Short Paper-Jamika

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

IT 505

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by CaptainMusic12916

Jamika Needom Short Paper: Roles of Core Technologies in an Effective IT System IT 505 Prof. Allyson Heisey September 19, 2023
Abstract The roles of core technologies in an effective IT system help drive the operations of a successful business. From the end-users to the internal development of the products needed, each plays an integral role in having effective IT systems that support all. This short paper will explain how the five core technologies serve significance to subspecialties in IT. Computer Programming and Computer Programs Computer programming is the structure of building and composing computer programs. Programming is the initial step in the development of an application. Some may call programming the backend of a technology that drives the computer software or programs. Developers write programs that drive the website's front end, such as visuals, scripts, and user experiences. Computer programs are technological software that supports functions in information technology. A computer program is a particular kind of technology that is used to direct the use of computer navigation. Computer programs such as Microsoft Windows, Apple IOS, and many others help complete the tasks a user needs for everyday technology use cases. For example, Outlook, a Microsoft email program, allows users to schedule and send emails, create virtual meetings, and schedule tasks by integrating with internal calendars. Computer Networks Computer networks are a system that connects various technologies, such as computers, printers, servers, and even phones. Computer networks allow multiple technologies to communicate with one another. Different types of computer networks serve other purposes. LAN and PAN are computer networks that provide a source to connect to various computers or digital
devices. LAN (Local Area Network) is a series of computers connected within a small vicinity such as an office. LAN connections connect computers through ethernet cables that integrate into a more extensive database that drives the connection. PAN (Personal Area Network) combines technologies within a short range. These connections can include computers to wireless printers, cell phones to Bluetooth headphones, and phones to TVs. Databases A database management system controls databases. Database management systems manage the design and data security, system language, and database-to-user integration. "A database system (DBS) is a computerized record-keeping system with the overall purpose of maintaining information and making it available whenever required. The database typically stores related data in a computer system" (Foster et al., 2016, pg. 3). Databases can store user data from applications that allow a company to build profiles on users. Some technologies that rely on databases are operating systems, desktop systems, or information systems. Information Assurance With the increased risk of data breaches and hacking, information assurance must be essential for any company storing data quantity.   Information assurance helps protect consumer data through federal, state, and local laws. Whether using a secured sign-on, digital keys, authenticators, and data security soft/malware, each plays an essential part in ensuring data. When we think about the banking security breaches that subjected millions to having their data accessible to the public, citizens sued banks as it violated federal laws of safeguarding their data. Information assurance must abide by rules that not only protect the consumer but they
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help