Tesco IT Infrastructure: Software, Ethics, Networking Technologies

Verified

Added on  2023/06/14

|11
|3849
|421
Report
AI Summary
This report provides an overview of Tesco's information technology infrastructure, highlighting the importance of system software and its advantages in enhancing organizational efficiency. It delves into the ethical and social issues pertinent to software development, emphasizing the significance of data security, trust, and accountability. The report identifies and differentiates between various networking technologies, such as PAN, LAN, and WAN, discussing their applications within Tesco's operations. Furthermore, it explores the potential impact of artificial intelligence on improving business processes and outlines the various phases of the software development life cycle (SDLC). The analysis underscores the critical role of IT in supporting Tesco's business objectives while addressing ethical considerations and leveraging technological advancements.
Document Page
Introduction to
information technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
The repost of tesco is defining all the software advantages and the use of them can make the
organisation work efficiently and complete all the task and the software-development-life-cycle has
also been defines in the phases and the steps of the report. Information technology has been the
most strong system for the company to get the company task done smoothly. Some of the ethical
and social issues are also considered important in the software development processing and with
different networking technology are also the part of this report study and they are explained in brief
in the report.
Document Page
Table of Contents
Introduction .........................................................................................................................................4
Discuss the importance of system software that is essential for every hardware to be operated or
used by any individual or businesses. ........................................................................................5
Ethical and social issues are progressively becoming essential in the digital world. Determine
and cover the value of them to run businesses............................................................................5
Identify and differentiate between different types of networking technologies..........................7
Effect of Arranged Intelligence in enhancing the business operations. .....................................8
Listing and justifying the various phases of software development life cycle. ........................9
Conclusion .........................................................................................................................................10
References .........................................................................................................................................11
Document Page
Introduction
It is the building connection network which helps in the business to get the smooth working
in the working place environment, also protects the data, administrating the databases. In context to
Tesco, it helps the employees to solve the problems in their system or mobile functioning, also
makes sure that the data submitted is safe and not misused. There are some of the technical skills
that are needed in the IT department and they are communication, organization,analytical abilities
and creativity. Tesco is the company situated in Welwyn Garden City, England and it is the third big
merchant in the global in terms of earning good revenue and the employees of tesco have learned
about the basic skills of IT so that they can work efficiently and effectively and know how to use
the system that can help them in making the transactions and dealings smooth(Ashraf and et. al.,
2022).
Literature review
In accordance to anupama shukla, 2014 the system software is the service which is highly
demanded in the market or the company, this includes the search engines which are also used in
making the business more beneficial and smooth with the working. The software system can be
classified in the various application software like Microsoft(MSFT), oracle(ORCL), CRM and they
are the key layers in the software industry.
In the article of Dave yardley, 2018 there has been spread of light on the digital transformation that
is very critically essential to be discussed and it is the important for the organisation to collect their
data in a big data analysis and then respond to the market forces accordingly. The need of ethics in
the company functioning is yet very important to be considered and there are some of the digital
transformation ethics which is based on the study in the analyses and the discussion, when the
business have he transformation success then the the trust and the integrity will be important as a
technical challenge which will be faced by the company. And here are some of the ethical issues
which can be classified in the study more briefly which also explains that the security of data is so
important as the company have some of the details which are very confidential and they can't be
shared.
In the article of Stephane bourgeois, 2016 there are the description of the various types of networks
that are used in the recent times in the market and the company and they are very important to be
discussed in this report and they are analysed in the study, also the explanation of all the networks
that are personal area network(PAN), local area network(LAN), wireless local area
network(WLAN), campus area network(CAN), metropolitan area network(MAN), wide area
network(WAN), storage area network(SAN), System-Area Network(SAN), Passive Optical Local
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Area Network(POLAN), Enterprise Private Network(EPN), virtual private network(VPN) and the
brief study of these networks is in the discussion.
In the article of Vince lynch, 2019 there are the ways of artificial interaction, and with the changing
time it is hard for the business to manage the consumer demands and make some of the necessary
plans for the execution which can help the company to move further in terms of earning good
profits and revenues.
Analysis and discussion
Discuss the importance of system software that is essential for every hardware to be operated or
used by any individual or businesses.
System software which is also known as operating system and the associated programme,
which enables system and computer to work. It provides the base for the structure software that
relates and manage the hardware, network and the software all together. Operating system is the
most essential part of the computer as the whole system runs under the control of an operating
system, the parts of a computer to work together by acting tasks like transportation of information
between internal representation and disks or interpreting yield onto a display device. System
software render the program for moving any petition or application software. System software take
issue from application software because it compounds the computer's susceptibility. However, it
isn't involved in the tasks that profit the end user(Cai, Zhao and Sun, 2022).
Ethical and social issues are progressively becoming essential in the digital world. Determine and
cover the value of them to run businesses.
In the analogue world clearness and unity must be the midpoint belief that guide professed
action. Company must use information in accountable and right ways and that substance not using it
in structure that are advised trespassing, artful or insulting to others. So, in a digital society, what
does being right really mean and how can those active in scheming, processing and position digital
services interpret ethical generalization into vocational behaviours that will support digital shift
inaugural. There are some of the ethical issues for the company that can be critically analysed and
they are as follows:
Plan for secrecy, security and unity: This is important to consider that all the organisation
and the employees want that the data they are using or providing to the internet must kept
safe and should not be leaked if the data is mislead then the company can even face some of
the serious problems, also being transparent allow the customer to provide their consent.
Also there are some of the new inventions in the mobile application that the software can
also know the location of the consumer even if the location is turned off.
Document Page
Promote trust: Trust is the basic need in all the organisation so as in tesco the group of
individuals must trust the authority and the system they are using. People who are managing
and interpreting the data must uphold that they have huge responsibility of valuing the users
of the company. Data integrity is the most crucial part of the organisation as this is the major
part for the company to sustain in the marketplace. Digital infrastructure do help in helps the
association in provide the companies data to be used in some of the formalities of the
business like validation,replication and the organisation analytical research. Companies
which are just ignoring the basic principles of the digital system are lacking behind in the
market and are facing the ethical issues(Zuraw and Aeffner, 2022).
Beware of bias: It is important that the users and the employees of tesco be clear and fair
with their decision for the working of the organisation and they must not make some of the
decisions that are unfair for the other people of the company and they should treat them the
same way they are treating the other members of the unit base. And when there is so much
responsibility on the employees they do not have the capacity to focus on all the different
point and little mistakes of the company. When the leaders or the managing authority is
biased then they pay some extra attention to some group of people and avoiding the other
employees(Dutta and et. al., 2022).
Ensure that there is accountability: Inference models and formula are important elements
within the grow range of ‘smart’ digital employment that provide an artificial intelligence
and machine learning ability. Owing to their ability to pool social data with decision-making
engines, concerns have grown about the extent to which clear answer-ability structures can
be preserved. For example, if rule are used by financial services organisations to make
decisions that would normally be made by qualified and regulated professed, questions must
be raised around where responsibility lies. Organisations quest to develop digital services
must, therefore, guarantee that these services are not used to avoid or cut down corporate
answerability(Zhou, Morgan, Dwivedi and Bai, 2022).
Some of the social issues are as follows:
Authentic information: As the word suggests the information that is the part of the
company working must be true and genuine when it is collected. And the data which is
being analysed in the company should reliable data and must be based on the facts and
ground reality of the retailed marketplace of tesco. To have the proper processing of the
company, the authority must keep a check that the employees and the analysts are doing
their job properly and collecting the data in a genuine way.
Cyberbullying: It refers to the misuse of the information which is being on the IT by the
Document Page
company, and it has so many bad impacts on the processing and the functioning of the
company. Also the cyber bullying comes in various forms like it is action to
manipulate,harass or defame some or the other individual of the company which can lead to
a lot of issues in the company and this can seriously affect someone's life and they can take
place on the social platform which have huge crowd available like Instagram, twitter and
whatsapp(Takamatsu and et. al., 2022).
Cyber security: it is the application which is used to control and manage that there should
be no cyber attack and it is used for protecting the systems. The main aim is to decrease the
risk of cyber attacks and unauthorised exploitation of systems, networks and technologies.
Excessive internet use: It is about the over usage of the internet facility by the employees
and the effects of excessive internet use are highly making the distress in the organisation
and the employees are reliable only on the internet facility and they are inclined with the
work which is only done with the connectivity of internet and they do not use their own
mind, they just surf on the internet websites and look for the new and creative ideas which is
not helping the tesco company but making their employees lazy and less efficient(Ekman,
Dahlin and Keller, 2022).
Gambling: It is the process when the company is taking their resources which is of some
value and that resource can give some amount of gain to the company or benefit to the
organisation, this process is done when there is some of the contest and game and there is
the gambling process for the prediction of the result(SUN, WEN and WEN, 2022).
Identify and differentiate between different types of networking technologies.
There are some of the types of networks and they are as follows:
PAN: It is the easy and most elemental sort of communication system, consisting of a
wireless modem, one or more computers Information technology is the building
communication network which helps in the business to get the smooth working in the
working place environment, also protects the data, administrating the databases. In context
to Tesco, it helps the employees to solve the problems in their system or mobile functioning,
also makes sure that the data submitted is safe and not misused. There are some of the
technical skills that are needed in the IT department and they are communication,
organization,analytical abilities and creativity. Tesco is the company situated in Welwyn
Garden City, England and it is the third largest retailer in the world in terms of earning good
revenue and the employees of tesco have learned about the basic skills of IT so that they can
work efficiently and effectively and know how to use the digital and technological gadgets
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
like phone, printers and so on(Ibrahim, Gulihana and Susanto, 2022).
LAN: We're convinced that staff are acquainted with these kinds of networks — LANs are
one of the most normally unregenerate networks, as well as one of the most common and
unique.
WLAN: Wireless system application, such as Wi-Fi, is used in these. These system, which
are usually used in the same applications as LANs, do not need devices to relate to the
network using live wires.
MAN: These networks are bigger than LANs but smaller than WANs, and they pool
characteristics from both types of networks. MANs cover a large magnetic area (typically a
territorial division or city, but sometimes a campus). An individual or a firm is in assertion
of possession and care of the data (a local council, a large company, etc.).
WAN: it is is slimly more complex than a LAN, links computers over longer physical
distances. This modify computers and low-low-tension inclination to pass on with one
another over a broad network, even when they are thousands of miles extreme(Sengan and
et. al., 2022).
SAN: These networks do not depend on a LAN or WAN because they are differentiated
high-speed networks that link pooled pools of retention devices to many servers. Instead,
they deviate storage resources away from the network and into their own high-speed
network. SANs can be approached in the same way that a server-attached drive can.
Converged, practical, and incorporated storage-area networks are examples of storage-area
networks.
EPN: Businesses who want to firmly associate their many sites to share computer resources
build and possess these types of networks.
VPN: A VPN extends a private network across the Internet, allowing users to send and get
the data as if they were connected to the private network — even if they aren't. Users can
connect to a private network distantly using a realistic point-to-point link.
Effect of Arranged Intelligence in enhancing the business operations.
Artificial intelligence is the source which can help in eliminating the ordinary tasks from the
list of the work by the workers of tesco and by using this techniques the employees of the company
can save a lot of time. And in the business it is important to save time and this also improves the
customer experience and optimise all the resources of the company and increase the productivity of
the company. The decision making power of the tesco company based on the results of the
Document Page
organisation increases rapidly. Also to grow the business and have the strong consumer base, the
tesco must consider all the needs of the customer important and they must make the necessary
moves to meet all the needs of the consumers in the respective time. Also the communication level
of the employees with the users in the market have enhanced(self). Conversational AI has made the
communication space more fluid for both customers and businesses, providing quick results for
customers and making it easier for enterprises to provide attention to everyone who needs
it(Nagaraja, Kant and Rajalakshmi, 2022).
Listing and justifying the various phases of software development life cycle.
There are some of the phases of the software development life cycle and they are as follows:
Planning: In this process the leaders and the department people decide to plan the terms of
the projects, this involves the calculation of the cost of the raw material of the company and
the labour cost and creating a proper time table with the company objective.
Define requirement: It is the function when the leaders decide that which application must
be used in which business operation and defining how to operate the plans of the company.
Design and prototyping: This process involves some of the steps which are architecture,
user interface, platform, programming, communications and security.
Software development: This is the main function where it is the main writing of the
program which is also known as coding of the program also many of the employees make
team to work with the strong force and be effective with their work.
Testing: As it is important to make sure that the application that is being used in the
company should be properly managed and it is also analysed that it is necessary test the
application first(Purkis, 2022).
Document Page
Conclusion
In this respective report, it has been concluded that the information technologies have huge
impact on the company and it is also important for the employees that they are trained in the skills
of knowing all about the software system and make the strategies that can be beneficial for the
company and gives company good amount of profit and revenues. Some of the networks like LAN,
WLAN etc. are the helpful sources for the company functioning.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Ashraf, A. and et. al., 2022. Particle swarm optimization with new initializing technique to solve
global optimization problems. Intelligent Automation and Soft Computing, 31(1), pp.191-
206.
Cai, J., Zhao, Y. and Sun, J., 2022. Factors influencing fitness app users’ behavior in
China. International Journal of Human–Computer Interaction, 38(1), pp.53-63.
Dutta, N. and et. al., 2022. Introduction to Digital Forensics. In Cyber Security: Issues and Current
Trends (pp. 71-100). Springer, Singapore.
Ekman, P., Dahlin, P. and Keller, C., 2022. Management and Information Technology After Digital
Transformation. Routledge.
Ibrahim, F., Gulihana, N.A. and Susanto, H., 2022. An Explanatory Study of User Satisfaction:
Evidence From Brunei Health Information and Management System (Bru-HIMS).
In Handbook of Research on Developing Circular, Digital, and Green Economies in
Asia (pp. 346-369). IGI Global.
Jassim, N.A., Al-Zahir, B.A.M. and Khazraji, A., 2022. DIAGNOSING THE CURRENT
INFORMATION SYSTEMS SECURITY DEPARTMENT IN THE INFORMATION
TECHNOLOGY DEPARTMENT ACCORDING TO THE INTERNATIONAL
STANDARD (ISO/IEC 27001: 2013). Journal of Management Information & Decision
Sciences, 25.
Nagaraja, H., Kant, K. and Rajalakshmi, K., 2022. Reconstruction of missing hourly precipitation
data to increase training data set for ANN. In Research Anthology on Artificial Neural
Network Applications (pp. 242-265). IGI Global.
Purkis, J., 2022. How to think like a hitchhiker: An introduction to vagabond sociology. In Driving
with strangers (pp. 36-55). Manchester University Press.
Sengan, S. and et. al., 2022. Security-aware routing on wireless communication for E-health records
monitoring using machine learning. International Journal of Reliable and Quality E-
Healthcare (IJRQEH), 11(3), pp.1-10.
SUN, X., WEN, C. and WEN, T., 2022. Maximum Correntropy High-Order Extended Kalman
Filter. Chinese Journal of Electronics, 31(1), pp.190-198.
Takamatsu, K. and et. al., 2022. Eduinformatics: A New Academic Field Needed in the Age of
Information and Communication Technology. In Intelligent Sustainable Systems (Zhou, D.,
Morgan, D., Dwivedi, R. and Bai, S., 2022. A Case of Teaching and Assessing an
Introduction to Information Technology Course. International Journal of Curriculum
Development and Learning Measurement (IJCDLM), 3(1), pp.1-16.
Zhou, D., Morgan, D., Dwivedi, R. and Bai, S., 2022. A Case of Teaching and Assessing an
Introduction to Information Technology Course. International Journal of Curriculum
Development and Learning Measurement (IJCDLM), 3(1), pp.1-16.
Zuraw, A. and Aeffner, F., 2022. Whole-slide imaging, tissue image analysis, and artificial
intelligence in veterinary pathology: An updated introduction and review. Veterinary
pathology, 59(1), pp.6-25.
(Ashraf and et. al., 2022)(Cai, Zhao and Sun, 2022)(Dutta and et. al., 2022)(Ekman, Dahlin and
Keller, 2022)(Ibrahim, Gulihana and Susanto, 2022)(Jassim, Al-Zahir and Khazraji,
2022)(Nagaraja, Kant and Rajalakshmi, 2022)(Purkis, 2022)(Sengan and et. al., 2022)
(SUN, WEN and WEN, 2022)(Takamatsu and et. al., 2022)(Zhou, Morgan, Dwivedi and
Bai, 2022)(Zuraw and Aeffner, 2022)
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]