsant and Rahman, 2009). The switches help the other element of network to
connect with each other with the aim of creating a smooth communication system within
the organization.
(b) Calculation of following in spreadsheet
(i) Calculation of total of all countries Quarter, mean, median, maximum and minimum
The above spreadsheet chart along with the formulae indicate the total of all country’s
quarters, mean, median, maximum and minimum. On the basis of above graph, the total of all
countries quarters is £835000, mean is £119285.7143, median is £113000, maximum is £215000
and minimum is £38000. This indicate that that the Sales Department of AllTech Department has
(i) Calculation of total of all countries Quarter, mean, median, maximum and minimum
The above spreadsheet chart along with the formulae indicate the total of all country’s
quarters, mean, median, maximum and minimum. On the basis of above graph, the total of all
countries quarters is £835000, mean is £119285.7143, median is £113000, maximum is £215000
and minimum is £38000. This indicate that that the Sales Department of AllTech Department has
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
stated that maximum forecasted sales in all quarter from all countries will be £215000. Further,
the average sales forecast will be £119285.7143, and minimum sales forecast will be £38000.
(ii) Calculation of number of countries during Q2 that have more than £27000 forecast
On the basis of above chart, it has been identified that there is total four countries during
the quarter 2 with the forecast of more than £27000. This indicates that the four countries such as
Canada, Singapore, UAE and Germany will have the sales of more than £27000 during Q2. This
is computed using the COUNTIF formula in spreadsheet (Kafle, Fukushima and Harai, 2016).
(iii) Calculation of number of countries during Q4 that have less than £15000 forecast
In order to compute the number of countries that have less than £15000 sales forecast during
the quarter 4, the excel function or formula of COUNTIF has been used under this section. As
per this formula, it is identified that the number of countries with less than £15000 forecast
during Q4 is only one and that is Nigeria. This means that during Q 4, All Tech Department will
earn sales of only 8000 which is basically less than 15000. This formula is best to compute the
criteria type questions.
CONCLUSION
After summing up the above information, it has been concluded that cloud computing,
networking infrastructure plays vital role in the success of business. Further, the report has also
computed the mean, median, total, minimum as well as maximum of sales forecast of different
countries of all quarters. The report has also concluded that, there are 4 countries whose forecast
in more than £27000 in Q2 with the help of COUNTIF excel function. Lastly, the report has also
concluded with the same function that there is only one country with forecast of less than £15000
during Quarter 4.
the average sales forecast will be £119285.7143, and minimum sales forecast will be £38000.
(ii) Calculation of number of countries during Q2 that have more than £27000 forecast
On the basis of above chart, it has been identified that there is total four countries during
the quarter 2 with the forecast of more than £27000. This indicates that the four countries such as
Canada, Singapore, UAE and Germany will have the sales of more than £27000 during Q2. This
is computed using the COUNTIF formula in spreadsheet (Kafle, Fukushima and Harai, 2016).
(iii) Calculation of number of countries during Q4 that have less than £15000 forecast
In order to compute the number of countries that have less than £15000 sales forecast during
the quarter 4, the excel function or formula of COUNTIF has been used under this section. As
per this formula, it is identified that the number of countries with less than £15000 forecast
during Q4 is only one and that is Nigeria. This means that during Q 4, All Tech Department will
earn sales of only 8000 which is basically less than 15000. This formula is best to compute the
criteria type questions.
CONCLUSION
After summing up the above information, it has been concluded that cloud computing,
networking infrastructure plays vital role in the success of business. Further, the report has also
computed the mean, median, total, minimum as well as maximum of sales forecast of different
countries of all quarters. The report has also concluded that, there are 4 countries whose forecast
in more than £27000 in Q2 with the help of COUNTIF excel function. Lastly, the report has also
concluded with the same function that there is only one country with forecast of less than £15000
during Quarter 4.
REFERENCES
Books and journals
Attaran, M. and Woods, J., 2019. Cloud computing technology: improving small business
performance using the Internet. Journal of Small Business & Entrepreneurship.31(6).
pp.495-519.
Butt, and et.al., 2019. Predictive variables for agile development merging cloud computing
services. IEEE Access, 7, pp.99273-99282.
Kafle, V.P., Fukushima, Y. and Harai, H., 2016. Internet of things standardization in ITU and
prospective networking technologies. IEEE Communications Magazine. 54(9). pp.43-49.
Lenka, R.K. and et.al., 2018. Building scalable cyber-physical-social networking infrastructure
using IoT and low power sensors. IEEE Access. 6. pp.30162-30173.
Lokawati, H. and Widyani, Y., 2019, November. Monitoring System of Multi-Tenant Software
as a Service (SaaS). In 2019 International Conference on Data and Software
Engineering (ICoDSE) (pp. 1-5). IEEE.
Mimidis, A., Ollora, E. and Soler, J., 2018, June. Policy Framework for the Next Generation
Platform as a Service. In 2018 European Conference on Networks and Communications
(EuCNC) (pp. 125-129). IEEE.
Mukherjee, S., 2019. Benefits of AWS in modern cloud. Available at SSRN 3415956.
Ndichu, and et.al., 2020. A Remote Access Security Model based on Vulnerability
Management. International Journal of Information Technology and Computer
Science. 12(5). pp.38-51.
Pittaway, L. and et.al., 2004. Networking and innovation: a systematic review of the
evidence. International journal of management reviews. 5(3‐4). pp.137-168.
Sadeeq, and et.al., 2021. IoT and Cloud computing issues, challenges and opportunities: A
review. Qubahan Academic Journal.1(2). pp.1-7.
Scheuner, J. and Leitner, P., 2019, March. Performance Benchmarking of Infrastructure-as-a-
Service (IaaS) Clouds with Cloud WorkBench. In Companion of the 2019 ACM/SPEC
International Conference on Performance Engineering (pp. 53-56).
1
Books and journals
Attaran, M. and Woods, J., 2019. Cloud computing technology: improving small business
performance using the Internet. Journal of Small Business & Entrepreneurship.31(6).
pp.495-519.
Butt, and et.al., 2019. Predictive variables for agile development merging cloud computing
services. IEEE Access, 7, pp.99273-99282.
Kafle, V.P., Fukushima, Y. and Harai, H., 2016. Internet of things standardization in ITU and
prospective networking technologies. IEEE Communications Magazine. 54(9). pp.43-49.
Lenka, R.K. and et.al., 2018. Building scalable cyber-physical-social networking infrastructure
using IoT and low power sensors. IEEE Access. 6. pp.30162-30173.
Lokawati, H. and Widyani, Y., 2019, November. Monitoring System of Multi-Tenant Software
as a Service (SaaS). In 2019 International Conference on Data and Software
Engineering (ICoDSE) (pp. 1-5). IEEE.
Mimidis, A., Ollora, E. and Soler, J., 2018, June. Policy Framework for the Next Generation
Platform as a Service. In 2018 European Conference on Networks and Communications
(EuCNC) (pp. 125-129). IEEE.
Mukherjee, S., 2019. Benefits of AWS in modern cloud. Available at SSRN 3415956.
Ndichu, and et.al., 2020. A Remote Access Security Model based on Vulnerability
Management. International Journal of Information Technology and Computer
Science. 12(5). pp.38-51.
Pittaway, L. and et.al., 2004. Networking and innovation: a systematic review of the
evidence. International journal of management reviews. 5(3‐4). pp.137-168.
Sadeeq, and et.al., 2021. IoT and Cloud computing issues, challenges and opportunities: A
review. Qubahan Academic Journal.1(2). pp.1-7.
Scheuner, J. and Leitner, P., 2019, March. Performance Benchmarking of Infrastructure-as-a-
Service (IaaS) Clouds with Cloud WorkBench. In Companion of the 2019 ACM/SPEC
International Conference on Performance Engineering (pp. 53-56).
1
Sheikh, K.H., Hyder, S.S. and Khan, M.M., 2006, May. An overview of quantum cryptography
for wireless networking infrastructure. In International Symposium on Collaborative
Technologies and Systems (CTS'06) (pp. 379-385). IEEE.
Yang, J. and Jeong, J.P., 2018, October. An automata-based security policy translation for
network security functions. In 2018 International Conference on Information and
Communication Technology Convergence (ICTC) (pp. 268-272). IEEE.
Yarali, A., Ahsant, B. and Rahman, S., 2009, June. Wireless mesh networking: A key solution
for emergency & rural applications. In 2009 Second International Conference on
Advances in Mesh Networks (pp. 143-149). IEEE.
Yıldırım, M. and Mackie, I., 2019. Encouraging users to improve password security and
memorability. International Journal of Information Security.18(6). pp.741-759.
Yu, K. and et.al., 2015. A key management scheme for secure communications of information
centric advanced metering infrastructure in smart grid. IEEE transactions on
instrumentation and measurement. 64(8). pp.2072-2085.
2
for wireless networking infrastructure. In International Symposium on Collaborative
Technologies and Systems (CTS'06) (pp. 379-385). IEEE.
Yang, J. and Jeong, J.P., 2018, October. An automata-based security policy translation for
network security functions. In 2018 International Conference on Information and
Communication Technology Convergence (ICTC) (pp. 268-272). IEEE.
Yarali, A., Ahsant, B. and Rahman, S., 2009, June. Wireless mesh networking: A key solution
for emergency & rural applications. In 2009 Second International Conference on
Advances in Mesh Networks (pp. 143-149). IEEE.
Yıldırım, M. and Mackie, I., 2019. Encouraging users to improve password security and
memorability. International Journal of Information Security.18(6). pp.741-759.
Yu, K. and et.al., 2015. A key management scheme for secure communications of information
centric advanced metering infrastructure in smart grid. IEEE transactions on
instrumentation and measurement. 64(8). pp.2072-2085.
2
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.