Unit 2 D075 presentation Aug 2020

pdf

School

Western Governors University *

*We aren’t endorsed by this school

Course

D075

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

16

Uploaded by SargentScienceNarwhal39

Report
Unit 2- Foundations of IT Infrastructure D075 Information Technology Management Essentials
Foundations of ITM Information systems must be designed and managed carefully to extract their full value to a business. The world of information technology was moving so fast it was hard to decide your business’s path Should you be a first adopter and risk that the technology would quickly become obsolete or wait and miss out on technologies that could be an edge over your competitor? Fast forward to today, and information technology and infrastructure have changed many times over.
Everything Changes! Doing your best in business is an assumption; doing it right is an expectation. When it comes to technology - incredible speed of its advancement Business decisions are as critical as they are difficult This is one decision you cannot afford to get wrong! Information technology is clearly the Business cannot move forward without information technology Information Technology is the backbone of business; without it, there is no business
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Information Technology Information Technology (IT) is the study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware. The right IT infrastructure enables a business to provide IT tools and solutions to its employees and customers. Six components are Hardware Software Networks Data Information Systems includes IT plus: People Processes
Hardware makes up the physical and tangible parts of a computer
Software Computer Software - set of computer instructions that tell the computer how to work Flash memory , solid drive Types of Software: Application software - is defined as software an end user chooses to use, does one thing System software Operating System example: Microsoft Windows operating system (Windows) macOS Apple Utility - software that performs a particular function in the "background" virus protection software and printer drivers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Networks Computer networks include devices such as routers, switches, and communication links that allow the computer systems to communicate with each other no matter the distance or location. Networks are sometimes known as the “backbone” of the IT infrastructure Allows for the sharing of information and collaboration of work, which magnifies the capabilities of the corporation and workgroup.
Network Components Topology design or layout of a network
Data People and Processes Data Data, after the finances, is on of the most valuable assets . Data stored in databases such as transaction processing data, customer relationship management data (CRM) , ERP in order to support management and executive decisions People People who use the hardware, software, networks, and databases in their daily work. These people are called “ end users”. A separate group, development, and testing of application software in IT positions Processes - Business uses in its daily operations. End users defined above are working with on a daily basis Automated processes in day to day processes, manufacturing, decision making, Selection of the software is key to meeting the requirements of the end user.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Social Engineering Malware catch all term all malicious software Dumpster diving is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose. Phishing - the fraudulent practice of sending emails to be from supposedly reputable companies in to induce individuals to reveal personal information, such as passwords and credit card numbers. Pharming the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc. Spyware aims to gather information about person without their knowledge and send to another entity Denial of Service cyber attack to make machine or network disrupt services Virus spread themselves attaching to legitimate files and infection websites, emails, can disable systems Tailgating also known as “ piggybacking,” involves an attacker seeking entry to a restricted area which lacks the proper authentication Shoulder surfing refers to the act of obtaining personal or private information through direct observation
Information Technology in Business Computer Competency the knowledge that enables a person to understand something Information technology is a core competency in business. Gaining computer competency in business is paramount to success. Attitudes toward information technology play a pivotal role in gaining computer competency “Individuals with the capacity for critical thinking have the humility to understand that a task can always be done better and more efficiently, and this same thinking can be applied to business computing as well”(McCarthy, M, Watcher, E).
Applying Information Technology Best practice Management process, technique that is most effective at arriving at a desired outcome. Better outcome than any other process, technique, or method. Gordon Moore founding fathers of Intel (CPU) Astounding observation in 1965 known as Moore's law. Moore's law states that computing power doubles every 18 months. Anytime you are involved with business information technology, especially in decision-making, it is imperative that you think of the future !!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Management Roles in IT Chief information officer (CIO) is a job title for the board-level head of an information technology department within a business organization Chief technology officers (CTO) are often confused with chief information officers, but there are marked differences between the two. One big difference is that the CTO runs the organization's IT engineering group and serves as the company's top technology architect Chief security officer (CSO) originated within information technology as the person who was responsible for IT security. The CSO title is used at some businesses to designate the leader of overall corporate security. IT managers and IT project managers are in charge of software application development teams that develop, design, program, and test software applications.
Technician Roles in IT Network administrators are directly responsible for the smooth operations and maintenance of a business's networks and networking technology, including its hardware and software. Information security analysts (ISA) , sometimes called cybersecurity analysts, are responsible for protecting all sensitive information within an organization. Database administrators (DBAs) , sometimes called data administrators, categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business. Web developers , specifically senior web developers, prepare, plan, and implement web-based software applications. Computer programmers (informally called coders) produce both system and application software by writing lines of programming instructions for a computer to follow.
Technician Roles in IT Computer support specialists (Help Desk) install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly. Computer systems administrators (sometimes called system administrators or Sys Admins) have a slightly bigger role than computer support specialists Computer systems analysts must have great communication skills, as they are the conduit between IT and the rest of the organization. IT architects, sometimes called applications architects, design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Questions??

Browse Popular Homework Q&A

Q: ory can weed the garden in 3 hours working alone. Jin can weed the garden in 5 ours. How long will…
Q: total $700. ayable. d. Ren collected Prepare adjusting entry for supplies. BE3-5 (LO 2), AP Lahey…
Q: The weights of a certain dog breed are approximately normally distributed with a mean of 51 pounds,…
Q: How does the electron configuration for an anion differ from that of its neutral atom? How is it…
Q: Section 2: Find sin and cos 0 if the terminal ray of angle 0 passes through the given point. 7.) (3,…
Q: Is memory ability before a meal the same as after a meal? len people were given memory tests before…
Q: an Find an equation of the plane cons isting 619 of all points that are equidistant from A (4-9, 9)…
Q: 9.5 Determine the instantaneous power supplied by the source i the circuit in Fig. P9.5. 12/60°v( +…
Q: Determine the moment of inertia for this circle about: (a) The x-axis (b) The y-axis (c) Axis, a-b
Q: credit card company determines a card holders minimum enthly payment by adding all new interest to…
Q: BIOS Settings: Display storage device information, configures and tests the storage devices and…
Q: Menu option C  The program reads in data from HowManyHours.txt, displays a report header with the…
Q: Perform the indicated computations when possible, using the matrices given below. (If an answer does…
Q: Given f(x, y) = 8y³ + 12xy³. a) Draw the region that is the base (or footprint) the surface, b)…
Q: greatest speed?      (c) The greatest velocity?      (d) The greatest momentum
Q: 4. The figure below presents the demand curve, marginal revenue, marginal costs, and average total…
Q: sigib-wal Jangsal bis batuseanss od nao tada ats 27. Write each of the number in expanded form into…
Q: 4. If n EN, then 1-2+2-3+3.4+4.5++ n(n+1)= n(n+1)(n+2) 3
Q: Given 0 = 4T/3 radians is an angle in standard position find exact values: sin es COS= tano =…
Q: 7. Use De Morgan's laws to write the negation of the statement. A day late and a dollar short.…
Q: Find the coordinate matrix of x relative to the orthonormal basis B in R. 4 x = (15, 5, 20), B =…
Q: State whether each group would benefit, lose, or have no effect as a result of the tariff imposed in…