Preparing passengers invoices and boarding passes

Assignment Help Basic Computer Science
Reference no: EM133245625

Airport's currently capacity is 15 000 Passengers a day. There are 150 full time employees along with 128 part time employees. IT system components of Airport Datacenter - Database for Passengers - Database for airlines / flights - Database for Employees - Processing / Computing: Preparing Passengers invoices, boarding passes - Long term data storage to fulfill the regulations the airport must maintain (keep) the passenger and flight data for five years.

Question 1. There is an increased risk of accident where a huge cargo Aircraft might go out of control and damage Airport's Datacenter. What can you do to reduce impact of this threat so Airport continues to operate?

Question 2. There is an increased risk of power blackouts at the Airport's Datacenter due to heavy storm in the region. What can you do to reduce impact of this threat so Airport continues to operate? Consider this new case while answering the question 3,4,5 and 6. Airport is growing fast and it is going to reach 30 000 Passengers a day. It looks like current data center would not be able to handle the influx of new passengers and new airlines. And, this is happing fast, there is no time to physically expand the Airport Datacenter.

Question 3. Which components of the Airport's Datacenter you would move the cloud to meet the demand? And which components of the Airport's Datacenter you would keep in the datacenter of the airport. Explain your rationale (give the justification for the choice you make)

Question 4. Before moving the IT components to cloud that you have mentioned in question 3; What would be System Requirements that you look for the cloud service provider?

Question 5. Assuming that; you decided to shift a great deal of day-to-day management the cloud-solution provider (agreement with the cloud service provider company). As an IT manager what you would do to monitor system performance for the Airport's Datacenter?

Question 6. How you would address following three Security issues related to long term operation of Airport's Datacenter in partnership with the cloud service provider?

Reference no: EM133245625

Questions Cloud

Important for business stakeholders : Why is it so important for business stakeholders and developers to work closely together when using the Agile methodology for a project?
Principals of nofsinger consulting services : The interns have been asked to discuss their career plans and aspirations with one or more of the principals of Nofsinger Consulting Services.
Type of service-model of cloud computing : Describe each type of service/model of cloud computing. Compare and contrast: local resource requirements, local control, network requirements and security.
Profession or occupation uses medical terminology : Besides healthcare professionals what other profession or occupation uses medical terminology?
Preparing passengers invoices and boarding passes : Preparing Passengers invoices, boarding passes - Long term data storage to fulfill the regulations the airport must maintain (keep) the passenger
Business intelligence play bigger role in corporate planning : How can business intelligence play a bigger role in corporate planning? How has business analytics assisted your selected organisation?
Solarwinds breach : In early 2020, hackers secretly broke into Texas-based SolarWinds systems and added malicious code into the company's software system.
Christensen theory of disruptive innovation : Christensen's theory of disruptive innovation has been widely applied to not just numerous business fields,
Responsibilities within information assurance plan : Comprehensively addresses components of information assurance as they relate to individual roles and responsibilities within the information assurance plan.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Minimal number of assembly instructions

For the following C statement, what is the corresponding RISC-V assembly code? Assume that the variables f, g, h, and i are given and could be considered

  Perform several iterations of process

You perform several iterations of this process. Do you think the performance of your classifier is improving at each iteration? Why or why not?

  Times of the square of input number

I got feedback after it was graded that I need to have a function call from main to a separate function that calculates the results and returns it to main.

  Netbeans integrated development environment

Write a Java application using NetBeans Integrated Development Environment (IDE) that calculates the total annual compensation of a salesperson. Consider the following factors:

  Devise efficient search algorithm for an array of this type

Suppose that you have numerical data stored in a two-dimensional array, such as the one in Figure 18-9. The data in each row and in each column is sorted in increasing order.

  Find the minimum-size edge cover for g

An edge cover of an undirected graph G = (V,E) is a set of edges such that each vertex in the graph is incident to at least one edge from the set. Give an efficient algorithm, based on matching, to find the minimum-size edge cover for G.

  Discuss all legal claims that paul may be able to assert

Identify and discuss any and all legal claims that Paul may be able to assert. Will Paul be able to assert a constitutional claim? Why or why not?

  Estimate the time taken for each of the following in pthread

Estimate the time taken for each of the following in Pthreads

  Describe the steps that you would use in order to convert

We are ask to write in our own words. Describe the steps that you would use in order to convert database tables to the first normal form, second normal form

  Compare these three policies

Compare these three policies to determine which site offers the greatest privacy to the user.

  What conclusions can you draw from this exercise

Compare the effect with a map of a cerebral cortex (Figure 10.40). What conclusions can you draw from this exercise?

  Web servers are compromised for number of reasons

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd