This report outlines a brief discussion on the case study of computer systems. The various details regarding the appropriate software would also be provided here.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: FOUNDATIONS OF INFORMATION TECHNOLOGY Foundations of Information Technology Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 FOUNDATIONS OF INFORMATION TECHNOLOGY Table of Contents Introduction................................................................................................................................2 Discussion..................................................................................................................................2 1. Software for Basic Works and Description of the Functionality of Software...................2 2. Business Meeting Software with its Functionalities..........................................................2 3. Programs that Protect Computer and Maintain Access Control........................................3 4. Making System Update for not Hindering Work...............................................................5 5. List of Browsers for Accessing Internet Facilities.............................................................5 6. Procedure of Storing Information for Accessing Information...........................................6 Conclusion..................................................................................................................................7 References..................................................................................................................................8
2 FOUNDATIONS OF INFORMATION TECHNOLOGY Introduction IT or information technology can be stated as the utilization of several computers for the purpose of storing, retrieving, transmitting and finally manipulating information or data for any specific organization or business (Dahlstrom, Walker and Dziuban 2013). There are three distinct categories of information technologies, which are techniques to process, simulation of the high order thinking with computerized programs and a proper application of the mathematical or statistical methods for decision making. This information technology is the proper subset of the ICT or information and communications technology. The following report outlines a brief discussion on the case study of computer systems. The various details regarding the appropriate software would also be provided here. Discussion 1. Software for Basic Works and Description of the Functionality of Software The most suitable and the best software required in this particular case study is the Microsoft Office. It is the family of client software, server software as well as services. It is responsible for doing all types of basic works that would be required for starting the new business (Dahlstrom and Bichsel 2014). The major functions of this software majorly include Microsoft Word, Microsoft PowerPoint and Microsoft Excel. There are multiple versions of this software and thus it is much effective for the users. 2. Business Meeting Software with its Functionalities The business meeting software or the video conferencing software is responsible for facilitating the initiation and conducting of live conferences or business meetings within two or more participants at the various sites by simply utilizing the computer networks for the core purpose of transmitting audio, video and text data (Eason 2014). The productivity is increased by and the extra costs are eradicated. One of the most significant and important
3 FOUNDATIONS OF INFORMATION TECHNOLOGY business meeting software for this particular case study is the Click Meeting. This particular software of Click Meeting is eventually a browser based, flexible as well as feature heavy platform for the web conferencing. It is a cloud software as a solution feature for dedicating within the business environment for the major purpose of meeting, collaborating and working online. Hence, this business meeting software of Click Meeting subsequently allows the busy professionals for hosting and running the online meetings or even the video conferences in the easiest manner (Bilbao-Osorio, Dutta and Lanvin 2013). This specific software needs absolutely no installation and even work on each and every device or operating system. 3. Programs that Protect Computer and Maintain Access Control Protection of computers is extremely important and significant for any organization to protect their respective systems from any type of attack or vulnerability. The computer security is termed as the protection of the several computer based systems from any type of damage or theft to the software, hardware as well as the electronic data from the disruptions and misdirection of services, which are provided to them (Marchewka 2014). Due to the increased reliance on the computer systems, the connection of the Internet and even the wireless networks like Wi-Fi or wireless fidelity and Bluetooth have become extremely vulnerable for all users and hence these users undergo various issues and problems while using the software. This is majorly because of the growth of the smart devices such as smart televisions and smart phones and these various devices altogether constitute the IoT or Internet of Things (Holtshouse 2013). There are some of the most significant and important software programs that help in protecting the systems. These programs are responsible to protect the several organizational systems and the major programs are listed below: i)Keeper: It is the most effective and efficient software that helps to manage the passwords and even the digital wallet, which stores the web site passwords and any sensitive information. This software utilizes 256 bit AES encryption as well as the two factor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 FOUNDATIONS OF INFORMATION TECHNOLOGY authentication (Bloom et al. 2014). The files and passwords could be easily synced or shared with HTTPS and backed up within cloud. ii)Air Watch VMware: The VMware Air Watch is the best provider of EMM or enterprise mobility management software for the applications, emails and contents. iii)Solar Winds Software: This particular software of Solar Winds is responsible for the purpose of helping to manage the networks, systems as well as infrastructures of information technology (Lloyd 2017). iv)Dashlane: The Dashlane is the application of password manager and secured digitalized wallet. Since, this specific application is available on Android, Mac, iOS and PC. It enables the users in securely sync the data within the unlimited devices on every platform. v)SaaS Vulnerability Scanner: As per the case study, the user would be accessing cloud based accounting software and hence this software of SaaS Vulnerability Scanner would help them in detecting or scanning all the vulnerabilities or threats within the system (Schwalbe 2015). The major and the most important software programs that help in proper access controlling are listed below: i)ISONAS ii)Brivo iii)Kisi iv)Vanderbilt v)Tyco Integrated Security
5 FOUNDATIONS OF INFORMATION TECHNOLOGY 4. Making System Update for not Hindering Work Since, the user is starting a new business and computers are to be set properly, the systems are to be updated properly and regularly, so that the employees does not face any issue regarding hindering of work. This updating of software is extremely easier for all users. There are some of the major steps that are to be followed for this type of system updates on both Mac and Windows operating systems (Alwahaishi and Snásel 2013). These software updates are hence easily completed by relieving some of the valuable system resources. The major programs helpful in this case are: i)PC App Store ii)Patch My PC Updater iii)Kaspersky Software Updater iv)Heimdal Free. 5. List of Browsers for Accessing Internet Facilities The web browser is the respective software application that helps in accessing any type of information on the WWW or World Wide Web. Every individual image, web page or video is properly and uniquely identified by the specific URL. The browsers are enabled for retrieving and displaying them on the devices of the various users. The web browser is not the same as the search engine. The search engine eventually stores the searchable data; however about all other web sites (Wagner, Beimborn and Weitzel 2014). However, for the purpose of connecting or displaying these web sites on the various devices, the specified user requires to have the web browser installed here. The major feature of these web browsers are the innovative graphical interfaces that these web browsers comprise of. The most significant and suitable browsers for accessing the Internet facilities for this particular case study are listed below:
6 FOUNDATIONS OF INFORMATION TECHNOLOGY i)Chrome: This is the free ware web browser could be accessed by Microsoft Windows, macOS, Android, Linux and iOS and it serves as the platform to run the web applications. ii)Firefox: This is the free as well as open source web browser and is available for Linux, macOS and Windows. It is extremely faster and could be accessed easily. iii)Safari: This is the graphical web browser that is completely based on the engine of WebKit. Safari could be accessed from iOS and Android versions (Brooks 2016). iv)Internet Explorer: The Internet Explorer is the series of the graphical web browsers for Windows operating system. Although, the speed of this browser is not as high as the rest; it is quite efficient for all users. v)Edge: Microsoft Edge is the graphical web browser and supports the devices of Windows 10 Mobile, Xbox One and Windows 10 and hence replacing Internet Explorer as the main web browser in every device. 6. Procedure of Storing Information for Accessing Information The storing of information is one of the most important and significant requirement for all organizations and businesses. As per the provided case study, since the user is starting a new business and new employees would be recruited; it is extremely vital to store the confidential and sensitive organizational information in such a manner that the employees or staffs could easily access them without any type of issue or problem (Schwalbe 2015). The first and the foremost format of this information storage procedure is to utilize clear as well as user focused language. When this information is being stored, such words should be uses, so that the employees are able to access the information easily and promptly. The next effective and efficient way to store the information for better access to the employees is by publicising alternative formats in easy to read version. An accessible information policy
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 FOUNDATIONS OF INFORMATION TECHNOLOGY should be eventually developed as well as publicised for the users so that the communications are completed easily (Bloom et al. 2014). A proper evaluation of this policy is also required here. Conclusion Therefore, from the above discussion, conclusion can be drawn that the information technology is the proper utilization of any type of computer, storage, networking device, physical device, processes as well as infrastructures for the purpose of creating, processing, storing, securing and exchanging of every form of data. There are several layers of physical equipment or hardware, virtualization or management tools present here for performing the major functions. The above report has clearly outlined the various details regarding the case study of information technology. The significant details regarding the appropriate software and systems are provided here with recommendations.
8 FOUNDATIONS OF INFORMATION TECHNOLOGY References Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications technology: a UTAUT and flow based theoretical model.Journal of technology management & innovation,8(2), pp.61-73. Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology report 2013. InWorld Economic Forum(pp. 1-383). Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information technology and communication technology on firm organization.Management Science,60(12), pp.2859-2885. Brooks, D.C., 2016.ECAR study of undergraduate students and information technology(Vol. 4, No. 3, p. 2). 2016. Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information Technology, 2014.Educause. Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013.ECAR study of undergraduate students and information technology(p. 2013). 2013. Eason, K.D., 2014.Information technology and organisational change. CRC Press. Holtshouse,D.K.,2013.Informationtechnologyforknowledgemanagement.Springer Science & Business Media. Lloyd, I., 2017.Information technology law. Oxford University Press. Marchewka, J.T., 2014.Information technology project management. John Wiley & Sons. Schwalbe, K., 2015.Information technology project management. Cengage Learning.
9 FOUNDATIONS OF INFORMATION TECHNOLOGY Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information technology and business units drives operational alignment and IT business value.Journal of Management Information Systems,31(1), pp.241-272.