Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

Conceptual Questions

1 .
In IBM’s Responsible Computing Framework, please compare the areas of responsible infrastructure and responsible systems. Give at least three differences or three similarities.
2 .
Cyber resource quality requirements are a theme all throughout the chapter. Summarize what you have learned and apply it to the TRM.
3 .
The TOGAF Reference Model is a resource that can be used to define application platform frameworks. Explain the relationship between the application platform interface, the qualities, and the operating system services.
4 .
As previously discussed, the “ilities” are part of the OMA-NG framework. Explain the concepts of tailorability and evolvability and what differentiates them.
5 .
Modern web/mobility challenges include ease-of-use. This is slightly different from adaptability, which includes scalability and flexibility. Explain the differences between ease-of-use and adaptability.
6 .
Explain what a container is and how it enhances web/mobile platforms.
7 .
PaaS is a standard acronym for Platform as a Service. Explain how cloud PaaS works to enhance data analytics. Explain how PaaS can help with the TRM performance quality.
8 .
No security mechanism is free; what are the direct and indirect costs associated with implementing security mechanisms?
9 .
You are training a colleague to handle your organization’s software security. What key points will you share with this colleague?
10 .
In cloud-centric solutions for cybersecurity, the Cloud Security Alliance regards encryption as the most important control to secure data in the cloud. Based on your knowledge of encryption, why is encryption so important for cloud cybersecurity?
11 .
What cyberthreats do organizations face if they participate in the metaverse?
12 .
What is non-repudiation, and how is it achieved?
13 .
How can responsible data usage help with building a super-society?
14 .
How can you apply the concepts of responsible computing to help with risks of identity theft when using the Internet?
15 .
Explain why responsible impact is important to cloud computing?
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-computer-science/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-computer-science/pages/1-introduction
Citation information

© Oct 29, 2024 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.