ICTICT501: Research and Review of Hardware Technology Options
VerifiedAdded on 2024/06/07
|21
|3223
|62
Report
AI Summary
This report provides a comprehensive analysis of hardware technology options for organizations, beginning with a business needs analysis conducted by a business manager. It outlines the existing network infrastructure and delves into specific needs related to security and technological advancements. The report suggests solutions and recommendations, including a proposed network diagram, and further investigates hardware options, required equipment, industry standards, and potential vendors. It addresses network compatibility issues, potential risks, and vendor instructions for implementation. The report concludes with an overview of approximate costs, technical assistance needed, implementation timelines, quality assurance steps, and equipment performance benchmarks, emphasizing the importance of IT in modern business and the need for secure and efficient technological infrastructure.

ICTICT501 Research and Review Hardware Technology Options for Organisations
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction..............................................................................................................................3
1. Your trainer/assessor, in the role of a business manager, will outline the business
requirement for you.............................................................................................................4
2. In consultation with the business manager (role-play) draw a diagram of existing
network based on the information provided.....................................................................5
3. Conduct a Business Needs Analysis using a tool developed during classroom
activities or a sample template............................................................................................6
7. Identify and summaries specific needs to address two of the key requirements; how
can these two requirements be met? Think about key technological changes, in
particular emerging technologies........................................................................................7
5. Write a brief report to the business manager, with your suggested solutions and
recommendations; including a new/proposed network diagram.....................................8
Conclusion...............................................................................................................................10
Task 2: Research and Report on Hardware Options: Individual.....................................11
1. List all the required equipment, services, and resources, including any technical
assistance/expertise needed...............................................................................................11
2. Research and summarise the required industry standards based on their wide
application within the industry.........................................................................................12
3. List and cite all the external sources, in particular, any technical reference site,
forum, and key organizations............................................................................................13
4. Based on your proposed solutions and recommendations, research and identify
potential vendors for sourcing the required equipment and services...........................14
5. Visit vendor site and gather technical information about the equipment, including
general product features and capabilities, and technical/networking requirements
Introduction..............................................................................................................................3
1. Your trainer/assessor, in the role of a business manager, will outline the business
requirement for you.............................................................................................................4
2. In consultation with the business manager (role-play) draw a diagram of existing
network based on the information provided.....................................................................5
3. Conduct a Business Needs Analysis using a tool developed during classroom
activities or a sample template............................................................................................6
7. Identify and summaries specific needs to address two of the key requirements; how
can these two requirements be met? Think about key technological changes, in
particular emerging technologies........................................................................................7
5. Write a brief report to the business manager, with your suggested solutions and
recommendations; including a new/proposed network diagram.....................................8
Conclusion...............................................................................................................................10
Task 2: Research and Report on Hardware Options: Individual.....................................11
1. List all the required equipment, services, and resources, including any technical
assistance/expertise needed...............................................................................................11
2. Research and summarise the required industry standards based on their wide
application within the industry.........................................................................................12
3. List and cite all the external sources, in particular, any technical reference site,
forum, and key organizations............................................................................................13
4. Based on your proposed solutions and recommendations, research and identify
potential vendors for sourcing the required equipment and services...........................14
5. Visit vendor site and gather technical information about the equipment, including
general product features and capabilities, and technical/networking requirements

(e.g. cabling, supporting software, space, networking protocols, alterations to existing
network etc.).......................................................................................................................15
6. Describe network compatibility issues and outline any potential risks (to existing
network and/or business disruption)................................................................................16
7. Summarise vendor instructions for use/implementation of the equipment or
network resource, including the required network protocols and standards (e.g.
technical information)........................................................................................................17
8. Write a report to the business manager, summarising the above with additional
comments on;......................................................................................................................18
a. Approximate costs involved..........................................................................................18
b. Technical assistance/expertise needed for implementation........................................18
c. Likely time frame for implementation.........................................................................18
d. Quality assurance steps to ensure that the implementation occurs according to
expected criteria and standards........................................................................................18
e. Equipment performance benchmarks (base on reviews and vendor information) for
each......................................................................................................................................18
References:..............................................................................................................................20
network etc.).......................................................................................................................15
6. Describe network compatibility issues and outline any potential risks (to existing
network and/or business disruption)................................................................................16
7. Summarise vendor instructions for use/implementation of the equipment or
network resource, including the required network protocols and standards (e.g.
technical information)........................................................................................................17
8. Write a report to the business manager, summarising the above with additional
comments on;......................................................................................................................18
a. Approximate costs involved..........................................................................................18
b. Technical assistance/expertise needed for implementation........................................18
c. Likely time frame for implementation.........................................................................18
d. Quality assurance steps to ensure that the implementation occurs according to
expected criteria and standards........................................................................................18
e. Equipment performance benchmarks (base on reviews and vendor information) for
each......................................................................................................................................18
References:..............................................................................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
This assignment is based on information technology business as every individual is become
technology world is become technology driven or technology base world. IT is important for
everyone is anywhere it is easy to implement but hard to access its application. An expert can
access their function with the proper authorization format. It is all about that how
information technology business is expanded all over India and now it has become one of the
largest business in the world and also popular among the youth as well as in daily life.
This assignment is based on information technology business as every individual is become
technology world is become technology driven or technology base world. IT is important for
everyone is anywhere it is easy to implement but hard to access its application. An expert can
access their function with the proper authorization format. It is all about that how
information technology business is expanded all over India and now it has become one of the
largest business in the world and also popular among the youth as well as in daily life.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1. Your trainer/assessor, in the role of a business manager, will outline the business
requirement for you.
As a business manager, there are different kinds of business requirement is needed.
information technology becomes a very important part of every individual's life.
According to general mindset, in this field, there is always a risk of failure in
experiments. often it has been noticed that very few of experiments are successful in a
first go. before making any research it is important that types of equipment and other
essential needs be ready before it gets started. in last few years it has been noticed that
most of the expectations are not able to meet the criteria or has been late or may be
one of the reason is no average performance in Australia it also been noticed that most
of the users are not able to access their system and also would not be able to withdraw
their money due to the system failure. due to which problems are faced by public
sector. the UK"S RBS group has recently announced a headline that consumers are
not able to access to their money because of system failure. Information technology
is become requirement essential and inescapable component of today's
Organization. Without IT even a single function not able to work. it is, of course, a
vast industry and also a complicated one but on the other hand, it involves many
efforts to make every individual life easier. still, there is also the lot of work are
excited which all are possible through handmade efforts. so basically information
technology plays an important role everywhere it can be anywhere like organization.
colleges, day to day life and offices banks etc. it could be numerous.
requirement for you.
As a business manager, there are different kinds of business requirement is needed.
information technology becomes a very important part of every individual's life.
According to general mindset, in this field, there is always a risk of failure in
experiments. often it has been noticed that very few of experiments are successful in a
first go. before making any research it is important that types of equipment and other
essential needs be ready before it gets started. in last few years it has been noticed that
most of the expectations are not able to meet the criteria or has been late or may be
one of the reason is no average performance in Australia it also been noticed that most
of the users are not able to access their system and also would not be able to withdraw
their money due to the system failure. due to which problems are faced by public
sector. the UK"S RBS group has recently announced a headline that consumers are
not able to access to their money because of system failure. Information technology
is become requirement essential and inescapable component of today's
Organization. Without IT even a single function not able to work. it is, of course, a
vast industry and also a complicated one but on the other hand, it involves many
efforts to make every individual life easier. still, there is also the lot of work are
excited which all are possible through handmade efforts. so basically information
technology plays an important role everywhere it can be anywhere like organization.
colleges, day to day life and offices banks etc. it could be numerous.

2. In consultation with the business manager (role-play) draw a diagram of existing
network based on the information provided.
(Figure 1: network diagram)
(Source: By Author)
The image is reflected as a flow chart showing all the levels and different parts of IT
management. Clarify all steps which lead to operational management
network based on the information provided.
(Figure 1: network diagram)
(Source: By Author)
The image is reflected as a flow chart showing all the levels and different parts of IT
management. Clarify all steps which lead to operational management
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3. Conduct a Business Needs Analysis using a tool developed during classroom activities
or a sample template.
As information technology is a part of every life it is important to know that what are
the business need or requirements those are :
To protect sensitive client information or any suspected information and to protect the
system or can say software with suspicious attendants from software hackers. it may
cause danger and also impact the system. it is necessary to beware of authorizing or
DISCLOSING THE RIGHT INFORMATION and also make sure that all the
software are virus protected moreover do not let the client sensitive information be
disclosed without any privacy.
To give responsibility or to handle client sensitive information which is authorized or
certified by management or by the organizers as well (Robey, 2012).
Make sure that data is secured with a safeguard in the system and also safely
accessible. it should not be not unauthorized access by anyone it should be someone
specific one to access functions which are authorized by again management.
Company deals with many information technology related gadgets by which their
advertisement can be possible which is very expensive. on the other hand, when an
exterior organization wants to buy them or want just a trial they should try to decrease
the price which is worthless because every equipment related to IT it is obviously
expensive which is nor reliable. in the extract, prices should be increased in this case.
Generally, it has been noticed that most of the mobile consultants ask for access any
function or application on their mobile phone which is comfortable with them there is
no need to go here and there but every experiment has their disadvantage as well by
which many of them misuse them as well. so it is necessary to give authorization very
carefully in terms of security and safety.
or a sample template.
As information technology is a part of every life it is important to know that what are
the business need or requirements those are :
To protect sensitive client information or any suspected information and to protect the
system or can say software with suspicious attendants from software hackers. it may
cause danger and also impact the system. it is necessary to beware of authorizing or
DISCLOSING THE RIGHT INFORMATION and also make sure that all the
software are virus protected moreover do not let the client sensitive information be
disclosed without any privacy.
To give responsibility or to handle client sensitive information which is authorized or
certified by management or by the organizers as well (Robey, 2012).
Make sure that data is secured with a safeguard in the system and also safely
accessible. it should not be not unauthorized access by anyone it should be someone
specific one to access functions which are authorized by again management.
Company deals with many information technology related gadgets by which their
advertisement can be possible which is very expensive. on the other hand, when an
exterior organization wants to buy them or want just a trial they should try to decrease
the price which is worthless because every equipment related to IT it is obviously
expensive which is nor reliable. in the extract, prices should be increased in this case.
Generally, it has been noticed that most of the mobile consultants ask for access any
function or application on their mobile phone which is comfortable with them there is
no need to go here and there but every experiment has their disadvantage as well by
which many of them misuse them as well. so it is necessary to give authorization very
carefully in terms of security and safety.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7. Identify and summaries specific needs to address two of the key requirements; how
can these two requirements be met? Think about key technological changes, in
particular emerging technologies.
The main requirement for the Business manager for Adobe company are:
The concept of information technology is sensitive n terms of security and an aspect
of safety wise as well. Generally, it has been seen that system functions or client
sensitive information can be easily accessible by anyone whether it could be an
organization, school, colleges, and offices as well which it seems like very common
issue. In this kind of issue, the main requirement is password or function could be
made in such a manner that no one can access them without any authorization. It may
password protected.
This requirement can be met by creating and software in such a manner to protect all
the sensitive client information. Or all equipment should be password protected. No
one can access them without any authorization.
can these two requirements be met? Think about key technological changes, in
particular emerging technologies.
The main requirement for the Business manager for Adobe company are:
The concept of information technology is sensitive n terms of security and an aspect
of safety wise as well. Generally, it has been seen that system functions or client
sensitive information can be easily accessible by anyone whether it could be an
organization, school, colleges, and offices as well which it seems like very common
issue. In this kind of issue, the main requirement is password or function could be
made in such a manner that no one can access them without any authorization. It may
password protected.
This requirement can be met by creating and software in such a manner to protect all
the sensitive client information. Or all equipment should be password protected. No
one can access them without any authorization.

5. Write a brief report to the business manager, with your suggested solutions and
recommendations; including a new/proposed network diagram.
In a technology-driven business environment today many organizations are become
depend on technology and also wants to upgrade themselves or can say that update
their software and hardware resources to meet client's specific requirement, as aspect
from an information technology company or any organization is connected to LAN
local area network which allows staff to access internet for information. Many of
pieces of equipment can relate to IT field. Like printers computer systems gadgets
headphones and many more.
To access these all equipment or functions it is mandatory to use them carefully
without any suspected attendants. To accessing them an authorized software should
be created from the IT company. Every functions or equipment should be passwords
protected o that no one can access them.
(Figure 2: flow diagram)
(Source: By Author)
recommendations; including a new/proposed network diagram.
In a technology-driven business environment today many organizations are become
depend on technology and also wants to upgrade themselves or can say that update
their software and hardware resources to meet client's specific requirement, as aspect
from an information technology company or any organization is connected to LAN
local area network which allows staff to access internet for information. Many of
pieces of equipment can relate to IT field. Like printers computer systems gadgets
headphones and many more.
To access these all equipment or functions it is mandatory to use them carefully
without any suspected attendants. To accessing them an authorized software should
be created from the IT company. Every functions or equipment should be passwords
protected o that no one can access them.
(Figure 2: flow diagram)
(Source: By Author)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Conclusion
Information technology needs to highlight their experiments to abroad their business in order
to expand their business all over the world. Should meet all the requirements like should take
care of their employees first as the staff is the only one who plays an important role as the
base of a company. After that should protect their passwords or update software so that it can
make it non- accessible without the authorization of management.
Information technology needs to highlight their experiments to abroad their business in order
to expand their business all over the world. Should meet all the requirements like should take
care of their employees first as the staff is the only one who plays an important role as the
base of a company. After that should protect their passwords or update software so that it can
make it non- accessible without the authorization of management.

Task 2: Research and Report on Hardware Options: Individual
1. List all the required equipment, services, and resources, including any technical
assistance/expertise needed
My Adobe is a fastest growing company all over the world. This company has provides
high-level services to their customers. The customers always give them fine feedback on their
profile. The resources/services of the technical assistance of the My Adobe are following: -
1) An incident response to their customers.
2) Build up the highest security culture
3) They provide the digital governance for the best security way.
4) They provide compliance in all over their products.
The equipment of the My Adobe Company holds all details but in a limited way. These
details are belonging such as handling the products, manufacture and carrying goods etc.
1. List all the required equipment, services, and resources, including any technical
assistance/expertise needed
My Adobe is a fastest growing company all over the world. This company has provides
high-level services to their customers. The customers always give them fine feedback on their
profile. The resources/services of the technical assistance of the My Adobe are following: -
1) An incident response to their customers.
2) Build up the highest security culture
3) They provide the digital governance for the best security way.
4) They provide compliance in all over their products.
The equipment of the My Adobe Company holds all details but in a limited way. These
details are belonging such as handling the products, manufacture and carrying goods etc.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




