logo

(Solved) Introduction to Information Technology– Doc

   

Added on  2021-02-19

14 Pages3725 Words142 Views
Introduction to Information Technology

Table of ContentsINTRODUCTION...........................................................................................................................1LITERATURE REVIEW................................................................................................................1Frequently used computer technologies......................................................................................1Ethical and Social issues related to the information Technology................................................1Various Types of networks..........................................................................................................2Role of information and communication technology in management........................................2Role of ICT..................................................................................................................................3Stages of system development.....................................................................................................4ANALYSIS AND DISCUSSION...................................................................................................5CONCLUSION................................................................................................................................8REFERENCES................................................................................................................................9

INTRODUCTIONInformation Technology has allows sharing and find relevant information online.(Chang.and et.al., 2018). Present study is based on Barclays Plc,it is the leading bank inEuropean Union which has branches across the world. Study describes various technologies thatare used in the banking sector and its importance to companies. Furthermore, report explaindifference between internet and intranet. Report also highlight differnet typesof networks andtheir rolein business unit.LITERATURE REVIEWFrequently used computer technologiesAs per the view of Domingo. and Garganté,( 2016) there are various terminologieswhich are frequently used such as internet i.e. world wide web as internet is considered as thenetwork that all are familiar with. It is very useful in day to day life. Internet and World WideWeb both are quite common used as interchangeably but in actual both the terms are not samething. World Wide Web is considered as the system that operates on wiring while internet isessentially the wiring that enables computers to communicate all over the world. There arevarious data that can travel across the Internet as well.According to Knox, (2016) C.P.U is an acronym name of Central processing unit. Here all thecomputer data process can be handled such as calculations, manipulation as well as formattingdata regarding to the output. With the help of C.P.U the calculations are extremely fast as well asmeasured within cycles of time. It is located around the central of the motherboard. Motherboardis considered as the main unit of main part of the computer. RAM which means that read accessmemory is considered as the temporary notepad tat can sends the information before it can writeinto the disk. In computer Hard Disk can able to record the outcomes of the task that it dies backto the disk.As per the view of (Lloyd, 2017)Hardware is a term where all physical pieces of the computerare considered. It involves Monitor, Mouse, keyboard also the CPU as well as motherboard.Ethical and Social issues related to the information Technology.According to the view of Madon. and Krishna( 2018) Tools such as Internet ,Hackers found itvery easy to hack into any computer as if they are connected to the internet. As Hackers caneasily hack the IP address and also easily collect the data regarding to selfish reasons. There are1

widespread of Internet cookies which can used to collect the information whenever use theinternet. As it has exposed to I.T users to the high risk Of Fraud as well as conflicting interest.As Many companies uses these cookies so that they can advertise the product which is liked bythe people and these cookies determine them to advertise the products or services.As explained by Morozova,( 2018) loop hole of information technology is that people can easilyaccess the shared information such as liked photos. Here they can take their pics share to theother people which are not their friends and this exposes them with the wrong intentions.Various Types of networksAs per the view of Nevo, Nevo. and Pinsonneault,( 2016) there are various networks such asLAN (local area network). It is a network which is used for reactively for the short distances. Forexample office building, school and home. LAN is operating within a limited space. They canconnect groups of computers within a short distances for the resources and information. Secondtype of network is WAN (Wide Area Network)is a term which is used for the large physicaldistance. Unlike LAN, WAN cannot be used as the single organisation as it can use for thecollective ownership as well as management. It can make use of the wireless network technologyfor example -WIFI. These are the network which does not require any physical cables. PAN(Personal area network ) is considered as the most basic network as it is made up of the wirelessmodem, single computer, or two, tablets, printers. They are revolves around single person insingle organisation. They can be found within small offices or where it can be managed by oneperson from a single device. MAN(Metropolitan Area Network)they are considered much largerthan LAN but comparatively smaller than WAN. It can span in whole geographical are such astown or city as sometimes within a campus. Maintenance and Ownership can be handled througha single person or by a company. Another network used is Enterprises Private network (EPN)that are build and owned through business that want to connect securely its different location toshare computer resources.Role of information and communication technology in managementAs per the view of Park.and et.al., (2019) .for many organisation email plays a crucial role ofcommunication among suppliers, customers and employees. It is known as one of the earlydrivers of the internet, as it give a simple and inexpensive means to communicate with others.Over the years a lot of communication tool has been arrived. It can allow the employees to doonline chat and video conferencing systems. Companies uses ICT to improve and mange the2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Systems: Basic Requirements, Networks, Spreadsheets, Databases, GIS, and DSS
|9
|1786
|322

Hacking Credit Cards with RFID chip
|5
|819
|443

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Assignment || Cyber Security Hacking Case
|5
|1144
|40

The utilization of web interface and Raspberry
|6
|817
|20

(PDF) The Role and Importance Of Information Technology
|13
|3913
|1207