How cloud computing is used to solve computing problems

Assignment Help Computer Networking
Reference no: EM13829447 , Length: 6 Pages

Tasks:

Every several years the Australian Electoral Commission (AEC) conducts a federal election.

Normally a federal election employs a paper based voting system. However, the AEC wants to completely move away from this paper based system to a cloud based solution.

Your task is to design a cloud based solution for a future federal election.

It is clear from the AEC web site that the AEC is responsible for many functions. For example, in addition to election management, the AEC also manages the electoral roll, education, awareness, and so on.

Your design should only reflect the following requirements for a federal election, rather than every AEC function:

• each eligible voter is allowed to vote only once

• an electronic electoral roll will be used to record whether a voter has voted, or not voted

• for each voter, their voting details must be recorded and archive

• the AEC needs access to voting details in order to tally votes

• the AEC must release intermediate and final tallies in order for the public, media, and government parties to access

Question 2:

Related Assessment Criteria

Assessing this question focuses on whether students can demonstrate the ability to:

• Describe how cloud computing is used to solve computing problems.

Tasks

Continuing on from Question 1:

(a) Provide a list of 5 risks related to an AEC cloud based solution using IaaS.

(b) For each item listed in part (a) provide a reason why that item is a risk to the AEC.

Question 3:

Related Assessment Criteria

Assessing this question focuses on whether students can demonstrate the ability to:

• Describe how cloud computing is used to solve computing problems.

Tasks

(a) Provide a list of 5 benefits related to an AEC cloud based solution using IaaS.

(b) For each item listed in part (a) provide a reason why that item is a benefit to the AEC.

(c) For each benefit listed in part (a) how the AEC improve that benefit?

Reference no: EM13829447

Questions Cloud

About the before-tax analysis : Fairmont Industries primarily relies on 100% equity financing to fund projects. A good opportunity is available that will require $250,000 in capital. The Fairmont owner can supply the money from personal investments that currently earn an average of..
Pestle analysis of a new uk based business plan : PESTLE Analysis of a new UK based business plan
Marketing concept and societal marketing concept : Compare and contract the difference between marketing concept and societal marketing concept.
Design interface for government for identifying terrorists : As part of the design team on a major government defense project, it is time to create your first mock-up of this terrorist identification and tracking user interface.
How cloud computing is used to solve computing problems : Describe how cloud computing is used to solve computing problems and provide a reason why that item is a benefit to the AEC.
Harvard case study analysis - mountain man brewing : Harvard Case Study Analysis - Mountain Man Brewing
Explain about studies on identical twins being raised apart : The question is from Sociology and the question explain about studies on identical twins being raised apart showing some similarities and lifestyle. This statement has been reviewed and a conclusive proof about the truth of the statement is given.
Differences between leadership and management : What are some differences between leadership and management? How do these differences affect an organization? What are some decisions leaders must make? What are some decisions managers must make
Program which implements josephus problem : Use a circular list to implement the Josephus Problem.  In the Josephus Problem, there is originally a circle of people numbered from one to n.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is routing loops

Explain two of the above techniques briefly with diagrams. What is Routing Loops?

  Explain four different types of wireless technologies

Explain four different types of wireless technologies in a 350- to 700-word paper in APA format. Describe the characteristics and properties of each signal type, and how each can be used.

  Message forwarding a computer in the computing department

message forwarding a computer in the computing department has just been turned on. the user starts up their web browser

  Text book – computer networking a top down approach

Text Book – Computer networking A top down approach, Part 1. Text reading, Part 2. Textbook questions, Chapter 7 , 7.1 Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applica..

  Osi layer-tcp/ip model

The OSI Layer 3 (Network Layer) is one of the layers that perform packet segmentation. The OSI Layer 3 is roughly equivalent to the Internet Layer of the TCP/IP model and the Layer 4 (Transport Layer) of the OSI model is roughly equivalent to the ..

  Categorical feature comparison for the products

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  Fault-tolerant architecture and disaster recovery strategy

This assignment will give you the opportunity to provide a backup strategy and disaster recovery plan to protect the organization against disruptions to the availability of the system. In this final assignment, focus on the most critical system th..

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Differences between lan and wan operating systems

What are the predominant network operating systems in use today? What are the differences between LAN and WAN operating systems

  What version of http is the browser running

Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). What version of HTTP is the browser running? What is the IP addr..

  Project descriptionsauthentic assessment you will be given

project descriptionsauthentic assessment you will be given a scenario-based project that will require you to provide

  How can azure be used as a substitute

Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd