Data and IT Infrastructure Data is the lifeblood of the information age in which we live—and the on-demand economy. Data by its very nature moves from place to place at nearly the speed of light. – nursing homework essays
Overview: Data and IT Infrastructure
Data is the lifeblood of the information age in which we live—and the on-demand economy. Data by its very nature moves from place to place at nearly the speed of light. Data is stored, retrieved and analyzed once it has arrived at the desired location—be it an individual or firm. Finally, throughout the lifecycle of data from its origination, transport, storage and usage, data must be protected from unauthorized access or corruption. It is the information technology infrastructure that performs these functions. The transport of data from place to place is performed by myriad networking technologies that take content and applications, break them down into pieces, and route them through an endless array of connected nodes. The fundamental technology employed in data storage is the database. Databases are both large and small and may be organized differently depending on the intended function. Since more data exists than ever before, data is often referred to as Big Data. The volume and lack of structure of such data requires special data management infrastructure and applications. Finally, it is acknowledged today now more than ever that data and the underlying networks and database infrastructure are all extremely valuable commodities. In the same way that banks keep money under lock and key within massive vaults, data is protected using techniques such as encryption, secure access methods, and intrusion detection. This module introduces and describes the complex web of underlying infrastructure that enables the information flow, content, communications, and applications that we enjoy today.
Required Resources:
Turban, E., Volonino, L., Wood, G. (2018). Information Technology for Management: Digital strategies for Insight, Action, and Sustainable Performance (11th ed.). John Wiley & Sons. ISBN: 978-1118890790. Read Chapters 3, 4 & 5.
Additional Resources:
• Shulaker, M. M., Hills, G., Park, R. S., Howe, R. T., Saraswat, K., Wong, H. S. P., & Mitra, S. (2017). Three-dimensional integration of nanotechnologies for computing and data storage on a single chip. Nature, 547(7661), 74-78. https://lecospa.ntu.edu.tw/wp-content/uploads/2017/09/nature22994.pdf
• Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering (pp. 239-248). Springer, Singapore. https://www.researchgate.net/profile/Virendra-Yadav-10/publication/320837483_Traditional_and_Hybrid_Encryption_Techniques_A_Survey/links/5b1a0e83aca272021cf22966/Traditional-and-Hybrid-Encryption-Techniques-A-Survey.pdf
Module Goals:
• Evaluate data management technologies
• Appraise network architectures
• Discuss network protocols
• Explain network security risks and countermeasures
Goals Alignment:
• University Mission Based Outcomes – 4, 5
• Program Learning Goals – MSTI – 1, 5 MSNI – 1, 3, 5
• Course Learning Objectives – 1, 2, 6
Assignment:
1. Take the Module 2 Quiz in D2L. The quiz consists of 10 questions. Each question is worth 2 points.
D2L Quiz Access:
Click on group of squares.
Click on Information Systems Strategic Planning.
Click on Content.
Click on Assignment.
Click on Module 2 Quiz.
2. Write a 1750–2000-word essay addressing each of the following points/questions. Be sure to completely answer all the questions for each bullet point. Separate each section in your paper with a clear heading that allows your professor to know which bullet you are addressing in that section of your paper. Support your ideas with at least three (3) sources in your essay. Make sure to reference the citations using the APA writing style for the essay. The cover page and reference page do not count towards the minimum word amount. Review the rubric criteria for this assignment.
• Explain the concept of the data warehouse and the data mart. Describe how you would employ both architectures when carrying out big data analytics within the firm. Support your observations and recommendations with cited evidence from at least two sources.
• Describe in your own words the data lifecycle. Explain what it means to information technology managers as well as individuals who interact with data. Finally, discuss the three principles associated with the data lifecycle and provide a simple example to illustrate each.
• Briefly compare and contrast the LAN, WAN, WLAN, and MAN networks. Include in your comparison a description of the expected bandwidth associated with each and explain what elements of the network are responsible for the increased bandwidth in the networks larger in scale.
• Identify and describe three technologies used in mobile networks and briefly discuss how the technologies you identify have evolved in recent years. Finally, identify at least one trend in mobile communication that may be expected to arise within the next 3-5 years.
M2 Assignment UMBO – 5
M2 Assignment PLG – MSTI – 1 MSNI – 5
M2 Assignment CLO – 2, 6
Assignment Specifications:
Length: 1750 – 2000 words; answers must thoroughly address the questions in a clear, concise manner.
Structure: Include a title page and reference page in APA style. These do not count towards the minimum word count for this assignment.
References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. Include at least three (3) scholarly sources to support your claims.
Format: Save your assignment as a Microsoft Word document (.doc or .docx).
File Name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)
M2 Assignment UMBO – 5
M2 Assignment PLG – MSTI – 1 MSNI – 5
M2 Assignment CLO – 2, 6
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
