ICT: Collaboration Tools, Cloud Computing, Security and Business

Verified

Added on  2023/06/10

|8
|2192
|420
Report
AI Summary
This report provides an overview of Information and Communication Technology (ICT) tools and techniques used by businesses, focusing on collaboration tools and cloud computing, especially during the COVID-19 pandemic. It defines collaboration tools, their applications, and elaborates on tools like Move to Meeting and other digital communication technologies. The report discusses how these tools aided businesses during lockdowns by enabling remote teamwork and maintaining business continuity. It also covers cloud computing, its advantages, disadvantages, and suitability, including security risks and privacy concerns that arose during the pandemic. Furthermore, the report suggests measures businesses can take to protect their data, such as using antivirus software and strong passwords. The conclusion emphasizes the importance of data security and proactive adaptation to technological changes for business survival and success in the post-pandemic era. Desklib provides access to similar solved assignments and resources for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information and
Communication
Technology (ICT)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
What is collaboration tools ?.....................................................................................................1
Where it is used and what are they utilised for - ......................................................................1
Select any two collaboration tools and elaborate about them in details .............................2
How did they business during pandemic ? Give examples .......................................................2
Cloud Computing - .....................................................................................................................2
Privacy and security while pandemic - ...................................................................................3
What measures business can take to save the data - .............................................................3
CONCLUSION................................................................................................................................3
References:.......................................................................................................................................3
Document Page
INTRODUCTION
It is very crucial for a particular and the company to have a expertise which have the
specialized skills in regards to have the different business activity (Zhang, and et., al., 2021).
The professionalism ability are linked to the details technology , communication skills which
are essential for an industry and person in regards to act the task in an effective and efficient
ways. Here re various tools and techniques that can be used by the company in regards to
have an effective and property surrounding with in the company. The details and
communications technology is explained as the different procedure in regards to
communicate with in the company that is utilise of the technologies around the global
world. This report will consist the discussion on the various content just as different
collaborative tools, privacy and public internet services.
MAIN BODY
What is collaboration tools ?
It is tool that explains as the different new technologies in regards to have a growth in
the marketplace by the company. This is elaborated as the working collectively with the
members in regards to complete aims and goals in the impressive and attractive manner.
This is basically explained as the operating with the other particular unit in regards to attain
the objectives. It is the kind of the technology which is utilised by the business to operates
with the people and assist them in the various ways. Here are various illustration of the
zoom, go netting, Stack and many others (Hongfeng, 2020).
Where it is used and what are they utilised for -
The cooperation instruments and utilization in the different forms and for
interlinking with the people. The collaborative instruments are utilised by the special reason
of collage, schilling and also for the reason of the business conference. They are utilised in
relation to operate in a unit that is an impressive instruments to analyse another points.
This is use to attract and have systematic functioning (Yaokumah, and et., al., 2020). The
zoom meeting Is one of the impressive illustration which is used in the covid when there is
lock down and the scholars have actioned their studies over the online digital platforms.
1
Document Page
Select any two collaboration tools and elaborate about them in details
Here are various collaborative tools which is utilised by the different people while
the pandemic which is elaborated in below -
1. Move to meeting - it is the kind of the digital platform where the video
conferencing could place in regards to relate valued the huge amount of people at a
similar time. This is a tool which is utilised by the company in regards to run the
business activity. It Is the most basic tool which is utilised in the covid by the
institutions and universities in regards to educate the scholars the most impressive
ways. It is the tool in which people come relate as there are various options of
relating via the internet lines.
2. Details and communication technology - here are various another tools just as zoom
meeting it is also utilised by the people in their business in regards to have the
business activity. It is the kind of instruments where the amount of people can connect
to each other . The visual meeting is needed in the company can reach to every one
easily. The video conferencing is needed in the company to connect with the people
in the global market place. In this situation these online stages are been consider in
order to communicate in the impressive ways.
How did they business during pandemic ? Give examples
The utilisation of the different tool have assisted the business company while the
pandemic as after the covid have faced huge losses due to the unavailability of the human
workforce. The people were not capable to gather together in command to operate in team
this has effected In the operations of the company. But the social platform just as the zoom
meeting . Stack which had aid the people to link to each other and act the assessment the
task over the internet service. The utilization of the cyberspace and the stage just as zoom
meeting have assisted team. This has assisted a lot of the businesses while the academic as
the people are not permitted to go out of the houses and consitsing the operation the work
via the message and calls have assisted to manage the team meeting online (Riordan, .,
2019).
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cloud Computing -
What is it ?
Cloud computing is defined as the delivery of several services related to the computing
such as servers, database, software, intelligence, analytics, networking, storage and many more.
These are the services which help the organisation in bringing the quick innovation. In general
terms, the cloud computing is the thing which get involved in the delivery of services which are
related to the internet or they are being operated through the use of internet. It help the
management of business organisation in removing the direct expenses along with introducing the
complexities related to buying and keeping up them with the IT structure in there own
organisation. The major benefit related to the use of distributed computing management is that
the management can save the expenses of organisation and add flexibility as well. Hence, it can
be said that the distributed computing management provide several benefits related to the
economies of scale as it offer the same management to the broad customers base.
What is it used ?
Distributed Cloud computing leads to the creation of frameworks on the large
portion as it help in spreading the data from the use of several IT tools and
techniques. It helps the management in constantly move towards the clouds
through processing the data. For the same purpose the organisation is require to
spend on the IT slides.
What are the advantages, disadvantages and suitability and applications of cloud
computing ?
Advantages:
ï‚·High Speed: It make easy to store in backup which also save the time. It is found as easy
to store the data in backup.
3
Document Page
ï‚·Programmatic software integration: It can be said that the programming orchestration is
the natural occurrence. The business management is required to do bring changes in order
to properly coordinate with the applications of IT related to their tasks.
Disadvantages:
ï‚· Performance Can Vary: The application related to IT serve in the best possible manner
while making those assets available for the several business organisation. It may also
result in the attack on the behaviour of DDOS through which the common assets can be
easily visible to any person.
ï‚· Technical Issues: It is prone to the issues of other professionals. The organisations which
are working with the best cloud specialists can also face the several issues only because
of this. This require huge amount of support in order to perform the functions in an
effective and efficient manner.
ï‚· Risk of privacy: The use of cloud computing can make the work easier but it can also
involve huge amount of risk of privacy. When any unauthorised user this tools and
techniques, it may result in huge losses to the organisation whether in the form of money
or in the form of data.
Privacy and security while pandemic -
Here are some practices that have been describe in below -
1. Cyber attack - it is one of the huge threat which is seen by the company due to the
pandemic they have moved towards the online platform as there was he huge
uncertainty of the details which can be leaked and this can tend to the misuse of the
business details.
2. Hacking - It is the management threat which is done by the competitor brand with an
intention of the having the details of the company that can cause a huge loss to the
business (.Guo, and et., al., 2019).
What measures business can take to save the data -
Here are some measures that company have taken in regards to save them from various
threats that ate listed in below -
4
Document Page
1. Antivirus - It is the kind of software that assist in securing the system from hacking
and theft of data. It is been analysed that business are required essentially to have this in
there business .
2. Strong password - it is the kind of practice that companies must follow as they should
keep a tricky password that Is only known by the management and authorities of the
company (Lv, and et., al., , 2020).
CONCLUSION
It is concluded from above report that business may have faced a huge loss while
pandemic but they also have executed a smart changes in order to make the working smart .
While pandemic the company have seen a huge loss as some of the industry had been winded
up due to they were not able to generate the income from the market place and many if people
have the lost there jobs . This is been analysed that after pandemic companies have to be
more active and invest in securing there data and personal details. As above report analysed
the issues that company faces while pandemic and after that what threats they have while
running a business organisation.
References:
Books and Journals
Guan, Z., and et., al., 2018, August. When machine learning meets security issues: A survey. In
2018 IEEE international conference on intelligence and safety for robotics (ISR) (pp.
158-165). IEEE.
Guo, C., and et., al., 2019, July. A genetic algorithm based column generation method for multi-
depot electric bus vehicle scheduling. In Proceedings of the Genetic and Evolutionary
Computation Conference Companion (pp. 367-368).
Hongfeng, C., 2020. Information network security construction based on depth learning and
modulus algorithm. Journal of Intelligent & Fuzzy Systems, 38(6), pp.7229-7240.
Jun, W. and Haoyang, G., 2020. Virtual force field coverage algorithms for wireless sensor
networks in water environments. International Journal of Sensor Networks, 32(3),
pp.174-181.
Lv, L., and et., al., , 2020. A novel intrusion detection system based on an optimal hybrid kernel
extreme learning machine. Knowledge-based systems, 195, p.105648.
Orji, U.J., 2021. Rethinking the African Union Non-Aggression Treaty as a Framework for
Promoting Responsible State Behavior in Cyberspace. Max Planck Institute for
Comparative Public Law & International Law (MPIL) Research Paper, (2021-24).
Riordan, S., 2019. Cyberdiplomacy: managing security and governance online. John Wiley &
Sons.
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Sharma, Y., Gupta, H. and Khatri, S.K., 2019, February. A security model for the enhancement
of data privacy in cloud computing. In 2019 Amity International Conference on
Artificial Intelligence (AICAI) (pp. 898-902). IEEE.
Wrange, P., 2020. Sovereignty, Belligerency and the New Normal in Cyberspace. In Law,
Security and the State of Perpetual Emergency (pp. 67-105). Palgrave Macmillan,
Cham.
Yaokumah, W., and et., al., 2020. Modern Theories and Practices for Cyber Ethics and Security
Compliance. IGI Global.
Zhang, Q., and et., al., 2021. Group key agreement protocol among terminals of the intelligent
information system for mobile edge computing. International Journal of Intelligent
Systems.
Zhang, Y., and et., al., 2019, December. STNN: A novel TLS/SSL encrypted traffic
classification system based on stereo transform neural network. In 2019 IEEE 25th
International Conference on Parallel and Distributed Systems (ICPADS) (pp. 907-910).
IEEE.
6
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]