ICT Services Assignment: IT Careers, Data and Cloud Computing

Verified

Added on  2023/04/07

|3
|660
|463
Homework Assignment
AI Summary
This assignment response addresses key aspects of ICT services, beginning with a personal introduction highlighting the author's interest in technology and career aspirations in IT. It identifies high-demand IT careers such as cloud computing, data analytics, artificial intelligence, and cybersecurity, explaining their significance in modern business operations. The assignment then explores the importance of IT to the author's career goals, emphasizing marketable skills and plans for a technology consulting career. It defines data volatility and its impact on database analysis, and discusses the problems associated with cloud computing, including unauthorized data access and security/privacy concerns. The response includes references to support the arguments made.
Document Page
Processes of ICT services
1. An introduction of yourself (your work, hobby, interests).
I am an ambitious person who has a great interest in technology. My vision is to create a
career in IT. My hobbies include reading novels, reading blog posts of technology and business
topics, and taking part in discussion forums. I also have an interest in swimming, and I am a
football fan.
2. What IT careers are forecasted to be in high demand? Explain why.
IT careers that are predicted to be in high demand include, cloud computing, data analytics,
artificial intelligence and cybersecurity. These careers are on high demand due to the impact they
have on business organizations. All these fields have revolutionized the way business is
conducted today. Businesses are adopting cloud services in place of traditional methods of
storing data in warehouses. Also, organizations are using big data and data analytics to predict
customer and market trends and making crucial company decisions (Roussey, 2018).
3. Why is IT important to your career? What do you want to get by studying this
subject? What is your plan when you finish your study?
With the daily advancements in the IT field, organizations are opting to use IT systems rather
than human resource. However, these IT systems need people to manage. Thus a career in IT
will remain marketable even in future. IT will give me marketable skills that I will use to develop
my career. I plan to work in a technology consulting firm.
4. Explain what is meant by data volatility. How does it affect the use of databases for
data analysis?
Data volatility can be explained as the rate at which stored data changes over time. This
implies that databases that are used for data analysis will give different results when the data
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
changes (Coric, 2019). Databases are volatile because data is constantly being added, deleted and
updated. The rate of data changing will cause variations in the results since different inputs are
used. For proper results to be obtained, then data volatility should be factored while doing the
analysis.
5. What are the problems associated with cloud computing?
The past few years have seen an influx in the growth and adoption of cloud computing
services. While cloud computing technology brings many benefits, IT experts are aware of the
problems that are associated with cloud computing technology. Some of the problems associated
with cloud computing include:
Unauthorized access to proprietary and confidential data. The private and confidential
property and data must be secured by the ‘Business Cloud’ that contains trading secrets,
customer’s information, and other data. It is the primary responsibility of business cloud to
ensure proper security of data. A security breach can cause permanent damage to the business
that leads towards bankruptcy and other legal complications (Francis and Vadivel, 2012).
Privacy and security of data. Cloud computing is based on public clouds that make it
accessible to the general users of the internet, although the data and intellectual assets of the
companies are protected by effective security measures the concept still seems vulnerable to
some users. The transfer and access of information on public clouds increase chances of
eavesdropping, intrusion and man-in-the-middle attacks as compared to the transmission of data
on private clouds. Therefore, the decreasing control of security and privacy proves to be one of
the inhibitions regarding the usage of cloud computing services (Lynch & Hayes, 2011).
Document Page
References
Coric, B. (2019). Variations in output volatility: Evidence from international historical data.
Economics Letters, 178, 102–105. https://doi.org/10.1016/j.econlet.2019.03.008 [Accessed
14.3.2019]
Francis, T. Y., & Vadivel, S. (2012). Cloud computing security: Concerns, strategies and best
practices. 2012 International Conference on Cloud Computing Technologies, Applications
and Management (ICCCTAM). doi:10.1109/iccctam.2012.6488099[Accessed 14.3.2019]
Lynch, L., & Hayes, T. (2011). Cloud Morphing: Shaping the Future of Cloud Computing
Security and Audit. Auditing Cloud Computing, 161-174.
doi:10.1002/9781118269091.ch9[Accessed 14.3.2019]
Roussey, B. (2018, August 10). Hottest IT jobs and job trends in 2018-19. Retrieved March 14,
2019, from http://techgenix.com/hottest-it-jobs/ [Accessed 14.3.2019]
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]