Introduction to Information Technology – Doc

Verified

Added on  2021/02/19

|14
|4150
|53
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Introduction to
Information Technology

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
This given report is based on “Introduction to Information Technology”. IT refers to
development, execution and maintenance of computer hardware as well as systems for
organising and communicating information through electronic medium. This report comprises of
ethical as well as social issues associated with information technology as they are major factors
at this present moment. Various networking technologies have been utilised by the organisation
so that their work can be done smoothly via the usage of intranet and internet. Along with this,
stages involved within system development life cycle are also analysed as they will aid
organisation to carry out their operations within a sequenced manner.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................2
Literature Review.............................................................................................................................3
Identification of role of IT within organisation...........................................................................3
Ethical and social issues ..............................................................................................................4
Networking technologies.............................................................................................................5
Importance of intranet and internet..............................................................................................7
Analysis and Discussion..................................................................................................................8
Ethical and social issues related with Tesco: ..............................................................................8
Importance of intranet and internet to Tesco: .............................................................................9
Different stages of system development life cycle......................................................................9
If IT department of organisation like Tesco identifies that alteration is required during any of
the phases of system development lifecycle, the firm can make use of all phases again. ........11
Conclusion ....................................................................................................................................11
References......................................................................................................................................11
Document Page
INTRODUCTION
Information technology means usage of computers for storage, retrieving, transmission and
manipulation of data with respect to requirements (Eason, 2014). It comprises of hardware,
telecommunication, transmission of data and software for providing effectual communication.
Basically, it refers to utilisation of computers, networking, storage, processes, and secure
exchange of information through electronic medium. This report is based on Tesco which is
public limited company and is headquartered at Hertfordshire, England. It was founded by Jack
Cohen in 1919 and they renders there services worldwide in the form of Supermarket, superstore,
hypermarket and convenience store. Apart from this, report also contains role of IT, ethical and
social issues associated with technology and different types of networking technologies. Along
with this, significance of internet, intranet and different stages within system development life
cycle have been elaborated.
Literature Review
Identification of role of IT within organisation
Information technology systems are being utilised by firms for carrying out different
tasks. IT plays crucial role for carrying out basic transactions associated with suppliers,
distributors or operations of firm. Along with this interaction also becomes smoother. Its role in
wider context within Tesco is illustrated below:
Flow of information: It is a key resource within organisation which comprises of
external, internal, subjective or objective information. External information comprises of
surrounding environment within organisation. Subjective involves description of what is
unknown whereas objective deals with information in terms of what is known. By the
usage of technology a centralised data centre is used for retrieving data. As Tesco is
rendering their services in around 6800 outlets then it is crucial that information must be
made available to their all employees and customers as per their requirements. Through

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT, human resources of Tesco have access to information which makes their daily work
easy (Kiran, Oudshoorn and Verbeek, 2015).
Transaction processing: Transaction process within Tesco is simplified by usage of
information technology. TPS (Transaction Processing System) refers to process in which
transactions takes place in an organisation. Tesco can have their own transaction
information for capturing entire information related with their operations and activities. If
any kind of transactions will occur then it will be updated within database. This
information can be again utilised from centralised information storage network via
internet.
Decision support: It is a highly interactive as well as flexible IT system which is
designed for supporting decision making when problems are not in structured manner and
they are assorted (Law, Buhalis and Cobanoglu, 2014). By usage of decision support
system within Tesco, they will be automatically making use of artificial intelligence for
creation of online analytical process. This will facilitate Tesco in carrying out decision
making tasks which needs relevant analysis and efforts.
Certain points are mentioned above which assist organisation to be successful or fail in their
respective business. With respect to Tesco, if these systems are implemented effectively within
organisation and used in accurate manner then it will lead to have accurate results. But in case if
they are not managed and all the execution is not carried out in appropriate manner then system
might not work as per required standard and may produce wrong results which can lead to failure
of business as accurate information will not be provided.
Ethical and social issues
Ethical issues: Ethics refers to reflection on morality. Basically, it refers to description of
making choices with respect to what is right and wrong by identification of choices. With respect
to ethical issues within information technology business success is completely dependent on
mobility of services as well as goods with high accuracy and speed (Marchewka, 2014). Certain
issues in terms of ethics within Tesco are elaborated below:
Personal privacy concern: IT has a central role within different industries but it also
possess problematic implications. The data and information is exchanged on large scale
from different parts. There lies enhanced risk for revealing information as well as
Document Page
violation of privacy of groups and individuals due to widespread dissemination. It is the
major responsibility and challenge for maintaining integrity and privacy of data of
individuals within Tesco as they have wide number of customers. This also comprises of
precautions from accidental disclosure or unauthorised access to intruders (Mehlman and
Li, 2014).
Access right: Due to popularity of international commerce on internet, computer security
as well as access rights have became topmost priority. As online trading is increasing in
Tesco, it also enhances risks associated with later. An example can be taken to
understand this concept like various attempts have been made by intruders or hackers to
have an illegal access to military and government computers of US. For this there is
requirement of appropriate computer security strategies and policies so that internet can
be made secure from illegal accesses (Neuhofer, Buhalis and Ladkin, 2014).
Social issues: They refer to problems which have influence on large number of
individuals within society. With respect to Tesco, social issues comprises of following:
Identity Theft: It is the specious which takes place within IT i.e. fraud. An example can
be taken in this aspect to understand this concept like any third person can pretend to be
an employees of Tesco and send message such as “you have been rewarded with $ 5000
as you are premium member and send account details for the same” then if a person send
details then there amount may be deducted. This is a identify theft. In this individual
pretends to be one who they are not.
Hacking: It is defined as an unauthorised access to a computer or network. In this case
intruder breaks down into a system of an organisation or individual for accessing their
personal details or any other information associated with them. Tesco have their own IT
department for ensuring that such kind of things does not occur within organisation.
Along with this, it is responsibility of each individual to make sure that they do not click
on any of the unauthorised access within their system (Nieves, Quintana and Osorio,
2014).
Networking technologies
Network is defined as block of two or more devices through which communication can
take place. It comprises of various systems which are linked with each other through usage of
physical or wireless connections. Management of Tesco can make use of networks for carrying
Document Page
out communication among various departments and within same or different organisations
through emails, chat rooms, instant messaging, etc. Furthermore, Tesco share their storage
devices via usage of shared information and data (Pardo and Siemens, 2014). There exists
various types of network like VPN (Virtual Private Network), EPN (Enterprise Private Network),
SAN (Storage Area Network), PAN (Personal Area Network), LAN (Local Area Network),
MAN (Metropolitan Area Network) and WAN (Wide Area Network). Basically, LAN, WAN
and MAN are used, they are illustrated below:
LAN: Local area network connects various devices by which tools, programs and
information can be shared among different personal computers and workstations. Connections
are formulated by utilisation of stack or single switches and addressing schemes by making use
of TCP/IP protocols. As there is less number of computers connected then speed of data
transmission will be fast. LAN is used by management of Tesco for carrying out communication
between departments of same premises (Sampson and Makela, 2014).
MAN: It connects workstations and computers for covering larger area with respect to
LAN. They span over entire city and are responsible for connecting various LAN networks into a
larger network by usage of single cable. Connections are established by usage of optical fibres,
cables, etc. Management of Tesco makes use of MAN network for carrying out communication
with different Hotels which are present in same city.
WAN: They span within a larger geographical area, it can be in a same country or
throughout world. Connection is established by usage of satellites, radio waves and telephone
lines. It provides high speed but it is very expensive. Management of Tesco makes use of WAN
network for sharing resources as well as information among different outlets which are present in
various parts of world.
Difference between LAN, MAN, WAN
Basis LAN MAN WAN
What it is Systems are present
close to each other
either within building
or office.
These are large
networks which
connect different
organisation.
In this two or more
LANs are connected to
cover large
geographical area.
Distance covered It covers around 2500 It is limited to around It has unlimited range

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
meters or 2 miles
(Santoro, 2015)
200 km or 100 miles. but normally around
1000 km but for
extension of range
connectivity devices
are used.
Speed Speed is high as small
number of systems are
connected. It is around
1000, 100 and 10
Mbps.
In this also speed is
high, typically it
ranges around 100
Mbps.
Its speed is slow as
large number of
systems are connected
and depends on
wireless technologies
which are being used.
Usually it is 1.5 Mbps.
Technologies used Wireless (like Zigbee,
WLAN), twisted pair,
locally installed and
fiber optic cable.
It is based on common
carrier like fiber optic
cable, twisted pair or
they are locally
installed.
They are either locally
installed or use
common carrier like
coaxial cables, fiber,
twisted pair cables,
wireless or cellular
network (Schwalbe,
2015).
Importance of intranet and internet
Internet: It is define as network which an individual can access anytime and anywhere
for face to face communication, education, doing research, maintaining its financial transaction,
online shopping and so on. It saves time and is a faster network.
Importance of Internet
Communication: With the help of internet, Tesco can have face to face communication
in meeting with its parties and employees through video call, conference call worldwide
without any issues and allow employees to attend meeting if they are not available at
workplace.
Document Page
Research: Tesco can make use of internet for gathering effective and accurate
information to do in depth research for preparing report, analysis, surveys and so on
(Wang and et. al, 2016).
Intranet: It is define as a local area network or private network which can access only
within an organisation and can be link with more than one gateway outside an organisation and
can be used for resource sharing, internal communication, storing data online, training and
development programmes and so on.
Importance of Intranet
Resource sharing: TESCO can have a workspace in the organisation where they can
share events, store data provide online training programme to employees which will
enhance their skills and knowledge (Eason, 2014).
Better customer service: In TESCO, manager can get access and gather information
from the staff about customer responses regarding services of their company. This would
help them enhance their level of customer services
Analysis and Discussion
Role of Information Technology in Tesco: This organisation furnishes their services within
retail sector. They make use of technology for enhancing their services and creation of pleasant
environment for their guests. Role of IT within Tesco is depicted below:
Tesco can make use of expense management tool for controlling as well as monitoring of
redundant expenses.
Transactions which are being carried out within Tesco can be automated by usage of
artificial intelligence for enhancing recurring actions which must be performed.
Cash, information, risk management can be carried out along with security and control
operations as well as handling of instruments by usage of technology.
Information system used by Tesco is Transaction processing system for carrying out their
day to day transactions. This assists them to analyse as well as monitor the performance of
organisation (Kiran, Oudshoorn and Verbeek, 2015).
Different networks used by Tesco: Management of Tesco makes use of three networks for
communicating with their vast chain. LAN is used within each premises, MAN is used for connecting
LAN’s which are being used within same city whereas WAN is used for connecting MAN’s which are
Document Page
present within different cities. This is done to carry out effectual communication among their all the
outlets without hampering any kind of transactions occurring in between them.
Ethical and social issues related with Tesco:
There exist diverse issues with information technology. From above discussions it has
been examined that IT plays crucial role within every organisation and makes tasks smoother but
certain factors leads to violate the systems. An example can be taken to illustrate this, in context
of ethical issues if an intruder gets an access to confidential information then it might be used by
them for any illegal purposes (Law, Buhalis and Cobanoglu, 2014). It can also hamper brand
image of organisation. With respect to social issues, for an instance an intruder or any third
person post something on social media for defaming any specific individual or organisation on
the whole. By this intruder may tend to defame organisation might be to gain competitive edge.
For this management of Tesco needs to have a constant check on social media sites and possess
secured systems by which such kind of things can be prevented.
Importance of intranet and internet to Tesco:
Internet is used by organisations to carry out communication worldwide or with their own
organisations which are rendering their services in other countries. On the other hand intranet is
used for carrying out their operations inside the premises. With respect to Tesco both have
relevant impact, it assist them to share their resources and information within the premises via a
usage of intranet. Internet is used by them for sharing strategies along with crucial data with their
other outlets. It makes communication much easier and faster (Marchewka, 2014).
Different stages of system development life cycle.
System development life cycle also known as application development life cycle is
defined as a process of planning, creation, testing and deployment of information system. This
concept is widely used in software and hardware configuration as system is an aggregation of
both. It enables users to convert newly developed project into operational one. The various steps
which are involved in this lifecycle are illustrated below:
i. Planning: It is the initial stage within system development process which identifies
whether there is a need for new system or not for attaining business strategic objectives.
It is a feasibility or preliminary plan for Tesco’s business initiative for acquiring more
resources for building an infrastructure for modification and improvisation within

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
service. They might be looking forward to exceed or meet the expectations of their
stakeholders, customers and employees. Purpose of this stage is to identify scope of
problem and find its solution. Along with this, factors such as benefits, cost, time,
resources and many others must be taken into consideration (Mehlman and Li, 2014).
ii. System analysis and requirements: It is the second stage in which top executives of
Tesco will work on sources of their problem or requirement for modification. If any
problem arises then probable solutions are given and best one is analysed which will be
perfect for attaining the organisational goals of project. In this team takes into
consideration functional needs of project as well as solution. In this system analysis is
taken is taken into consideration for anlysation of requirements of end users for ensuring
that new system will accomplish their expectations. System analysis play crucial role in
identification of business needs and how they can be attained. Along with this, it will be
responsible for identification of identical pieces of project and amount of time required
for the same. For this, different tools are required like information collection; computer
aided systems or structured analysis (Neuhofer, Buhalis and Ladkin, 2014).
iii. System design: It is the third stage which describes crucial specifications, operations and
features which is responsible for satisfaction of functional requirements of proposed
system. It is a crucial step for end users for discussing as well as determination of
particular business information requirements for proposed system. It is in this stage that
necessary components are taken into consideration like software & hardware, their
structure such as capabilities of networking, processing and procedures for
accomplishment of system objectives.
iv. Development: It is the next stage in which actual working starts like programmer,
database developer and network engineer are involved to carry out major work associated
with project. This comprises of usage of flow chart for ensuring that process is organised
in appropriate manner. The development stage signifies end of initial stage of process.
Along with this, it also implies beginning of production. Development stage is
characterized by instillation as well as change. By emphasising on training large benefit
can be provided in this stage.
v. Integration and testing: It is the fifth stage within system integration and testing of
programs as well as procedures which are agreed by quality assurance professionals. It is
Document Page
carried out for determination of design meets for initial formulation of organisational
goals (Nieves, Quintana and Osorio, 2014). Testing can be carried out again to ensure
interoperability, bugs and errors. This testing can be carried out till end user identify that
services are adequate. Other part of this comprises of validation and verification which
will assist in successful accomplishment.
vi. Implementation: It is the sixth stage which comprises of codes written in a program.
Along with this, it involves exact installation as well as execution of newly developed
system. This project steps into production by moving forward components and data from
older system. Apart from this, they are placed on new system through direct cutover. It
can be complicated (risky) move and this occurs during peak hours for reducing risk. End
users and system analyst see the realization of project in which alterations are carried out.
vii. Operations and maintenance: It is the last stage which involves maintenance and needs
regular updates. This step is carried out by end users; they also have the options for
boosting up performance by adding new capabilities or acknowledge user requirements
(Pardo and Siemens, 2014).
If IT department of organisation like Tesco identifies that alteration is required during any of
the phases of system development lifecycle, the firm can make use of all phases again.
Conclusion
From above report, it can be concluded that Information technology is defined as storing,
retrieving as well as transmitting information via usage of computers. By this high accuracy can
be attained in an effective manner. It aids organisation to extract information whenever it is
required by making use of internet. Network technology refers to communication in between
various organisation by the use of networks . Along with this, resources such as printers,
scanners, files, etc. can be shared. This enhances entire operations of organisation and also assist
in formulation of strategies. Apart from this, management of Tesco can make use different
software like mySql for storage of information.
Document Page
References
Books and Journals
Eason, K. D., 2014. Information technology and organisational change. CRC Press.
Kiran, A. H., Oudshoorn, N. and Verbeek, P. P., 2015. Beyond checklists: toward an ethical-
constructive technology assessment. Journal of responsible innovation. 2(1). pp.5-19.
Law, R., Buhalis, D. and Cobanoglu, C., 2014. Progress on information and communication
technologies in hospitality and tourism. International Journal of Contemporary
Hospitality Management. 26(5). pp.727-750.
Marchewka, J. T., 2014. Information technology project management. John Wiley & Sons.
Mehlman, M. J. and Li, T. Y., 2014. Ethical, legal, social, and policy issues in the use of
genomic technology by the US Military. Journal of Law and the Biosciences. 1(3).
pp.244-280.
Neuhofer, B., Buhalis, D. and Ladkin, A., 2014. A typology of technology‐enhanced tourism
experiences. International Journal of Tourism Research. 16(4). pp.340-350.
Nieves, J., Quintana, A. and Osorio, J., 2014. Knowledge-based resources and innovation in the
hotel industry. International Journal of Hospitality Management. 38. pp.65-73.
Pardo, A. and Siemens, G., 2014. Ethical and privacy principles for learning analytics. British
Journal of Educational Technology. 45(3) pp.438-450.
Sampson, J. P. and Makela, J. P., 2014. Ethical issues associated with information and
communication technology in counseling and guidance. International Journal for
Educational and Vocational Guidance. 14(1). pp.135-148.
Santoro, G., 2015. Evaluating performance in the hotel industry: An empirical analysis of
Piedmont. Journal of Investment and Management. 4(1-1). pp.17-22.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
Wang, D. and et. al, 2016. Assessing hotel-related smartphone apps using online reviews.
Journal of Hospitality Marketing & Management. 25(3). pp.291-313.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]