Report on IT Setup: Software, Security, and Information Storage
VerifiedAdded on 2023/06/04
|10
|2203
|490
Report
AI Summary
This report addresses the IT setup requirements for a new business, focusing on software, security, and information storage. The report begins with an introduction to information technology and its core functions. It then delves into software recommendations, including Microsoft Office for basic tasks and Click Meeting for business meetings. The report emphasizes the importance of computer security and recommends programs like Keeper, Air Watch VMware, and SolarWinds for protection and access control. Furthermore, it outlines steps for system updates and lists suitable web browsers such as Chrome, Firefox, and Safari. Finally, the report discusses procedures for storing information to ensure easy access for employees. Overall, the report provides a practical guide to establishing a secure and efficient IT infrastructure for the new business, covering essential aspects from software selection to information management.

Running head: FOUNDATIONS OF INFORMATION TECHNOLOGY
Foundations of Information Technology
Name of the Student
Name of the University
Author’s Note:
Foundations of Information Technology
Name of the Student
Name of the University
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
FOUNDATIONS OF INFORMATION TECHNOLOGY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Software for Basic Works and Description of the Functionality of Software...................2
2. Business Meeting Software with its Functionalities..........................................................2
3. Programs that Protect Computer and Maintain Access Control........................................3
4. Making System Update for not Hindering Work...............................................................5
5. List of Browsers for Accessing Internet Facilities.............................................................5
6. Procedure of Storing Information for Accessing Information...........................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
FOUNDATIONS OF INFORMATION TECHNOLOGY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Software for Basic Works and Description of the Functionality of Software...................2
2. Business Meeting Software with its Functionalities..........................................................2
3. Programs that Protect Computer and Maintain Access Control........................................3
4. Making System Update for not Hindering Work...............................................................5
5. List of Browsers for Accessing Internet Facilities.............................................................5
6. Procedure of Storing Information for Accessing Information...........................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8

2
FOUNDATIONS OF INFORMATION TECHNOLOGY
Introduction
IT or information technology can be stated as the utilization of several computers for
the purpose of storing, retrieving, transmitting and finally manipulating information or data
for any specific organization or business (Dahlstrom, Walker and Dziuban 2013). There are
three distinct categories of information technologies, which are techniques to process,
simulation of the high order thinking with computerized programs and a proper application of
the mathematical or statistical methods for decision making. This information technology is
the proper subset of the ICT or information and communications technology. The following
report outlines a brief discussion on the case study of computer systems. The various details
regarding the appropriate software would also be provided here.
Discussion
1. Software for Basic Works and Description of the Functionality of Software
The most suitable and the best software required in this particular case study is the
Microsoft Office. It is the family of client software, server software as well as services. It is
responsible for doing all types of basic works that would be required for starting the new
business (Dahlstrom and Bichsel 2014). The major functions of this software majorly include
Microsoft Word, Microsoft PowerPoint and Microsoft Excel. There are multiple versions of
this software and thus it is much effective for the users.
2. Business Meeting Software with its Functionalities
The business meeting software or the video conferencing software is responsible for
facilitating the initiation and conducting of live conferences or business meetings within two
or more participants at the various sites by simply utilizing the computer networks for the
core purpose of transmitting audio, video and text data (Eason 2014). The productivity is
increased by and the extra costs are eradicated. One of the most significant and important
FOUNDATIONS OF INFORMATION TECHNOLOGY
Introduction
IT or information technology can be stated as the utilization of several computers for
the purpose of storing, retrieving, transmitting and finally manipulating information or data
for any specific organization or business (Dahlstrom, Walker and Dziuban 2013). There are
three distinct categories of information technologies, which are techniques to process,
simulation of the high order thinking with computerized programs and a proper application of
the mathematical or statistical methods for decision making. This information technology is
the proper subset of the ICT or information and communications technology. The following
report outlines a brief discussion on the case study of computer systems. The various details
regarding the appropriate software would also be provided here.
Discussion
1. Software for Basic Works and Description of the Functionality of Software
The most suitable and the best software required in this particular case study is the
Microsoft Office. It is the family of client software, server software as well as services. It is
responsible for doing all types of basic works that would be required for starting the new
business (Dahlstrom and Bichsel 2014). The major functions of this software majorly include
Microsoft Word, Microsoft PowerPoint and Microsoft Excel. There are multiple versions of
this software and thus it is much effective for the users.
2. Business Meeting Software with its Functionalities
The business meeting software or the video conferencing software is responsible for
facilitating the initiation and conducting of live conferences or business meetings within two
or more participants at the various sites by simply utilizing the computer networks for the
core purpose of transmitting audio, video and text data (Eason 2014). The productivity is
increased by and the extra costs are eradicated. One of the most significant and important
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
FOUNDATIONS OF INFORMATION TECHNOLOGY
business meeting software for this particular case study is the Click Meeting. This particular
software of Click Meeting is eventually a browser based, flexible as well as feature heavy
platform for the web conferencing. It is a cloud software as a solution feature for dedicating
within the business environment for the major purpose of meeting, collaborating and working
online. Hence, this business meeting software of Click Meeting subsequently allows the busy
professionals for hosting and running the online meetings or even the video conferences in
the easiest manner (Bilbao-Osorio, Dutta and Lanvin 2013). This specific software needs
absolutely no installation and even work on each and every device or operating system.
3. Programs that Protect Computer and Maintain Access Control
Protection of computers is extremely important and significant for any organization to
protect their respective systems from any type of attack or vulnerability. The computer
security is termed as the protection of the several computer based systems from any type of
damage or theft to the software, hardware as well as the electronic data from the disruptions
and misdirection of services, which are provided to them (Marchewka 2014). Due to the
increased reliance on the computer systems, the connection of the Internet and even the
wireless networks like Wi-Fi or wireless fidelity and Bluetooth have become extremely
vulnerable for all users and hence these users undergo various issues and problems while
using the software. This is majorly because of the growth of the smart devices such as smart
televisions and smart phones and these various devices altogether constitute the IoT or
Internet of Things (Holtshouse 2013). There are some of the most significant and important
software programs that help in protecting the systems. These programs are responsible to
protect the several organizational systems and the major programs are listed below:
i) Keeper: It is the most effective and efficient software that helps to manage the
passwords and even the digital wallet, which stores the web site passwords and any sensitive
information. This software utilizes 256 bit AES encryption as well as the two factor
FOUNDATIONS OF INFORMATION TECHNOLOGY
business meeting software for this particular case study is the Click Meeting. This particular
software of Click Meeting is eventually a browser based, flexible as well as feature heavy
platform for the web conferencing. It is a cloud software as a solution feature for dedicating
within the business environment for the major purpose of meeting, collaborating and working
online. Hence, this business meeting software of Click Meeting subsequently allows the busy
professionals for hosting and running the online meetings or even the video conferences in
the easiest manner (Bilbao-Osorio, Dutta and Lanvin 2013). This specific software needs
absolutely no installation and even work on each and every device or operating system.
3. Programs that Protect Computer and Maintain Access Control
Protection of computers is extremely important and significant for any organization to
protect their respective systems from any type of attack or vulnerability. The computer
security is termed as the protection of the several computer based systems from any type of
damage or theft to the software, hardware as well as the electronic data from the disruptions
and misdirection of services, which are provided to them (Marchewka 2014). Due to the
increased reliance on the computer systems, the connection of the Internet and even the
wireless networks like Wi-Fi or wireless fidelity and Bluetooth have become extremely
vulnerable for all users and hence these users undergo various issues and problems while
using the software. This is majorly because of the growth of the smart devices such as smart
televisions and smart phones and these various devices altogether constitute the IoT or
Internet of Things (Holtshouse 2013). There are some of the most significant and important
software programs that help in protecting the systems. These programs are responsible to
protect the several organizational systems and the major programs are listed below:
i) Keeper: It is the most effective and efficient software that helps to manage the
passwords and even the digital wallet, which stores the web site passwords and any sensitive
information. This software utilizes 256 bit AES encryption as well as the two factor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
FOUNDATIONS OF INFORMATION TECHNOLOGY
authentication (Bloom et al. 2014). The files and passwords could be easily synced or shared
with HTTPS and backed up within cloud.
ii) Air Watch VMware: The VMware Air Watch is the best provider of EMM or
enterprise mobility management software for the applications, emails and contents.
iii) Solar Winds Software: This particular software of Solar Winds is responsible for
the purpose of helping to manage the networks, systems as well as infrastructures of
information technology (Lloyd 2017).
iv) Dashlane: The Dashlane is the application of password manager and secured
digitalized wallet. Since, this specific application is available on Android, Mac, iOS and PC.
It enables the users in securely sync the data within the unlimited devices on every platform.
v) SaaS Vulnerability Scanner: As per the case study, the user would be accessing
cloud based accounting software and hence this software of SaaS Vulnerability Scanner
would help them in detecting or scanning all the vulnerabilities or threats within the system
(Schwalbe 2015).
The major and the most important software programs that help in proper access
controlling are listed below:
i) ISONAS
ii) Brivo
iii) Kisi
iv) Vanderbilt
v) Tyco Integrated Security
FOUNDATIONS OF INFORMATION TECHNOLOGY
authentication (Bloom et al. 2014). The files and passwords could be easily synced or shared
with HTTPS and backed up within cloud.
ii) Air Watch VMware: The VMware Air Watch is the best provider of EMM or
enterprise mobility management software for the applications, emails and contents.
iii) Solar Winds Software: This particular software of Solar Winds is responsible for
the purpose of helping to manage the networks, systems as well as infrastructures of
information technology (Lloyd 2017).
iv) Dashlane: The Dashlane is the application of password manager and secured
digitalized wallet. Since, this specific application is available on Android, Mac, iOS and PC.
It enables the users in securely sync the data within the unlimited devices on every platform.
v) SaaS Vulnerability Scanner: As per the case study, the user would be accessing
cloud based accounting software and hence this software of SaaS Vulnerability Scanner
would help them in detecting or scanning all the vulnerabilities or threats within the system
(Schwalbe 2015).
The major and the most important software programs that help in proper access
controlling are listed below:
i) ISONAS
ii) Brivo
iii) Kisi
iv) Vanderbilt
v) Tyco Integrated Security

5
FOUNDATIONS OF INFORMATION TECHNOLOGY
4. Making System Update for not Hindering Work
Since, the user is starting a new business and computers are to be set properly, the
systems are to be updated properly and regularly, so that the employees does not face any
issue regarding hindering of work. This updating of software is extremely easier for all users.
There are some of the major steps that are to be followed for this type of system updates on
both Mac and Windows operating systems (Alwahaishi and Snásel 2013). These software
updates are hence easily completed by relieving some of the valuable system resources. The
major programs helpful in this case are:
i) PC App Store
ii) Patch My PC Updater
iii) Kaspersky Software Updater
iv) Heimdal Free.
5. List of Browsers for Accessing Internet Facilities
The web browser is the respective software application that helps in accessing any
type of information on the WWW or World Wide Web. Every individual image, web page or
video is properly and uniquely identified by the specific URL. The browsers are enabled for
retrieving and displaying them on the devices of the various users. The web browser is not
the same as the search engine. The search engine eventually stores the searchable data;
however about all other web sites (Wagner, Beimborn and Weitzel 2014). However, for the
purpose of connecting or displaying these web sites on the various devices, the specified user
requires to have the web browser installed here. The major feature of these web browsers are
the innovative graphical interfaces that these web browsers comprise of. The most significant
and suitable browsers for accessing the Internet facilities for this particular case study are
listed below:
FOUNDATIONS OF INFORMATION TECHNOLOGY
4. Making System Update for not Hindering Work
Since, the user is starting a new business and computers are to be set properly, the
systems are to be updated properly and regularly, so that the employees does not face any
issue regarding hindering of work. This updating of software is extremely easier for all users.
There are some of the major steps that are to be followed for this type of system updates on
both Mac and Windows operating systems (Alwahaishi and Snásel 2013). These software
updates are hence easily completed by relieving some of the valuable system resources. The
major programs helpful in this case are:
i) PC App Store
ii) Patch My PC Updater
iii) Kaspersky Software Updater
iv) Heimdal Free.
5. List of Browsers for Accessing Internet Facilities
The web browser is the respective software application that helps in accessing any
type of information on the WWW or World Wide Web. Every individual image, web page or
video is properly and uniquely identified by the specific URL. The browsers are enabled for
retrieving and displaying them on the devices of the various users. The web browser is not
the same as the search engine. The search engine eventually stores the searchable data;
however about all other web sites (Wagner, Beimborn and Weitzel 2014). However, for the
purpose of connecting or displaying these web sites on the various devices, the specified user
requires to have the web browser installed here. The major feature of these web browsers are
the innovative graphical interfaces that these web browsers comprise of. The most significant
and suitable browsers for accessing the Internet facilities for this particular case study are
listed below:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
FOUNDATIONS OF INFORMATION TECHNOLOGY
i) Chrome: This is the free ware web browser could be accessed by Microsoft
Windows, macOS, Android, Linux and iOS and it serves as the platform to run the web
applications.
ii) Firefox: This is the free as well as open source web browser and is available for
Linux, macOS and Windows. It is extremely faster and could be accessed easily.
iii) Safari: This is the graphical web browser that is completely based on the engine
of WebKit. Safari could be accessed from iOS and Android versions (Brooks 2016).
iv) Internet Explorer: The Internet Explorer is the series of the graphical web
browsers for Windows operating system. Although, the speed of this browser is not as high as
the rest; it is quite efficient for all users.
v) Edge: Microsoft Edge is the graphical web browser and supports the devices of
Windows 10 Mobile, Xbox One and Windows 10 and hence replacing Internet Explorer as
the main web browser in every device.
6. Procedure of Storing Information for Accessing Information
The storing of information is one of the most important and significant requirement
for all organizations and businesses. As per the provided case study, since the user is starting
a new business and new employees would be recruited; it is extremely vital to store the
confidential and sensitive organizational information in such a manner that the employees or
staffs could easily access them without any type of issue or problem (Schwalbe 2015). The
first and the foremost format of this information storage procedure is to utilize clear as well
as user focused language. When this information is being stored, such words should be uses,
so that the employees are able to access the information easily and promptly. The next
effective and efficient way to store the information for better access to the employees is by
publicising alternative formats in easy to read version. An accessible information policy
FOUNDATIONS OF INFORMATION TECHNOLOGY
i) Chrome: This is the free ware web browser could be accessed by Microsoft
Windows, macOS, Android, Linux and iOS and it serves as the platform to run the web
applications.
ii) Firefox: This is the free as well as open source web browser and is available for
Linux, macOS and Windows. It is extremely faster and could be accessed easily.
iii) Safari: This is the graphical web browser that is completely based on the engine
of WebKit. Safari could be accessed from iOS and Android versions (Brooks 2016).
iv) Internet Explorer: The Internet Explorer is the series of the graphical web
browsers for Windows operating system. Although, the speed of this browser is not as high as
the rest; it is quite efficient for all users.
v) Edge: Microsoft Edge is the graphical web browser and supports the devices of
Windows 10 Mobile, Xbox One and Windows 10 and hence replacing Internet Explorer as
the main web browser in every device.
6. Procedure of Storing Information for Accessing Information
The storing of information is one of the most important and significant requirement
for all organizations and businesses. As per the provided case study, since the user is starting
a new business and new employees would be recruited; it is extremely vital to store the
confidential and sensitive organizational information in such a manner that the employees or
staffs could easily access them without any type of issue or problem (Schwalbe 2015). The
first and the foremost format of this information storage procedure is to utilize clear as well
as user focused language. When this information is being stored, such words should be uses,
so that the employees are able to access the information easily and promptly. The next
effective and efficient way to store the information for better access to the employees is by
publicising alternative formats in easy to read version. An accessible information policy
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
FOUNDATIONS OF INFORMATION TECHNOLOGY
should be eventually developed as well as publicised for the users so that the communications
are completed easily (Bloom et al. 2014). A proper evaluation of this policy is also required
here.
Conclusion
Therefore, from the above discussion, conclusion can be drawn that the information
technology is the proper utilization of any type of computer, storage, networking device,
physical device, processes as well as infrastructures for the purpose of creating, processing,
storing, securing and exchanging of every form of data. There are several layers of physical
equipment or hardware, virtualization or management tools present here for performing the
major functions. The above report has clearly outlined the various details regarding the case
study of information technology. The significant details regarding the appropriate software
and systems are provided here with recommendations.
FOUNDATIONS OF INFORMATION TECHNOLOGY
should be eventually developed as well as publicised for the users so that the communications
are completed easily (Bloom et al. 2014). A proper evaluation of this policy is also required
here.
Conclusion
Therefore, from the above discussion, conclusion can be drawn that the information
technology is the proper utilization of any type of computer, storage, networking device,
physical device, processes as well as infrastructures for the purpose of creating, processing,
storing, securing and exchanging of every form of data. There are several layers of physical
equipment or hardware, virtualization or management tools present here for performing the
major functions. The above report has clearly outlined the various details regarding the case
study of information technology. The significant details regarding the appropriate software
and systems are provided here with recommendations.

8
FOUNDATIONS OF INFORMATION TECHNOLOGY
References
Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications
technology: a UTAUT and flow based theoretical model. Journal of technology management
& innovation, 8(2), pp.61-73.
Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology
report 2013. In World Economic Forum (pp. 1-383).
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of
information technology and communication technology on firm organization. Management
Science, 60(12), pp.2859-2885.
Brooks, D.C., 2016. ECAR study of undergraduate students and information technology (Vol.
4, No. 3, p. 2). 2016.
Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information
Technology, 2014. Educause.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students
and information technology (p. 2013). 2013.
Eason, K.D., 2014. Information technology and organisational change. CRC Press.
Holtshouse, D.K., 2013. Information technology for knowledge management. Springer
Science & Business Media.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
FOUNDATIONS OF INFORMATION TECHNOLOGY
References
Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications
technology: a UTAUT and flow based theoretical model. Journal of technology management
& innovation, 8(2), pp.61-73.
Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology
report 2013. In World Economic Forum (pp. 1-383).
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of
information technology and communication technology on firm organization. Management
Science, 60(12), pp.2859-2885.
Brooks, D.C., 2016. ECAR study of undergraduate students and information technology (Vol.
4, No. 3, p. 2). 2016.
Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information
Technology, 2014. Educause.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students
and information technology (p. 2013). 2013.
Eason, K.D., 2014. Information technology and organisational change. CRC Press.
Holtshouse, D.K., 2013. Information technology for knowledge management. Springer
Science & Business Media.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
FOUNDATIONS OF INFORMATION TECHNOLOGY
Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), pp.241-272.
FOUNDATIONS OF INFORMATION TECHNOLOGY
Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), pp.241-272.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





