IT or information technology can be stated as the utilization of several computers for the purpose of storing, retrieving, transmitting and finally manipulating information or data for any specific organization or business (Dahlstrom, Walker and Dziuban 2013). There are three distinct categories of information technologies, which are techniques to process, simulation of the high order thinking with computerized programs and a proper application of the mathematical or statistical methods for decision making. This information technology is the proper subset of the ICT or information and communications technology. The following report outlines a brief discussion on the case study of computer systems. The various details regarding the appropriate software would also be provided here.
1. Software for Basic Works and Description of the Functionality of Software
The most suitable and the best software required in this particular case study is the Microsoft Office. It is the family of client software, server software as well as services. It is responsible for doing all types of basic works that would be required for starting the new business (Dahlstrom and Bichsel 2014). The major functions of this software majorly include Microsoft Word, Microsoft PowerPoint and Microsoft Excel. There are multiple versions of this software and thus it is much effective for the users.
2. Business Meeting Software with its Functionalities
The business meeting software or the video conferencing software is responsible for facilitating the initiation and conducting of live conferences or business meetings within two or more participants at the various sites by simply utilizing the computer networks for the core purpose of transmitting audio, video and text data (Eason 2014). The productivity is increased by and the extra costs are eradicated. One of the most significant and important business meeting software for this particular case study is the Click Meeting. This particular software of Click Meeting is eventually a browser based, flexible as well as feature heavy platform for the web conferencing. It is a cloud software as a solution feature for dedicating within the business environment for the major purpose of meeting, collaborating and working online. Hence, this business meeting software of Click Meeting subsequently allows the busy professionals for hosting and running the online meetings or even the video conferences in the easiest manner (Bilbao-Osorio, Dutta and Lanvin 2013). This specific software needs absolutely no installation and even work on each and every device or operating system.
3. Programs that Protect Computer and Maintain Access Control
Protection of computers is extremely important and significant for any organization to protect their respective systems from any type of attack or vulnerability. The computer security is termed as the protection of the several computer based systems from any type of damage or theft to the software, hardware as well as the electronic data from the disruptions and misdirection of services, which are provided to them (Marchewka 2014). Due to the increased reliance on the computer systems, the connection of the Internet and even the wireless networks like Wi-Fi or wireless fidelity and Bluetooth have become extremely vulnerable for all users and hence these users undergo various issues and problems while using the software. This is majorly because of the growth of the smart devices such as smart televisions and smart phones and these various devices altogether constitute the IoT or Internet of Things (Holtshouse 2013). There are some of the most significant and important software programs that help in protecting the systems. These programs are responsible to protect the several organizational systems and the major programs are listed below:
The major and the most important software programs that help in proper access controlling are listed below:
Since, the user is starting a new business and computers are to be set properly, the systems are to be updated properly and regularly, so that the employees does not face any issue regarding hindering of work. This updating of software is extremely easier for all users. There are some of the major steps that are to be followed for this type of system updates on both Mac and Windows operating systems (Alwahaishi and Snásel 2013). These software updates are hence easily completed by relieving some of the valuable system resources. The major programs helpful in this case are:
The web browser is the respective software application that helps in accessing any type of information on the WWW or World Wide Web. Every individual image, web page or video is properly and uniquely identified by the specific URL. The browsers are enabled for retrieving and displaying them on the devices of the various users. The web browser is not the same as the search engine. The search engine eventually stores the searchable data; however about all other web sites (Wagner, Beimborn and Weitzel 2014). However, for the purpose of connecting or displaying these web sites on the various devices, the specified user requires to have the web browser installed here. The major feature of these web browsers are the innovative graphical interfaces that these web browsers comprise of. The most significant and suitable browsers for accessing the Internet facilities for this particular case study are listed below:
The storing of information is one of the most important and significant requirement for all organizations and businesses. As per the provided case study, since the user is starting a new business and new employees would be recruited; it is extremely vital to store the confidential and sensitive organizational information in such a manner that the employees or staffs could easily access them without any type of issue or problem (Schwalbe 2015). The first and the foremost format of this information storage procedure is to utilize clear as well as user focused language. When this information is being stored, such words should be uses, so that the employees are able to access the information easily and promptly. The next effective and efficient way to store the information for better access to the employees is by publicising alternative formats in easy to read version. An accessible information policy should be eventually developed as well as publicised for the users so that the communications are completed easily (Bloom et al. 2014). A proper evaluation of this policy is also required here.
Conclusion
Therefore, from the above discussion, conclusion can be drawn that the information technology is the proper utilization of any type of computer, storage, networking device, physical device, processes as well as infrastructures for the purpose of creating, processing, storing, securing and exchanging of every form of data. There are several layers of physical equipment or hardware, virtualization or management tools present here for performing the major functions. The above report has clearly outlined the various details regarding the case study of information technology. The significant details regarding the appropriate software and systems are provided here with recommendations.
References
Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications technology: a UTAUT and flow based theoretical model. Journal of technology management & innovation, 8(2), pp.61-73.
Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology report 2013. In World Economic Forum (pp. 1-383).
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), pp.2859-2885.
Brooks, D.C., 2016. ECAR study of undergraduate students and information technology (Vol. 4, No. 3, p. 2). 2016.
Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information Technology, 2014. Educause.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students and information technology (p. 2013). 2013.
Eason, K.D., 2014. Information technology and organisational change. CRC Press.
Holtshouse, D.K., 2013. Information technology for knowledge management. Springer Science & Business Media.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information technology and business units drives operational alignment and IT business value. Journal of Management Information Systems, 31(1), pp.241-272.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download