Free Essay

Information Technologies

In:

Submitted By sarfarazullah
Words 3059
Pages 13
INFORMATION TECHNOLOGY
ANS 1
Keyboard
Most common and very popular input device is keyboard. The keyboard helps in inputting the data to the computer. The layout of the keyboard is like that of traditional typewriter, although there are some additional keys provided for performing some additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now 104 keys or 108 keys keyboard is also available for Windows and Internet.
The keys are following Sr. No. | Keys | Description | 1 | Typing Keys | These keys include the letter keys (A-Z) and digits keys (0-9) which generally give same layout as that of typewriters. | 2 | Numeric Keypad | It is used to enter numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machine and calculators. | 3 | Function Keys | The twelve functions keys are present on the keyboard. These are arranged in a row along the top of the keyboard. Each function key has unique meaning and is used for some specific purpose. | 4 | Control keys | These keys provide cursor and screen control. It includes four directional arrow key. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc). | 5 | Special Purpose Keys | Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen. |

Mouse
Mouse is most popular Pointing device. It is a very famous cursor-control device. It is a small palm size box with a round ball at its base which senses the movement of mouse and sends corresponding signals to CPU on pressing the buttons.
Generally, it has two buttons called left and right button and scroll bar is present at the mid. Mouse can be used to control the position of cursor on screen, but it cannot be used to enter text into the computer.
ADVANTAGES
* Easy to use * Not very expensive * Moves the cursor faster than the arrow keys of keyboard.

ANS 2.
This type of memory is also known as external memory or non-volatile. It is slower than main memory. These are used for storing Data/Information permanently.CPU directly does not access these memories, instead they are accessed via input-output routines. Contents of secondary memories are first transferred to main memory and then CPU can access it. For example, disk, CD-ROM, DVD, etc.
A hard disk drive (HDD) is a data storage device used for storing and retrieving digital information using rapidly rotating disks coated with magnetic material. An HDD retains its data even when powered off. Data is read in a random-access manner, meaning individual blocks of data can be stored or retrieved in any order rather than sequentially. An HDD consists of one or more rigid rapidly rotating disks with magnetic heads arranged on a moving actuator arm to read and write data to the surfaces. A Hard Disk is divided into tracks and sectors, Data on this hard disk is positioned into these tracks and sectors so they can be easily read by the heads and also to help reduce fragmentation on the hard disk. Below are 2 diagrams depicting how a hard disk is divided into tracks and sectors. Data on a hard drive are accessed by two methods:
1. Fixed Head: Hard Disks with fixed heads have a read/write head for each track on the hard disk, since there is no moving of heads to access data, the data access time is generally faster for Fixed head Hard Drives.
2. Moving Head: A moving head hard disk is one in which one or more read-write heads are attached to a movable arm which allows each head to cover many tracks of information

Optical Disks
Optical disk is an electronic data storage medium from which data is read and written to by using a low-powered laser beam. It is flat, circular, plastic or glass disk on which data is stored in the form of light and dark pits. There are three basic types of optical disks: Read-only optical disks, Write once read many Optical disks and Rewritable Optical disks. Two main types of optical disks are:
CD - is an abbreviation of compact disk, and is a form of data storage that can transfer data up to the speed of 7800 KB/s. A standard 120 mm CD holds up to 700 MB of data, or about 70 minutes of audio. There are two types of CD: CD-ROM and CD-RW, CD-ROM are stands for CD-Read Only Memory and they function the same way Read Only Memory Does. CD-RW Stards for CD-Rewritable, these disks can be erased and rewritten at any time.

ANS 3
Internet protocols are various kinds of Online connections for various things on the internet. They assist within the retrieval, transfer, exchange and installing of files, or information on the web. Without these methods, the web wouldn’t be, as you may know it today because many browsers wouldn’t work with no permission of those methods. You will find various kinds of Internet protocols each serving another purpose. They are
1. Email transfer protocol
This Internet Protocols enables for that use and accessibility to email, it’s exactly what the publish office would be to letters. It includes three other methods which make transfer and access from the emails fundamental essentials simple mail transfer protocol (SMTP), the web message access protocol (IMAP) and also the Publish office protocol 3 (POP3). The IMAP and POP3 would be the methods where you can receive emails as the SMTP can be used when delivering emails to ensure the “transfer” part. These 3 methods take root in many browsers.
2. NNTP
This protocol can be used like a server of Usenet forums which are devoted to business forums which have different subjects of debate. These forums are divided to subjects, subjects or genres. This protocol provides a platform where they may be talked about and sights exchanged.
3. File retrieval methods
Because the title suggest, this methods permit you to retrieve information from the web to the pc or in the computer to the web. Though it’s now redundant, you could utilize it to see the files should you understood the title from the file or qualities about this.
4. FTP (File Transfer Protocol)
The file transfer protocol is really a protocol that enables you to definitely move one file out of your computer to a different on the web. You may also log onto a pc remotely and connect to the files inside it with authority in the other computer. This protocol also enables installing of programs from the web.
5. HTTP
This protocol enables web servers to exhibit and display all of the facets of a web page. They form part one of each and every website so that all webpages or website. This protocol causes it to be simple for the file transfer protocol to complete its work.

ANS 5 (PLEASE CHECK IN TEXT BOOK ONCE) 1. Select the worksheet that you want to protect. 2. On the Review tab, in the Changes group, click Allow Users to Edit Ranges.

NOTE This command is available only when the worksheet is not protected. 3. Do one of the following: * To add a new editable range, click New. * To modify an existing editable range, select it in the Ranges unlocked by a password when sheet is protected box, and then click Modify. * To delete an editable range, select it in the Ranges unlocked by a password when sheet is protectedbox, and then click Delete. 4. In the Title box, type the name for the range that you want to unlock. 5. In the Refers to cells box, type an equal sign (=), and then type the reference of the range that you want to unlock. 6. For password access, in the Range password box, type a password that allows access to the range. 7. For access permissions, click Permissions, and then click Add. 8. In the Enter the object names to select (examples) box, type the names of the users who you want to be able to edit the ranges. 9. Click OK. 10. To specify the type of permission for the user who you selected, in the Permissions box, select or clear theAllow or Deny check boxes, and then click Apply. 11. Click OK two times. 12. In the Allow Users to Edit Ranges dialog box, click Protect Sheet. 13. In the Allow all users of this worksheet to list, select the elements that you want users to be able to change. 14. In the Password to unprotect sheet box, type a password, click OK, and then retype the password to confirm it.

ANS 6
A.Slide Sorter in PowerPoint is a nice feature that allow us to make global changes to the PowerPoint presentation as well as reviewing the overall presentation with small slide thumbnails.
This Slide Sorter view can be very helpful for presenters or presentation designers who are completing the PowerPoint presentation design and need to do an overall check about how well or bad the final presentation will look. Although the slide sorter is also very useful in the middle of the presentation design process since allow you to see a global scope for your presentation and sort slides easily by dragging and dropping the slides.
Slide Sorter is available in PowerPoint 2007 and 2010 and you can access it by looking at the Viewtab.
In summary, slide sorter feature can be helpful for: * View all of your slides as small thumbnails or miniature images * Create animated transitions between slides with a global scope * Rearrange the order of the slides in your PowerPoint presentation * Rehearse and set the timings of slide timings in your presentation
This is one of the features that you can use in PowerPoint to organize your slides.
B. Design Template: The specific “look” of a slide or group of slides. A design template can be very basic - with black text on a white background - or it can be very colorful and complex. Typically, PowerPoint presentations have the same design template for all slides, although it is possible to select a different design template for each slide. Later, I’ll show you how to select different design templates.

ANS 7
A Firewalls : Access controls are common form of controls encountered in the boundary subsystem by restricting the use of system resources to authorize users, limiting the actions authorized users can take with these resources and ensuring that the users obtain only authentic system resources.
Current systems are designed to allow users to share their resources. This is done by having a single system simulate the operations of several systems, where each of the simulated system works as virtual machine allowing more efficient use of resources by lowering the idle capacity of the real system. Here, a major design problem is to ensure that each virtual system operates as if it were totally unaware of the operations of the other virtual systems. Besides increased scope exists for unintentional or deliberate damage to system resources / user.s actions. The route is resource sharing through virtual systems through need for isolation through need for access controls. Access controls associate with authentic users the resources, which the users are permitted to access and the action privileges, which the users have with reference to those resources.
It acts as a part of the operating system. Now a days, special systems or firewalls are used to protect network from an un-trusted one. In that effect it has a routing ability.
Firewall is a device that forms a barrier between a secure and an open environment when the latter environment is usually considered hostile, for example the Internet. It acts as a system or combination of systems that enforces a boundary between more that one networks. * Secures a computer network from hostile intrusions. * Firewalls can monitor and record information. This can be of value in determining who is accessing what type of information. * Firewalls can be used to complement or supplement content and email filtering solutions. * Firewalls can automatically block most email viruses and malwareattacks even before they start. * Firewalls can be set up to allow access for certain users to access certain information but prevent others from doing so. * Firewalls can also calculate usage of the internet, i.e. who spends most time using the internet and how this affects the performance of the network. * Some firewalls can cause constraints or bottlenecks on the network as they concentrate security in one area. * Organisations need to have a written policy or procedure that outlines what information can be accessed by employees and by whom. A firewall can be used to enforce these policies.

ANS 9
An information system is a collection of hardware, software, data, people and procedures that are designed to generate information that supports the day-to-day, short-range, and long-range activities of users in an organization. Information systems generally are classified into five categories: office information systems, transaction processing systems, management information systems, decision support systems, and expert systems. The following sections present each of these information systems.
1 Expert Systems
An expert system is an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision-making processes for those who have less expertise. Expert systems are composed of two main components: a knowledge base and inference rules. A knowledge base is the combined subject knowledge and experiences of the human experts. The inference rules are a set of logical judgments applied to the knowledge base each time a user describes a situation to the expert system.
Although expert systems can help decision-making at any level in an organization, nonmanagement employees are the primary users who utilize them to help with job-related decisions. Expert systems also successfully have resolved such diverse problems as diagnosing illnesses, searching for oil and making soup. Expert systems are one part of an exciting branch of computer science called artificial intelligence. Artificial intelligence (AI) is the application of human intelligence to computers. AI technology can sense your actions and, based on logical assumptions and prior experience, will take the appropriate action to complete the task. AI has a variety of capabilities, including speech recognition, logical reasoning, and creative responses. Experts predict that AI eventually will be incorporated into most computer systems and many individual software applications. Many word processing programs already include speech recognition.

2Decision Support Systems Transaction processing and management information systems provide information on a regular basis. Frequently, however, users need information not provided in these reports to help them make decisions. A sales manager, for example, might need to determine how high to set yearly sales quotas based on increased sales and lowered product costs. Decision support systems help provide information to support such decisions. A decision support system (DSS) is an information system designed to help users reach a decision when a decision-making situation arises. A variety of DSSs exist to help with a range of decisions. A decision support system uses data from internal and/or external sources. Internal sources of data might include sales, manufacturing, inventory, or financial data from an organization’s database. Data from external sources could include interest rates, population trends, and costs of new housing construction or raw material pricing. Users of a DSS, often managers, can manipulate the data used in the DSS to help with decisions. Some decision support systems include query language, statistical analysis capabilities, spreadsheets, and graphics that help you extract data and evaluate the results. Some decision support systems also include capabilities that allow you to create a model of the factors affecting a decision. A simple model for determining the best product price, for example, would include factors for the expected sales volume at each price level. With the model, you can ask what-if questions by changing one or more of the factors and viewing the projected results. Many people use application software packages to perform DSS functions. Using spreadsheet software, for example, you can complete simple modeling tasks or what-if scenarios

ANS 10
Human–computer interaction (HCI) involves the study, planning, and design of the interaction between people (users) and computers. It is often regarded as the intersection of computer science, behavioral sciences, design and several other fields of study.
Because human–computer interaction studies a human and a machine in conjunction, it draws from supporting knowledge on both the machine and the human side. On the machine side, techniques in computer graphics, operating systems,programming languages, and development environments are relevant. On the human side, communication theory, graphic and industrial design disciplines, linguistics, social sciences, cognitive psychology, and human factors such as computer user satisfaction are relevant. Engineering and design methods are also relevant. Due to the multidisciplinary nature of HCI, people with different backgrounds contribute to its success. HCI is also sometimes referred to as man–machine interaction (MMI) or computer–human interaction (CHI).
Attention to human-machine interaction is important because poorly designed human-machine interfaces can lead to many unexpected problems. A classic example of this is the Three Mile Island accident, a nuclear meltdown accident, where investigations concluded that the design of the human–machine interface was at least partially responsible for the disaster.[3][4][5] Similarly, accidents in aviation have resulted from manufacturers' decisions to use non-standard flight instrument and/or throttle quadrant layouts: even though the new designs were proposed to be superior in regards to basic human–machine interaction, pilots had already ingrained the "standard" layout and thus the conceptually good idea actually had undesirable results.
HCI (Human Computer Interaction) aims to improve the interactions between users and computers by making computers more usable and receptive to users' needs. Specifically, HCI has interests in: * methodologies and processes for designing interfaces (i.e., given a task and a class of users, design the best possible interface within given constraints, optimizing for a desired property such as learnability or efficiency of use) * methods for implementing interfaces (e.g. software toolkits and libraries; efficient algorithms) * techniques for evaluating and comparing interfaces * developing new interfaces and interaction techniques * developing descriptive and predictive models and theories of interaction

Similar Documents

Premium Essay

Information Technology

...Information & Communications Technology Research Proposal Name: Institution Affiliation: Background There has been developing awareness that the power information technology and computing. This must be, and can be, amplified past its customary client base to achieve individuals who up to this point have not had an entry to such innovation. Being digitally joined has gotten to be continually basic to economic, instructive, and social headway. The objective of this exploration subsidizing activity is to create new information that will help stretch the capacities of figuring engineering better to serve social and economic difficulties of underserved groups, both provincial and urban. The expression Data and Communication Technology for Development are likewise utilized as a part of the scholarly research group to depict this same objective. Information and Communication Technologies must be moderate, available, and important. Novel methodologies in figuring engineering have the potential for the extraordinary effect in a scope of regions, including instruction, human services, and economic improvement. The significance that exploration projects can have around there is noteworthy since there are troublesome mechanical issues to be unraveled to understand that vision. For example, work in last-mile organizing bases, making instinctive client interfaces, creating ease processing gadgets and making applicable applications in regions (Werthner, 2009). Research Purpose ...

Words: 988 - Pages: 4

Premium Essay

Information Technology

...Information Technology (IT) Information Technology (IT) Information technology, in the first instance, brings to us the latest developments in science, technology and the arts in the advanced world. We can make use of the latest techniques and methods in the sciences and the arts within the four corners of our buildings. We can communicate with anyone anywhere in the world and send him messages in a jiffy. The e-mail has made it possible to send any amount of information to any place in a few seconds. The receiver of the information can at once send back the reply or his own information. Talk on programmes like hotmail messenger or yahoo messenger, along with the display of the talkers on the screen, gives a direct personal touch to the exchange of information and ideas. Information technology has, in effect, reduced distance completely between parties sitting in continents separated by the high seas and immeasurable skies. Computer technology can help us to bring about social, political and economic revolution in the country. We can make a complete study of the different social, political and economic systems in the most successful countries. The past, present and possible future of these countries and societies can be studied through computer records, films and programmes.4essay.blogspot.com Computer technology can be used to collect information about the different classes and groups of the people in the country. A thorough study of their educational, professional and social...

Words: 461 - Pages: 2

Premium Essay

Information Technology

...Chapter 1 1. How can information technology support a company’s business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer. The term information technology refers to the various hardware, software, networking, and data management parts that are a necessity for the system to function (pg. 8). Businesses regularly utilize computer-based information systems in order to record customer purchases, keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends. Without the support of information technology, businesses would ultimately fall apart. For example if a business did not choose to use computer-based information systems, they wouldn't be able to evaluate what items were selling better than others and ultimately lose valuable information for future success. Information technology can also aid in decision making for a business. Decisions are made based on analysis provided by computer-based information systems. For example a store manager may make the decision whether to discontinue an item for sale or keep it on the floor due to analysis of sales trends provided by computer-based systems. Lastly information technology helps business gain a competitive advantage. A competitive advantage is gained through computer-based information systems by applying innovative application of information technologies (pg. 9). For example a store manager installing touch screen kiosks throughout the organization...

Words: 1404 - Pages: 6

Premium Essay

Information Technology

...Information technology affects almost every aspect of the business world in today’s modern society. Within a matter of decades both internal and external processes have been transformed. For example, managers no longer handwrite reports for their office staff to type or use mail to correspond with clients or post flyers to communicate with employees. My department at Princeton University has experienced these types’of scenarios over the past five years. Five years ago, our procedures and computers systems were antiquated. The need for technology was essential to provide better communication and improve procedures, especially in a department that has over 200 employees who work in different locations throughout the University such as dorms, academic buildings, and athletic facilities. For instance, my department’s time-off request procedure and the process by which supervisors receive their daily work orders were lengthy, required several steps, and needed to be modernized. Realizing how outdated these procedures were, my department sought out several different types of technology to help improve its overall functionality. Technology acquired included, Sharepoint, Ipads, and EZ Maxmobile App. In just a short period of time, these products have significantly improved communication and procedures throughout the department and enhanced our customer service to our clients. The use of Sharepoint, a web-based intranet that streamlines the management of and access to data,...

Words: 416 - Pages: 2

Premium Essay

Role of Information Technology

...International Journal of Information Science and Technology THE ROLE AND EFFECT OF INFORMATION TECHNOLOGY IN THE CREATION AND MAINTENANCE OF SUSTAINABLE COMPETITIVE ADVANTAGE A. Talebnejad[1] Faculty of Management and Accounting Shahid Beheshti University Email: taleb149@yahoo.com Abstract -By the appropriate use of information technology, organizations can achieve sustainable competitive advantages. This technology because of including some characteristics such as being up-to-date, fast and precise and having different geographic localities all the time, has improved organizational efficiency, effectiveness and performance. In this article, we intend to investigate the role and effect of information technology in the creation and maintenance of sustainable competitive advantages from two different approaches: market-based approach and the resource-based approach. In the Market-based approach, meeting customer's and creating values for them, using information technology and the issue of achieving the competitive advantage and position in the market by organizations are addressed. In the resource-based approach, compatibility of the organization's resources such as those of information technology and organizational skills, particularly managerial ones are investigated. Amongst different organizational skills and resources, only managerial skills of information technology can create a sustainable competitive advantage. Keywords: Information Technology, Sustainable Competitive...

Words: 4885 - Pages: 20

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s...

Words: 529 - Pages: 3

Premium Essay

Information Technology Tool

...partner in a new business, one of your roles is to review information technology tools available to assist you in a certain aspect of your business (e.g., marketing, accounting, sales, quality assurance). Select a technology that emerged within the last five years and consider its impact on your business. Make a decision on whether to adopt this technology. B. Information Technology Tools 1. How technology helps business grow * SBA. (December 13, 2010).New Technology Guide Helps Entrepreneurs Grow Their Small Businesses and Create Jobs. Retrieved April 10, 2012 from, http://archive.sba.gov/idc/groups/public/documents/sba_homepage/news_release_10-71.pdf * Smart Business Information Technology. (2012). Information technology aids in business growth. Retrieved April 10, 2012 from, http://bizitc.com/performance/information-technology-aids-in-business-growth/ * SBA. (2012). New technology guide helps entrepreneurs grow their small businesses and create jobs. Retrieved April 10, 2012 from, http://www.asbdc.org/Library/SBA%20Technology%20Guide.pdf * Entrepreneurs’ Organization. (2012). How I leveraged technology to grow my business. Retreived April 10, 2012 from, http://www.eonetwork.org/knowledgebase/specialfeatures/Pages/HowILeveragedTechnologytoGrowMyBusiness.aspx 2. How technology lessens the geographical gap between countries * Net Industries. (2012). The international gap in technology. Retrieved April 10, 2012 from, http://education.stateuniversity...

Words: 2563 - Pages: 11

Free Essay

Information Technology Acts

...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate  (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people will...

Words: 467 - Pages: 2

Premium Essay

Information Technology in Business

...Riordan Manufacturing business chose to outsource their information technology (IT) systems and services for a variety of reasons. This choice carries with it some obvious benefits and some often not so obvious risks. Companies choosing to outsource IT must weigh the benefits and risks carefully, take measures to attenuate the associated risks and prepare their employees for the change by launching a campaign about the benefits of outsourcing. The risks involved with outsourcing mainly involve accessibility to service. According to Applegate (1995), if you rely on an outside contractor who generally has to come onsite to support your network, then [consider removing "then"] you live in a world where you simply hope critical services don’t [Contractions are inappropriate in academic writing--write it out] go down at a time when your ability to conduct business will be interrupted. Busy IT contractors may take days before they can come in to help, and this will likely be unacceptable if the problem is making it impossible for your staff to work. All the money saved by using a pay-as-you-go contractor can be lost with one serious issue within your network. With remote IT support such as managed services, some business owners are uncomfortable with having less personal touch and immediate feedback. When you have your own network administrator onsite, you can call them into your office and get a report or have questions answered. A remote based service will never be able to match...

Words: 991 - Pages: 4

Premium Essay

Communication and Information Technology

...Communication and Information Technology Latasha Wright HCS/320 June 18, 2012 Patricia Bird Communication and Information Technology Communication and information technology is frequently used as way to deliver effective communication messages. Many standard organizations such as hospitals and medical facilities continue to find ways to implement and improve communication channels. For these reasons, the use of e-mail communication in the hospital setting should be used as a way to enhance communication and information technology. First, I will explain how efficient and effective e-mail communication improves hospitals’ communication between personnel and patients. Because implementing new forms of technology comes with some advantages and disadvantages; I will discuss the incentives and drawbacks as well as its influences on consumers. Next I will explain the short and long-term financial impact that e-mail communication has on organizations. Then, I will provide technical improvements with e-mail communication in the future and why. Last, I will make necessary recommendations to improve e-mail communication in the hospital environment. My hope is that this essay will provide a better understanding about the use of e-mail communication and how organizations can benefit from its use. Efficient and Effective A popular form of communication, e-mail communication, is both efficient and effective for organizational use. E-mail communication is said to...

Words: 1070 - Pages: 5

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Premium Essay

Communication and Information Technology

...Communication and Information Technology HCS/320 January 28, 2012 Dr. B Communication and Information Technology Communication has been a key element in the health care field for many years. A patient communicates to the physician what is wrong with them, the physician communicates with the nurse what is to be done, and the information is entered into the patient file. The medical biller then bills the insurance or patient by sending an electronic claim, and the payer sends back a statement of payment. All this is considered communication. Over the years technology has advanced and the ways these communications have been used have changed. Now communication is done electronically, sent by email and even text message; there is even a way to teleconference over video phone with a patient or physician. After researching new technology I found Vocera, a communication system that makes communicating between team members faster and easier. The system uses a hand held device as well as a computer based program to communicate messages even alerts to get in touch with team members. The voice activated hand held device is the size of a cell phone and is typically hung around the neck. The hand held voice activated device can be used to call another team member, or can be used to access a paging system in case of emergency situations. Physicians can use the device to turn on their status, such as on call or on lunch break. When the computer based program is accessed by a nurse looking...

Words: 777 - Pages: 4

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become increasingly...

Words: 556 - Pages: 3

Premium Essay

Information Technology Agenda

...IT Agenda 1 IT Agenda and Organizational Strategies HCI 510 November 19, 2012 Mr. Lee Edwards IT Agenda 2 To achieve success in this information economy, IT is a critical facet of any organization. IT goals exists to help organizational leaders understand why IT goals must align with those of the business, how IT delivers value, and how its performance is measured, its resources properly allocated and its risks mitigated. In this paper, I will be discussing the relationship between the IT Department and organizational strategies, along with strategies that make an effective IT Department. Effective organizational strategies should be looked at like a wheel. It comprises five components: Leadership, Decision-making and structure, People, Work processes and systems and of course, culture. Leadership comprises a clear vision and priorities and a cohesive leadership team. The decision making portion makes up clear roles and accountabilities for decisions and an organizational structure that supports objectives. The people portion of the wheel includes organizational and individual talents necessary for success, and performance measures and incentives aligned with objectives. Work processes and systems encompass superior execution of pragmatic work processes and effective and efficient support processes and systems. And, finally the last portion is the organization culture. The culture covers high performance values and behaviors and a...

Words: 867 - Pages: 4

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology...

Words: 994 - Pages: 4