This report discusses the pros and cons of communication tools used by businesses, focusing on Zoom and Team Viewer. It also explores the features and suitability of cloud storage and computing. The advantages and disadvantages of these technologies are discussed in detail.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Information and communication technology
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................3 MAIN BODY...................................................................................................................................3 TASK..............................................................................................................................................3 Pros and cons, suitability and features of Communication tools used by business...................3 Pros an cons, suitability and features of cloud storage and computing......................................6 Online security and privacy for business....................................................................................9 REFERNCES:................................................................................................................................11 Books and Journals:..................................................................................................................11
INTRODUCTION In the modern world and current situation of the market, every individual Is more connected and engaged with digital media and platforms toregulate communication, making interaction and take mover advantages of technologies concerning into market. Not only general public but business are creating path of digital world by enabling operations through delivering online services. Internet is now growing rapidly for many purpose. Some are using for it legal activities and some are making misuse of internet data, business transactions, payments and private information for making money though cyber crime. It has been evaluated that internet comes in benefit for various purpose and require high security control due to its large covering area through phones, mails, internet,cloud storage and big data. Internet is used for enormous purpose that includes, connecting with one person to another, keepings records and work data, finding and analysis, make own thought idea reach to other individuals. That is the reason, business are now more integrated with online business as it helps them in expansion and promotionof the products. The very common features and sources of internet are google, websites, application, messengers, zoom and many more(Ahn, 2020).This report is going to focuson the conceptof ITthrough which manybusiness, individualsare makingtheir communication effective and easy going. It has many pros and cons that needs in order to measure influence of internet tracking, suitability and cloud storage applications. The main influence of these digital sources have risen up during the pandemic of Covid-19. For that instance, all the outcome of the report will be covering facts and data of recent situations and reflects how the pandemic impacted upon the environment of business into digital technologies. MAIN BODY TASK Pros and cons, suitability and features of Communication tools used by business Communication is a crucial part for every business as all the work depends on what has instructed and guided to the overall organisation. Without making proper communication Betweenemployees,managersandleaders,therearechancesoflackinginachieving organisational goals and objectives. During the time of Covid-19, business go declined during to less engagement of people and workforce into the organisation which lowers down the growth of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
productivity and profitability due to severe health concerns and maintaining distance. These situation has impacted deeply to the business in carrying out all the productions and business activities(Bhoi,Das,Misra,andRout,2019).Inreflectwiththeseissuesand circumstances, business have comeout with substitutes ofmaking the business grow.As of now, technology is rising and creating paths for opportunities. To take advantage of these opportunities, organisation make use of technologies and tools for making contact, deliver information,conductingmeetings,connectingwithcustomers,investorsandproviding instructionsto employeesfor working on onlinechannels. There are differenttoolsand application that makes it possible to easily get in interaction with any people sitting anywhere in the world. These application are described below: Zoom: The app is typically and formidably based on providing business related solutions. The app is mainly used for conducting meetings, joining people together, make chats, conferencing, video calls, screen sharing, cloud functioning and others. The app is suitable for making conversation and presentation with number of people simultaneously. This app is considered an important tool under budget which contain minimum cost and provide effective services. End number of functions provided by the app related with partner integration, screen minimal, full- screen view, screen sharing and also it results in solving communication hurdles and fill the gap between enabling communication(Burbules, 2018). Features and suitability of Zoom The app consist various features of the app which enable calling, chatting, screen sharing and finding new versions every new day. The features reflect convenient and ease in finding the usefulness of the app people experience endless conversation with superior, quality, network , transfer rate and instant communication. These features enable various categories into the app which are listed below: icon showing on the corners reflect the set time schedule for joining the meetings and sharing screen with wireless connectivity feature. This feature enablepersonal meeting and reminder for it with new ID generation. The new features,enable the users to click once and get into the meeting by viewing details and notifications.
The background could be customised andreflect as per users preference with pictures, themes and contexts. It also involvesearch feature which help in identifying contacts, messages, notification, calls by typing name or initial numbers. Make users own profile by putting images and making it broad or narrow as per the want that will be easy for the other to find you on zoom. There are various advantages and disadvantages of Zoom that defines what boundaries and limitation an organisation needs to make while using the tool(Cheng,and de Vreede, 2017). It demonstrate the scope of business functions and need for making the app In use. Advantages: Easy to Use and Deploy:The app is incredibly the best in use, it drives function within one click ad makes the users available for its use. It is one of the easy solution of making the calls effective and qualitative. It gives assistance of each features that how to use and make it easy for running into any platforms like laptop, computer, tablet and cell phones. pricing are set at budgets:The main advantage of this app is that itcomes with low pricing and cost. The tools used by the businessfor making quality effective meeting with minimum involvement of cost and data connection. As compare to other apps, zoom is more feasible for business solution(Cilliers, 2017). flexibility in working with zoom:The another advantages of using zoom is to be flexible in working from any where, anytime. The work would not stop till working with zoom and get advantage of whole day connections without any interruptions. Disadvantages: Delay in customer service:The app provide solution and assistance by taking much time makes the user less loyal towards the app, it has be opposed by a use,it take 3-4 days in replying and adhering to problem. Zoom security concerns:into the situation of Corona breakdown, an allegation putv on zoom security which reflects that id password has hacked and taking part into meetings for identifying what politics has been running into the market. Team viewer: Another application for enabling communication between people andbusiness. The app was first stated in 2005 in order to provide assess of control for computer solutions. It is mainly
use to provide support to employees for remote device without the need of VPN. It helps in monitoring and managing sensors and mechanism to protect the data and regulate into all over the firm. The top features and suitability of team viewer are consist following list: It enables file transfer with ease though remote controlling and quick transfers. It enables features of various activities in excess, meetings, outlook, chats, password generation, control operations and contains data(Davis,Gómez,andRoberts, 2017). It supports multi language features and providequick solution for business processing into digital world. it mainly used under the organisation constructing online exams, interviews where big data, meetings and records needs to saved with full protection. Advantages of team viewer: Secure app:team viewer is the secure app of all which could be ]use for non- professional purpose also, that consist security and control over personal data and excess with secure ID and passwords. Easy installation:the app could get easily installed kith less configuration power . Also, remote could updates easily. It takes maximum time to install the app when organisation are in hurry to make use of monitoring control or get uninstalled by mistake. Disadvantages: Time taking transfers:the application stores monitoring software and require licensing agreement for haring for non- commercial purpose it takes time to transferring the files and keep loading into time lapse. Contains much internet:the application is not reliable to make transfers of file with less internet as it requires charges for sue it for business purpose withstrong broadband connectively. Pros an cons, suitability and features of cloud storage and computing In the recent worldof technology and IT generated market, business reaching to the heights ofmodernisation their business operations. In which, cloud storages andcomputing play vital role into the world of IT(De Filippi, and Hassan, 2018). Cloud storage works as a storage software in which data gets stored, manage and operates whenever gets in demand. It is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the software that provide durability, cost effectiveness andglobal authentication wherever it requires. The data stored into this device, the owner gets its all creditability to make it uses and built according to its needs. This device gets into consideration from the third party seller which deliver internet place for data locations. This software is scattered to all around the world. Applications access cloud storage through traditional storage protocols or directly via an API. These data are majorly secure to enable resistance, customize sand delivery of data warehousing time to any place at any time. Features of cloud storage: The cloud storage provides easy to excess the software with no hardware requirement. It provide inbuilt solution of data storage and transfer. It provide assistance of easy in removing and change the preference of the data, photos, media and scenario. It only undertake the charges for the premium services that taken for specific purpose . The data whichuse less often gets deliver to the lowered used data and make the screen more reliable and effective. Also, it consist low cost tiers operations which describe economies of scale and authentic version of auditable rules. The software work on consistent basis, as it promote huge requirement of timely changes and development into the storage by eliminating unwanted data which needs to be updates(Gandotra, Jha,and Jain, 2017). The system will work when it go with the development process. These storage system regulate many IT solutions in order to demonstrate excess of cloud operations into less monetary terms. In order to get stored personal data and information, this It solution is provide many centralised data of formation to put influence of the privacy factor of business.This software consist many benefits for organisation to accomplish the goals of getting strong connectively over business data. The feature of this software provide old files in a better version in which no overlapping files but rather it provide old version in order to eliminate unnecessary storage and make sync data so that it could find other files whenever required. This feature is essential for many business firm when they are required for old data, they could find it easily. It work as a business saviour from the losses it could come through loosing of data. Also, if any file get deleted from the storage, the feature provide asses ability to retrieve it.
Syncingfunctionisthemostnecessaryforbusinessorganisationinwhichthey accumulate all the data captured from various locations. Sometimes, people forget to sync files in a busy schedule but cloud storage provide it automatic features that is the major facility that business person could get. Moreover, auto syncing and backing up data is a worth for eliminating loss of any important documents and data. Advantages of cloud storage: cost:a software which is in built and does not require to create space of for keeping it. For that, it is the best storage device a business could get it in minimum cost. Whereas, any hardware would be expensive and require maintenance(Jack,2017). Many small and large business have affected with its easy going servicesto regulatesmooth functioning. Security:The most required aspect in a business is the security of data won which all the busies functions depends upon. Managers pay high cost and charges for getting the best security control for saving from any theft. But the cloud storage enables security services as no outsider could not get the files without the permission of the owner. Disadvantages: internet connectivity:the main disadvantage of using could storage is the data connection. As it contains internet with high Mbps and velocity or either the files would get delay instoring of syncing. In doing online business, employees needs quick assess and data transfer. Support:support system of cloud storage is not effectiveas it do not provide reliable excess to the uses. This features is mainlyfeasible for paid storage. There is no assistance if data got stick or cell phones, laptop would get lost. Extra cost:this softwareconsist many extra cost for downloading or transferring big files tofar connections. Also, cost contains on getting premium services of cloud storage. Cloud Computing:cloud computing is useful for keeping the data up to date. It is based on completing specific projects withtheconnectivity with cloud storage. The data will be fist move into cloud storage then it could be use in cloud computing(Khan, Rehmani, and Rachedi, 2017).When these data move to cloud computing Otherscan also make use of it. Business involve these software into their operations for transferring file to other employees and make it
available for all the departments in order tomake presentation for all and every other employees will watch it into their computers. In large organisation where information and communication needs to be regulate to all thehuman n resources all together and decrease less time consumption, cloud computing software require professional power an more storage space fore big files and data(Khanna,and Kaur, 2019). Could computing provide remote excess over the data and software through which coding get enable and managers retrieve their files and data whenever they required at any place. This file system is usedmainly forb professionalbusiness as it contains a lot of technical, high power , internet and asses ability. doing online business, it is not required feature to connect and share with every employees sitting in different places. It required first to make understanding about files to each employees which will be effectiveness for the organisation. so that, they adopt innovative technologies for growingbusiness digitally. Online security and privacy for business As far as internet is being the most regulated version of business life. Making money is now easy with internet technologies,gaining knowledge and implement It into digital sources. Internet has this much power that it could spread onevideo or pictures to the whole world, business will never know, their content would liked by many people in very less time which will help them to furnishing business with high revenue and brand name. Therefore, internet is being used for many purpose and give rise to cyber crimes for making finance or other interest. It has beenreflected from past data, crimes were regulating with rapid growth and business suffered huge losses by loosing private data, informations, analytics andother relevant materials. Hackersare everywhere, which give rise to theftof data and Leakage of privately form information creates huge chaos for the business operations as they required to change their whole criteria of working and enabling high security control which cost existentially more(Levy, and Germonprez, 2017). It is required for every organisation whether it is small or large firm. Small organisation would not able to make investment In high security cost and results in winding up or less effective functioning. For that instance, it has become essential for business tom protect files and other information in a privacy protected system and enable strict control
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
over other user generation. There are some measures that help organisations for enable security and privacy: Save less information:business acquire many information about their employees and customers which needs to be protected every time they get something new., it is necessary to keep relevant information and delete it after it gets used so that hackers would no left with options to bet anything. Cybersecurity:business need to enable effective cybersecurity acts and programmes which helps In the business for affected with theft and loss of data. Storage of physical document:business needs to hire professional employee who have good knowledge of IT solutions so that, high security gets enable for ensuring software, informations securely. Therefore, the documents must be keep in physical form which are most sensible and contains business personal data(Silva, Khan, and Han, 2018). These documents must be kept in password protectedrooms so that hackers could get their reach over them. Hence, data and informationare most sensitive and require regular control on their protection inthe supervision oftrusted person and professional experts. Make one time investment on security measures and enjoy privacy and control throughout the lifespan of business. CONCLUSION The report has concluded upon the use of Internet, digital platforms, technologies is running a business smoothly. Therefound two effective technologiesthat is zoom and team viewer. Both have significantly proven for carry out online business activities. Therefore, cloud storage and computing are also required to save data into securedwayand transfer files, syncing,report power are its most essential features. Moreover,business needs to ensure cybersecurity control by enabling data protection software and programmes to be safe from hacking and loss of revenue.
REFERNCES: Books and Journals: Ahn,J.,2020.UnequalLonelinessintheDigitalizedClassroom:Two Loneliness Effects of School Computers and Lessons for Sustainable Education in the E-Learning Era.Sustainability,12(19), p.7889. Bhoi, B.K., Das, T., Misra, N.K. and Rout, R., 2019. An Explicit Cell-Based NestingRobustArchitectureandAnalysisofFullAdder.InRecent Trends in Communication, Computing, and Electronics(pp. 547-555). Springer, Singapore. Burbules,N.,2018.WatchIT:Therisksandpromisesofinformation technologies for education. Routledge. Cheng, X., Fu, S. and de Vreede, G.J., 2017. Understanding trust influencing factorsinsocialmediacommunication:Aqualitative study.International Journal of Information Management,37(2), pp.25- 35. Cilliers, E.J., 2017. The challenge of teaching generation Z.PEOPLE: International Journal of Social Sciences,3(1), pp.188-198. Davis,T.J.,Gómez,D.E.andRoberts,A.,2017.Plasmoniccircuitsfor manipulating optical information. De Filippi, P. and Hassan, S., 2018. Blockchain technology as a regulatory technology:Fromcodeislawtolawiscode.arXivpreprint arXiv:1801.02507. Gandotra,P.,Jha,R.K.andJain,S.,2017.Greencommunicationinnext generationcellularnetworks:Asurvey.IEEEAccess,5,pp.11727- 11758. Jack, C., 2017. Lexicon of lies: Terms for problematic information.Data & Society,3, p.22. Khan,A.A.,Rehmani,M.H.andRachedi,A.,2017.Cognitive-radio-based internetofthings:Applications,architectures,spectrumrelated functionalities,andfutureresearchdirections.IEEEwireless communications,24(3), pp.17-25. Khanna, A. and Kaur, S., 2019. Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture.Computers and electronics in agriculture,157, pp.218-231. Levy,M.andGermonprez,M.,2017.Thepotentialforcitizensciencein information systems research.Communications of the Association for Information Systems,40(1), p.2. Silva, B.N., Khan, M. and Han, K., 2018. Internet of things: A comprehensive review of enabling technologies, architecture, and challenges.IETE Technical review,35(2), pp.205-220. Sung, T.K., 2018. Industry 4.0: a Korea perspective.Technological forecasting and social change,132, pp.40-45. Vaezi, M., Ding, Z. and Poor, H.V. eds., 2019.Multiple access techniques for 5G wireless networks and beyond. Cham: Springer.