Cloud computing

1-Case Project 7-5: Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then look at one element of your school or work network infrastructure and apply it to cloud computing. Would it be feasible? Why or why not?A one page paper is not necessary, just answer the questions above and remember to cite any additional sources.

2-Why should a person make sure to use secure protocols opposed to unsecure ones like FTP?

3-What are the potential effects of a network device not being properly placed in the correct place on the network?

please answer the questions in simple and short answers

I will attach the slides please answer the questions

Requirements: answer questions and two replies

only articles and websites on google search

Answer preview

Secure protocols offer safe avenues of files transfer. They protect against data breaches that could have catastrophic effects. According to Ciampa (2017), hackers target unsecured protocols like FTP because they are easy to breach. Information safety should be a top consideration when sharing files.

  1. What are the potential effects of a network device not being properly placed in the correct place on the network?

Improper placement of a device on a network will lead to a faulty or poor network connection. This could lead to a significant disruption in the organization’s data flow. Besides, it could lead to sluggishness in the subject organization’s operations.

[381 Words]

 

Cloud computing
Scroll to Top