Roles of Core Technologies in an Effective IT System-3

pdf

School

Strayer University *

*We aren’t endorsed by this school

Course

505

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

4

Uploaded by ChiefCloverWolverine16

Report
1 Roles of Core Technologies in an Effective IT System Southern New Hampshire University IT-505-Core Technologies
2 There are five core technologies that makeup an overall system. Each of these technologies play a vital role to ensure the success in system performance. Each of these core technologies are interconnected and if one fails it can be catastrophic to the system. The five core technologies that a system comprises are computer programs and programming, computer networks, databases, information assurance, and web technologies. Computer programs and programming are vital to the system as it dictates what type of software is used. The code that creates these programs is referred to as computer programming. The operating system is a set of instructions that directs the computer on how to function. Examples of these programs are Microsoft Windows, and Microsoft word. Computer networks refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies (AWS, 2023). Multiple computers are able to connect with each other over networks. This is vital to the system as a whole to ensure each computer can follow the same systems and protocols at the same time, A database is an electronically stored collection of data, and information. Databases are more so in the background of the system, however they play a huge part in the system. All information on a computer is stored in databases. Something as simple as a username and password when logging onto an account is stored in the database which allows the system to run credentials against.
3 Information Assurance is the way in which computers and network systems information are protected. This also includes how a system's information should be managed in order to protect it. Information assurance covers everything from access based security to federal policies. measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities (IT Governance, 2023). “ Web Technologies refers to all of the components that makeup a website program. This can include the accessibility of the site whether that is mobile or via web, graphics, and how information is stored on these sites. Web technologies involves how web content is managed and delivered, While each of these components may seem very different they are interconnected, and needed in order to run a functional IT system. If even one of these fails a system can be gravely affected. For instance if a systems database is compromised critical information can be leaked. Information assurance would be affected as it did not protect the overall network. All networks can then be affected as they exchange data. The program and web technologies would need to be updated to ensure the system is secure. Tons of breaches have been recorded over the years and in fact have taken place due to a malfunction in one of these core technologies. Ensuring all five are properly running will make for an overall secure IT system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References The University. (1978). What is Computer Networking . Amazon. https://aws.amazon.com/what-is/computer-networking/ Information assurance . IT Governance. (n.d.). https://www.itgovernanceusa.com/information/information-assurance Armstrong, T. (n.d.). Introduction to Core Technologies. https://learn.snhu.edu/d2l/le/content/1443542/viewContent/28442597/View