Create a small-to medium sized business

Assignment Help Computer Engineering
Reference no: EM133337835

Question 1

Create a small-to medium sized business's ICT infrastructure. This business will be a truck rental. They will have a singular server, 3 pcs, 3 mobile phones. Each truck is fitted with GPS tracking and the information is feed live into the businesses cloud service, the company has 5 moving trucks, 3 utes and 2 vans for rental.

Tacking hardware is $150 for install and $25 per month per vehicle. This tracking hardware is designed to track the vehicle, record fuel usage, record maintenance and generalised reporting on each vehicle.

IT support is outsourced.

Discuss with your peers the research areas and end result for this question.

You are to locate and price:

- One server to handle internal networking

- One cloud service that covers data storage

- 3 PCs

- 3 Mobile phones

document must contain:

- Business summary

- Hardware list (Pricing, URLs e Images)

- Risk matrix

- Six areas of ISO 27031

Question 2

Using the information obtained from the previous answer. Identify and document disaster strategy processes, select a minimum of three disasters that could affect the business, and do a disaster strategy process.

Your document must contain:

- Business summary

- Threats (Minimum of 3)

Reference no: EM133337835

Questions Cloud

Limitations or challenges facing NATO operations : What are the limitations or challenges facing NATO' operations? Explain its convergence interest observed.
Provide an update to their development status : Provide an update to their development status. Make sure you provide some background on your selection and then provide the update of the development
Which cis controls v8 could have helped to prevent attack : Which CIS Controls v8 could have helped to prevent the attack that is detailed in the case study? (Please use bullets or numbers.)
NATO make in 1999 conflict between Serbia and Kosovo : What impact did NATO make in the 1999 conflict between Serbia and Kosovo?
Create a small-to medium sized business : Create a small-to medium sized business's ICT infrastructure. This business will be a truck rental. They will have a singular server, 3 pcs, 3 mobile phones
Propose a specific and novel it innovation : BIT 4604 Virginia Tech Propose a specific and novel IT innovation that the firms could use to gain a strategic advantage over its competitors
Social movement create international political theory : How does the social movement create international political theory? Where are the women in international theory?
Did you use manual or automated approach for test management : SST3 6068 Fanshawe College What was your test management process during your project execution? Did you use manual or automated approach for test management
Nation-state since the Cold War era : Describe the evolution of conflict in Afghanistan as a nation-state since the Cold War era until the rise of Taliban in 2021.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write the statements to read two strings from user input

Write the statements to read two strings from user input and output the one that comes later in lexicographic order

  Determine the data types you would need for your application

Describe the strategy that you would use in order to determine the data types you would need for your application.

  Create a slide on security center of excellence

Create a slide of risk management. Create a slide on security center of excellence and security framework (Security lifecycle, disaster recovery).

  How many fewer probes will be done in an unsuccessful search

How many fewer probes will be done, on average, in an unsuccessful search? How many probes are needed, on average, to insert a new node in the right place?

  How many characters can be stored on the disk

How many characters can be stored on the disk? What are the best case and worst case access time for the data (in a sector)?

  Performance is an important consideration during planning

Why do you think this is done? Are there circumstances when it should not be done?

  What are some advantages the r programming language has

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over.

  Define reasons to turn on multifactor authentication

List 5 reasons to turn on multifactor authentication? Provide at least two additional links to articles related to multifactor authentication.

  Assume that veclist is a vector container

Suppose that vecList is a vector container and vecList = {12, 16, 8, 23, 40, 6, 18, 9, 75} Show vecList after the following statement executes.

  Discuss the benefits of your selected quality attribute

Describe/Discuss how choosing one technology, which could make use of the property/quality, over another technology, would satisfy this nonfunctional property or quality attribute. Discuss the benefits and drawbacks of your selected nonfunctional p..

  Has kelvin committed an ethical lapse

Kelvin planned to provide his friend with internal design specifications and the assessment criteria to be used for vendor selection for the initiative.

  Find a binary search tree whose nodes cannot be colored

Insert the keys c, o, r, n, f, l, a, k, e, s into an initially empty. Find a binary search tree whose nodes cannot be colored so as to make it a red-black tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd