Premium Essay

Information Tecnology

In:

Submitted By Tamia
Words 2374
Pages 10
INFORMATION TEACHNOLOGY PROJECT. TERMS ASSOCIATED WITH THE INTERNET.

A. E-MAIL: Also known as Electronic Mail, an E-mail is a system for sending messages from one individual to another via telecommunication links between computers or terminals using dedicated software.
ADVANTAGE- Emails are fast. They are delivered at once around the world. No other form of written communication is as fast as an email.
DISADVANTAGE- Emails may carry viruses. These are small programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world.

B. NEWSGROUP: A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups. ADVANTAGE- It is also easier to find a newsgroup, and they sometimes have a moderator, who is someone who makes sure that things stay on track and do not disintegrate into something that is socially unpleasant.
DISADVANTAGE- A newsgroup is not as quick as an email or even a mailing list. Very often there will be a delay of at least a day, often longer, before a response is given. C. IRC: Internet Relay Chat (IRC) is an application layer protocol that facilitates the transfer of messages in the form of text. The chat process works on a client/server networking model. IRC clients are computer programs that a user can install on their system. ADVANTAGE- IRC's channel paradigm is very flexible and robust: allows for real- time discussion with up to hundreds of people at once.

Similar Documents

Premium Essay

Information Tecnology Milstones

...University of Phoenix Material Information Technology Milestones Worksheet Complete the chart below. Include a minimum of 10 information technology milestones or events that impacted human services. |Year |Milestone or Event |Impact on Human Services | |1996 |Amber Alerts |Provides an online integrated national database for missing children | | | |Initiates a widespread alert when a child goes missing | |1965-1970 |Decision Support System |This system integrates organizational skills and human services to provide better | | | |service to clients. | | | |By integrating organization in human services, it has become easy to diagnose | | | |problems and find faster solutions to the client’s issues. | |1972 |Electronic medical filing |By filing the client’s records online it is easier to access them and they have less| | |system |errors. | | | |Nurses and...

Words: 355 - Pages: 2

Premium Essay

Information Tecnology

...Lab#1 Questions DeAundre Graves 4/9/2014 Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM (VM Name: “WindowsTarget01”) and identify whether that application starts as a service on the system or must be run manually? A.FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N |. 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP? default gateway router? A. a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? A. Yes, 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-replies vary? A. The TTL on Windows was 128 while on Ubuntu the TTL was 64 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? A. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular scans. A. Ping Scan ...

Words: 407 - Pages: 2

Premium Essay

Advance Information Tecnology

...Advanced Information Management and Application of Technology Maydene A Huie Western Governors University Proposal for a New Information Management System to Implement Meaningful Use Interdisciplinary Committee Team Members Implementing a new information management system for a 100 bed hospital to bring them into compliance with Meaningful Use Legislation, requires the expertise of different disciplines within the hospital. For this hospital the team will consist of myself, a Clinical Nurse Specialist with a Post-Masters Nursing Informatics Certificate, Health Information Management (HIM) Specialist, in charge of medical records, and ensuring regulatory compliance, Information Technology (IT) Specialist who is knowledgeable in computer software and hardware, Physician who is a the Medical director with extensive experience with electronic medical charting, Pharmacy Director who is a pharmacist with EMR and PYSIX experience and , Chief Financial Officer to manage the budget, and the Director of staff development who is a Mastered prepared RN with EMR experience and is in charge of staff education. The HIM Specialist is chosen because of his experience with health information management, regulatory compliance and HIPAA. This knowledge is vital for implementing this system to ensure that the EMR chosen will meet the criteria for the stages of Meaningful Use. The IT Specialist is chosen for his knowledge of computer hardware and software and will be instrumental in the...

Words: 2381 - Pages: 10

Premium Essay

Role of Information Tecnology on Banglalink

...The role of Information Technology on Banglalink Submitted by Mahmud Hasan Ghani ID NO: 09535046 Program: EMBA Batch: 52 Group: F [pic] Submitted to Md. Shahadat Hossain Lecturer, School of Business, University of Information Technology & Science Letter of Submission 13th August, 2010 Md. Shahadat Hossain Lecturer, School Of Business, University of Information Technology & Science. Sub: Submission of term paper Dear Sir, It is my great pleasure to submit my term paper on the topic “The role of Information Technology on BANGLALINK “ as a part of my course code MBA-501 under the MBA program. I have prepared this term paper, as a fulfillment of the course requirement of my EMBA program. To make the term paper up to the standard, I have tried my level best to fulfill the requirements. I hope that this will help me in my future practical life. I believe that you will accept my work and it would be great pleasure that if you review my work cordially. I also believe that this report will be able to fulfill your expectation. Sincerely Yours, Mahmud Hasan Ghani ID NO: 09535046 Batch: 52 Group: F Contents Letter of Submission …………………………………………………………………………1 Table of Contents …………………………………………………………………………….2 Acknowledgement ……………………………………………………………………………3 Abstract ……………………………………………………………………………………….4 1. Introduction.………………………………………………………………………………5-7 ...

Words: 5107 - Pages: 21

Free Essay

Information Flow Within an Organization

...Information Flow in an Organization , information is created for meaning, decision making and sharing of knowledge. Just like a river flowing information flows from one place to another, into every house, school or organization. The flow begins with the creation of the data at a terminal; this is the beginning of the information flow. From there the information flows down the pipeline through the network which is like a pipeline. Within this network of pipes you have the switching and routing of the information flow, like the valves used to push water from one location to another. From there the information flows to storage facilities like large storage facilities, these facilities in a data network are the servers, mainframes are used in conjunction with software to store, collate, and share the data just waiting to be accessed and shared. Once a person turns on the faucet or access the information the flow starts again, from the storage facility to another set of switches/routers or valves. This information is accessed like getting a drink of water. Information flow within an organization is an ever evolving process; it is circular in nature according to its activities. Chesapeake Energy’s information flow starts with the design of the information network or pipeline, network circuits include cell modems, T1 and fiber circuits. From here the routers and switches are put in place to send the information to the right storage facility or server. Software is created to determine...

Words: 729 - Pages: 3

Premium Essay

Communication Self Assessment

...Home Page »Business and Management Communications Self-Assessment In: Business and Management Communications Self-Assessment Communication style can be summed up as, the way one is perceived by others vs. how one perceives themselves and the way one interacts with others. The text “Interpersonal skills in Organizations” talks about how behaviour, personality and attitude are key factors in determining communication style. Before reading chapter 1 of the above text, I would have said that my communication skills could be heavily worked on. I am generally very shy and nervous when it comes to talking to people I don’t know and am worried about what others will think about my own thoughts and ideas. Although I am very open to others ideas and am able to see how one idea would work the same as another would, I tend to be afraid of how one might take my own interpretation. After reading the text and doing exercise 1-A and 1-B I realised that my self- evaluation of myself was not far off at all. Scoring moderately in “emotional stability” and “extroversion” shows that, although I am rather shy I am also able to work with others, even if I prefer to do solo work and am well rounded when it comes to my opinions and the options of others. My high ratings in “open to experience” and “agreeableness,” back up my theory that I am much more reserved, although I like to learn new things and look at situations from many perspectives. Having a more low or “flexible” score in “conscientiousness”...

Words: 376 - Pages: 2

Premium Essay

Check Point Information System Business Problem Dimensions

...are lack of training, difficulties of evaluating performance, compliance, work environment, lack of overall company support, indecisive and poor management. In order to have a successful business, I believe that finding solutions to these problems will improve the practice is important. What I have seen in the company I work for now is not everyone is vested in the tasks at hand so the attitudes of some people are poor. If the company can get involvement and interest in the Information System by all members of the company that will eliminate some of the problems and possible create ideas on how to financial fund a good system. 2. What is the difference between IT and information systems? Describe some functions of the information system. Information Technology or IT is the actually hardware and the software that is used for the information system that is utilized by a company. This includes everything from the computer to MS Office applications that will increase the productivity of staff. Information systems can be described as a link that brings people, business data, and computers together. Some of the functions that are noted in the text are the...

Words: 387 - Pages: 2

Free Essay

Communication Plan

...Monthly Status Meeting | -Will be face-to-face or conference call-Report the status to upper management-Well occur monthly | Monthly Reports Meeting | -Channel will be thru email, fax, or memos-Will go over reports such as; cost, issues, and progress | 2. Identify the potential barriers to effective communication and strategies for overcoming the barriers. Potential Communication Barriers | Strategies to Overcoming Barriers | Information Overload | -Listed above are a lot of meetings and employees will get overwhelmed with information that is important? - A solution for this is to have an employee take notes for each department and send them in an email for referencing. | Communication Apprehension | -Some employees may not be comfortable in a face-to-face or with written information. -A solution for this barrier would be to have a mixture of face-to-face, conference calls, and emails. This will allow for everyone to communicate their thoughts and ideas. | Filtering Information | -There will be employees that will filter information to fit the needs of the organization or team.-This will be minimized by reviewing data monthly and holding everyone accountable for their work.-Also keeping...

Words: 389 - Pages: 2

Premium Essay

Chip Positioning

...A Potato Chip Brand Positioning Exercise Frito-Lay, a division of PepsiCo, based in Dallas, Texas, plans to reposition its brand. You, as the marketing director, are responsible for such endeavour. Please present your plan. To facilitate your analysis, the results of the attitudinal survey based on an assumed representative sample of 30 kids has been stored in sheet Chip Preference.xls. These data consists of observations on the following four variables: Crunchy: Crunchiness perception (1-5 scale: 1=Low and 5=High) Salty: Saltiness perception (1-5 scale: 1=Low and 5=High Fun: Fun of eating perception (1-5 scale: 1=Low and 5=High Brand: Index of company brand (1=Brand 1, 2=Brand 2) Pref: Overall preference (1-5 scale: 1=Low and 5=High) a) First use the data to establish the relative importance and significance of each perceptual variable in explaining overall brand preference. Which two variables are the most important? (Explain). b) Develop a perceptual map by plotting the mean perceptions for both Brand 1 and Brand 2 on a two-dimensional map defined by the two independent variables found most important in your analysis in a) above). c) It is known that the Ideal point has average coordinates of 3 and 5 on the dimensions of Crunchiness and Fun of Eating respectively. Based on the ideal point perceptual values, which brand (Brand 1 or Brand 2) is closest to consumer Ideal perceptions? d) Based on your analysis, suggest how you would...

Words: 277 - Pages: 2

Premium Essay

Ups Information System

...Case summary: UPS has created its own information system with Delivery Information Acquisition Device (DIAD) and Web-based Post-Sales Order Management System (OMS) globally by using developed information technology. These special systems help the company to reduce the cost of transaction greatly. By building its efficient order information management system, UPS can make optimal routing strategy, place orders online, and track shipments to meet customer needs. These information systems guarantee the possibility of two-day delivery nationwide as well as lower warehousing and inventory costs for the company. Questions: 1. What are the inputs, processing and outputs of UPS’s package tracking system? Inputs: the inputs include package information, customer signatures, pickups, delivery and timecard information, and locations on each route. Processing: in the process of transactions, the data is transmitted to the information center and stored for retrieval. During the whole process, the data of shipped packages is available to be checked by drivers and tracked by customers. Outputs: mostly the same data as the inputs, including pickups, delivery times, locations of routes and package recipients. In addition, the outputs also include calculations of shipping rates to enable UPS customers to embed UPS functions, such as cost calculations, to their own websites. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? Technologies include...

Words: 494 - Pages: 2

Free Essay

3rai

...Protection Act controls how your personal information is used by organisations, business or the government. Everyone who is responsible for using data has to follow strict rules called ‘data protection principals’. They must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: * ethnic background * political opinions * religious beliefs * health * sexual health * criminal records Source: https://www.gov.uk/data-protection/the-data-protection-act Freedom of Information Act 2000 The Freedom of Information Act gives you a wide-ranging right to see all kinds of information held by the government and public authorities. You can use the Act to find out about a problem affecting your local community and to check whether an authority is doing enough to deal with it; to see how effective a policy has been; to find out about the authorities spending; to check whether an authority is doing what it says and to learn more about reasonable decisions. Authorities will only be able to withhold information if an exemption in the Act allows them...

Words: 572 - Pages: 3

Premium Essay

Perception

...Perception The literal meaning of perception is ‘Perception is the organization, identification, and interpretation of sensory information in order to fabricate a mental representation’. The best personal encounter I had was between my newly appointed Manager & Team Lead. We used to take daily calls with our client for gathering the requirement for a new banking project. Their followed a systematic way of approach towards gathering, analyzing, and constantly discussing on the issues at hand and finally documenting and getting a written sign off on the requirement. This process was to be completed in a span of 3 months. Around the third month, the client started pushing and rushing with more requirements and there was less time to already accommodate the existing assignments at hand and on top more was coming in. As the manager was new to the project and he also wanted to establish himself, he compromised employees excessive workload by accepting and saying ‘Yes’ to whatever the client was demanding. He missed the fact that he can’t infer or perceive even without knowing what the employees had difficulties about. And secondly all this were falling into a process where the Quality of output was being compromised. The process was falling apart, then my Team Lead stepped in and had a discussion about this with the manger and made him realize that saying ‘yes’ to all what client is saying would further aggravate the issue. Accepting the requirement now and unable to cater...

Words: 366 - Pages: 2

Free Essay

Business

...and demerits. The investigator has to choose a particular method to collect the information. The choice to a large extent depends on the preliminaries to data collection some of the commonly used methods are discussed below. 1. Direct Personal observation: This is a very general method of collecting primary data. Here the investigator directly contacts the informants, solicits their cooperation and enumerates the data. The information are collected by direct personal interviews. The novelty of this method is its simplicity. It is neither difficult for the enumerator nor the informants. Because both are present at the spot of data collection. This method provides most accurate information as the investigator collects them personally. But as the investigator alone is involved in the process, his personal bias may influence the accuracy of the data. So it is necessary that the investigator should be honest, unbiased and experienced. In such cases the data collected may be fairly accurate. However, the method is quite costly and time-consuming. So the method should be used when the scope of enquiry is small. 2. Indirect Oral Interviews : This is an indirect method of collecting primary data. Here information are not collected directly from the source but by interviewing persons closely related with the problem. This method is applied to apprehend culprits in case of theft, murder etc. The informations relating to one's personal life...

Words: 1115 - Pages: 5

Premium Essay

Transforming Data Into Information

...into Information What is Data? What is information? Data is facts; numbers; statistics; readings from a device or machine. It depends on what the context is. Data is what is used to make up information. Information could be considered to be the same characteristics I just described as data. In the context of transforming data into information, you could assume data is needed to produce information. So information there for is the meaningful translation of a set of or clusters of data that’s produces an output of meaningful information. So data is a bunch of meaningless pieces of information that needs to be composed; analyzed; formed; and so forth to form a meaningful piece of information. Transforming Data Let’s pick a context such as computer programming. You need pieces of data to be structured and formed into something that will result in an output of something; a message, a graph, or a process, in which a machine can perform some sort of action. Well now we could say that information is used to make a product, make a computer produce something, or present statistical information. That would be the output of that data. The data would be numbers, words, or symbols. The information would be a message, a graph, or a process, in which a machine can perform some sort of action. Information Information could be looked at as data as well. Let’s say we need a chart showing the cost of a business expenses in relation to employee salaries. The data for showing the information is...

Words: 315 - Pages: 2

Premium Essay

Petrie's Electronic Week 3

...Petrie's Electronics Case, Chapter 5, Questions 1, 3, and 5. 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Jim collected informations by having interviews inside the company with stakeholders. He also worked with the marketing department to get some information from loyal customers. Jim and his team gathered some information about the current system. 3. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach could be researching many different sources. If it were me I would do my research through the internet and compare what I find to the current system used by the customers. I guess the obvious reason to know when you are done is because you can’t find or come up with any new information about the loyalty systems. 5. Why shouldn’t Petrie’s staff build their own unique system in-house? I think it would cost much more and will be much more time consuming. The better thing to do is use an outsource instead of building in-house, that way they are saving money and getting what they want a lot faster. Petrie's Electronics Case, Chapter 6, Questions 1 and 5 1. Are the DFDs in PE Figures 6-1 and 6-2 balanced? Show that they are, or are not. If they are not balanced, how can they be fixed? It looks like they are balanced...

Words: 338 - Pages: 2