This article discusses IT Governance, Australian Standards, Risk Treatment Methods, Designing for Accessibility, and Green ICT. It also provides examples and explanations for each topic. The article is relevant for students studying Information and Communication Technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION AND COMMUNICATION TECHNOLOGY Information and Communication Technology Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION AND COMMUNICATION TECHNOLOGY Question 1 Does your host company have in place a formal IT Governance framework? Some clues as to its existence might be that there is a Corporate Governance or IT Governance policy document; the corporate intranet might contain references to governance. Structures may exist, at higher levels that are the decision making bodies and which control activities in the company for all levels through delegated authority. No, the host company Phoenix technology does not have the place in the formal IT Governance network. The Phoenix technology is the small ITindustry that provide the network security tools to the online business sectors. The company has the strength with less than 500 employees.HavingtheintranetdoesnotstatethecompanyhasbeenfollowingtheIT governance(Olutoyin and Flowerday2016.). The company has less than 200 employees. The IT governance is quite limited in the small enterprise in the company. This is due to the limited resourcesinthesmallbusiness;thecompanymightfacesomefinancialsetbacksin implementing the IT governance in the company. In order to imply the IT governance framework in the company the following characteristics are needed to be implement in the firm. 1.The company would have to provide3 provision for business without any higher authority structures namely board of the directors. 2.The plans made under this governance must be done under the provided limited resources. 3.The framework should not be prone to the problems of IT jargon and the framework should be understandable to all the people belonging to the organisation. 4.The framework that has to be implemented should be easy and simple to implement 5.The framework implemented should be cost effective
2INFORMATION AND COMMUNICATION TECHNOLOGY The framework should be made in context of the preinstalled software packages like spreadsheets, word processors, email, MS office tool kits, data management kits. Question 2 Describe a situation in your internship, or previous work, where you have taken account of an Australian Standard in fulfilling your ICT task, and why. If you have not already experienced such situation, describe a situation in your internship where you will need to take account of an Australian standard in fulfilling your ICT task, and why. As an intern in the Phoenix technology, I have not experienced any case where I had to use the Australian standard to fulfill the ICT task (Hillson and David,2017).. The ICT might need help of the Australian standard in decision making while doing an IT project. The requirements, the decision have involved in the case of the It projects are due to business disruption, unacceptable cost or any mitigation risk is taken under the Australian standard. The Australian standard makes sure that there is a proper work delivered by the developer to the customer. Suppose if I have been given a task for the development of Network security software. Under the Australian standard, I will make sure that there is It project has met the objective set by the client, it is understandable, it could. The software might be followed under the data protection act. The quality of the software will tested and implemented under the Australian Standard of IT governance (Bergeron et al. 2015).The Australian standard will provide me the way to deliver the effective, efficient methods so that the project seemed to be acceptable to the client. The Australian standard helps in careful planning of the project and help setting the ethical rules for the increasing the productivity of the organization. Under the Australian act, the demonstration of the prototype is primarily done in order to ensure the quality of the project. As an intern in
3INFORMATION AND COMMUNICATION TECHNOLOGY order to fulfil, the IT task this set of formal rules will help me in creating the quality projects that could meet the objectives. Question 3 Describe a situation in your internship, or previous work, where you have taken account of compliance (legislation) in fulfilling your ICT task, and why. If you have not already experienced such situation, describe a situation in your internship where you will need to take account of Australian legislation in fulfilling your ICT task, and why In the course of work that has been personally experienced, there has been an incidence where there has been an Australian Standard followed for the completion of an ICT task. The development of a software for an online music portal has been considered which followed the Australian Legal Standards for completion while there had been contents present in the software that were developed with ideas referenced from a source where an original developer had implemented these ideas before. The idea was to develop the software, but the contents would be derived from external sources. The music that was present in the software were produced and developed by different derived sources, which were given proper credit for fulfilling all the legalized documentations and other legalities as per the Australian Intellectual Property Law. This has been a credit for the organization which initiated the idea as the entire software had the legal rights of playing all the music and audio clips in the software, with due property rights paid to the reference from where the audio has been sourced from. This way, the software rights for intellectual property was not violated as per the Australian Intellectual Property Rights, and the software development method fulfilled the progression of the project. Question 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION AND COMMUNICATION TECHNOLOGY Which risk treatment method is this? InthetaskwheretheprojectteamisdevelopinganappforiOs,Android,and Windowsphones, the development team lead identifies a risk with the Windows phones. The team was found to have little experience with the Windows mobile operating system and the operating system of Windows is not capable of performing many of the required functions without using commercial plugins and APIs. This is why the company decided on removing Windows compatibility from the project. This process is known as Avoidance as a risk treatment method. This is where the risk factor is completely removed from the system. Which risk treatment method should be used when a section of the project is too difficult for the company to perform? If during the entire process, a risk is identified that is unavoidable, the risk treatment factor that should be followed is the Acceptance policy. Acceptance tends to accept the risk factor and continues to mitigate the additional risks that creep up due to the unavoidable risk factor within the system. You are managing a project which uses subroutines and libraries from a number of different sources. You are concerned that the project might accidentally contravene the law. So you ask the HR department to employ someone with specialist knowledge in the area. Is this an example of “Transference”? Yes, this is an example of transference where the entire problem or the risk factor is transferred from the source to the third party. The Specialist knowledge shifts departments which is the main criteria of the risk treatment factor being a transference process. What is thedifference between“Avoidance” and “Acceptance”?
5INFORMATION AND COMMUNICATION TECHNOLOGY The main difference between the risk processes of Avoidance and Acceptance is that the factor due to which risk is detected in the system is entirely removed from the system or process in the project in avoidance method. On the other hand, acceptance tends to accept the risk factor and continues to mitigate the additional risks that creep up due to the unavoidable risk factor within the system. Question 5 Discuss ways in which you can design your software and applications for2of the following: 1. Blind or visually impaired clients Implementing audio bots within the entire software system would help the blind or visually impaired client to browse the software. 2. Clients with limited or poor hand coordination Use of key board shortcuts that would aid the navigation process would help in the browsing of the software for limited or poor hand coordination people. Question 6 Discuss3ways in which you (or your organisation), can use ICT to reduce your carbon footprint, and contribute to Green ICT. The following are ways by which in which an organisation can use ICT to reduce your carbon footprint, and contribute to Green ICT: Turning off PCs when not in use:This is a way by whichif both the monitor and CPU are left on for 8 hours according to the average workday, five days a week, in a month up to 58 kWh could be used. This way, the energy can be saved
6INFORMATION AND COMMUNICATION TECHNOLOGY and it would enhance the power consumption rate in the organization. As an individual as well, it can be justified to implement this way as it would also be a good practice to make the energy consumptions less in every area also. Limit the use of screensavers:Although screensavers are a way to personalize your PC, when they are triggered, they can keep the both the computer and monitor active. No power savings are realized. However, some might contend that having a screensaver shields the images on their computer screens from prying eyes. Use greener equipment:There is a direct relationship between the equipment used and power consumed. For example laptops are considerably more efficient than desktop computer systems. However, laptops tend to be more expensive than desktops and generally, they need to be replaced more often than desktops, which can be more easily upgraded or have parts replaced. Question 7 Which of the following are projects, and which are processes? Explain your answer 1. Building a computer, on a production line of identical computers Thisis a process as the primary criteria of a process are that the execution of a particular deliverable would have no end and no specific completion. Since the production of the computer is not the only one in line and the company under which the manufacturing of the computer is ongoing has to produce numerous identical computers. The deliverable would not have a fixed time and it would require that it would go on producing as many computers it can. Thus it can be regarded as a process, rather than a project.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION AND COMMUNICATION TECHNOLOGY 2. Building a house, as one of a series of identical houses all over Australia This is also a process, since the building of the house is not a task that would have a limited time to get completed and it the company is in line for producing identical houses all over Australia. The entire task for the company is not dependant on time, unlike a project, and the entire building development would not stop with the single house. Therefore, the entire work progression denotes that this is a process. 3. Upgrading a computer from Windows 7 to Windows 10 The upgrading of one computer from Windows 7 to Windows 10 is a deliverable that has an end time and there is no scope of reoccurrence of the same deliverable over a period of time. Thus this particular task can be termed as a project rather than a process, where a single computer would have its operating system upgraded from Windows 7 to Windows 10 and the task would end there. Thus, this is a project rather than a process. 4. Upgrading all 120 computers from Windows 7 to Windows 10 When a computer is upgraded from Windows 7 to Windows 10, it is termed as a project since it has a set goal that has a end point when the upgradation is complete. When a series of computer is doing the same task, it can also be said that it is a project than being a process since may how many computers are involved in the project, it would still be a process as the work would come to a completion when the last computer is upgraded to Windows 10.
8INFORMATION AND COMMUNICATION TECHNOLOGY References Bergeron,F.,Croteau,A.M.,Uwizeyemungu,S.andRaymond,L.,2015,January.IT Governance Theories and the Reality of SMEs: Bridging the Gap. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4544-4553). IEEE. Hillson, David. Managing risk in projects. Routledge, 2017. Olutoyin, O. and Flowerday, S., 2016. Successful IT governance in SMES: an application of the Technology-Organisation-Environmenttheory.SouthAfricanJournalofInformation Management,18(1), pp.1-8.