.

Saturday, March 2, 2019

How ICT requirements are met in an organisation Essay

Re behavior B How ICT get hold ofments atomic round 18 met in an organisation Before Haden was introduced ICT, everything was by means of by hand. This took longer and was non a reliable method of touch information. Haden has umpteen surgical incisions and altogether they exhaust many estimators. I am breathing out to only analyse one of those departments beca handling doing the whole building with the number of computers forget be ridiculous. The department I will be analysing is the bosh department. This department deals with all the passel drillting benefit fraud. They field of study with the police to get those people in court.The Fraud department found it hard to cope without computers. When the computers were introduced everything was easy. Everything call for ICT. In the Fraud department thither ar 45 computers. here(predicate) atomic number 18 the specifications of the hardw ar. Hardware Input turns Keyboard- in that respect is 40 standard QWERTY keyboa rds and 5 ergonomic keyboards. Ergonomic keyboards are QWERTY but the layout is different. The keyboards yoke by PS/2 port. Mice- There is 45 standard mice. These come as oversight on all the computers. The mice connect too connect through PS/2 port.Digital Cameras- These cameras are blinds that freighterister take photos or locomote images (films) and transfer them on to a PC. The images are JPEG, GIF, UGA, UFO or PSO. There are a total of 4 cameras in the department. The digital cameras connect to the via USB port. Scanners- There is 2 scanners in the department and they also transfer images to the computer. They work manage photocopier but can transfer the images to a PC. This device also connects through USB port. Web Cams- The nett cams are employ to project moving images on to the internet.Only 7 computers have these and they are only used for handling confidential documents. The web cams connect to the computers by the USB port. The web cams are used for personal u se. Well, thats what I view An input device is something that transfers knifelike data into a computer for it to be processed. These can complicate images and certainty from fraud suspects. Output devices Monitors- There is 45 monitors. 5 planar screen monitors, also know as LCD (liquid crystal dis chance) screens and the lie are standard default monitors which are CRT (cathode ray tube) monitors.The monitors connect through the serial port. Colour stainer- The colour printers are used to print documents with Hadens header on them. The colour makes it more professional. The printers connect through the LPT or parallel port. These are the briny output devices. They take raw information/data and give it back to us processed. Every computer has many different specifications inside and outside. The computers are all the same so it will be easy to describe them. Below are the specifications. Compaq Deskpro 40 GB Hard drive CD/CD-RW push back Floppy promote Zip Drive 512 mb DDR R AM64 mb DDR Geforce 4 graphics card Creative soundcard Ethernet Card Modem port 4 USB 2. 0 ports 2 serial ports 2 LPT/parallel ports 2 Fire wire ports 2 PS/2 ports 1 game pad port 1 Network port The hard drives are big so that a lot of data can be stored. But there is a d birthfall to that. It is easier for files to get lost and the file tribute is non dandy. The RAM is a ridiculously big(p). It seems like the computers are made to play games and not do work. This also applies for the graphics card. It also has a large card memory. Most of it is wasted because it is not being used.The department can save a lot of money they had computers which are a microchip lower on the specifications. (RAM, Graphics card etc) As all the computers are same, it is easy for me to describe only one of the computers specifications because they have the same specifications like the opposite computers in the department. There is a large legion for the department. The server is very fast and quic k. Below are the server specifications. Intel Pentium 4 M 3. 0 GHz processor memory 1024 mb DDR RAM cxx GB Hard drive Tape drive CD/CD-RW Drive Floppy Drive All the computers are Compaq brand.They are reliable and respectable to use. Software The computers have different software installed on their hard drives. The computers are new. They have Microsoft Office 2002 installed on their hard drive. They also have other programs like anti-virus. Microsoft Word- This is the default word processing drill. It is easy to use and it has many features like recording macros and inserting pictures. Microsoft Excel- This covering is installed on the system but it is not used often. It may be used to do calculations for wages and salaries. I am not very sure what it is used for in this department.Microsoft Access- This application is not used. Database- Haden have there own database. It is very complicated to use their database. It comes up as a black screen with white writing. some like MS- DOS on old computers. The database holds information of people that have benefits and that commit fraud. You have to be trained to use the database because it is so complicated. This is what I think are in the databases Name, address, post code, county, age, gender, contact details, national indemnity number etc. Outlook Express- Easy to use and is fast for sending and receiving information.The e-mail is not for personal use. The companies boss can other employees can bring the personal e-mails. Information is not confidential so it is a great and fast method of transferring data. Internet Explorer is used to surf the web for web related fraud. The internet has a special tracking device that seeks out people using other peoples insurance numbers and other details to get money. Intranet- All the computers are relate to an intranet. The intranet is a small network that only the conjunction personnel can take part. No one from the outside, like me, can enter the intranet.Some of t he files are password protected and only those who have the password can enter. Others are common files that everyone linked to the intranet can access. All personnel have their own password. They also have a card key that is used to enter the PC otherwise they do not have access. Norton System whole caboodle is an antivirus application. All the computers have this software to protect against viruses. There is however a disadvantage. There is no internet firewall. Although one will be installed soon, the guarantor is at risk and therefore cyber-terrorists can enter easily.Evidence Eliminator is an application that is used to destroy unwanted fraud evidence from the Fraud departments computers. The evidence will no longer be available for hackers. Evaluation Hadens use of ICT is excellent. They are faster now than before computers were introduced. The department of Fraud has found that using ICT is a must for them. Most of it is writing up databases. They have change in using the ir own database that has outstanding auspices due to it being hard to use. There are several advantages and disadvantages.The main one is that the computers can get out of date and will require fixing all the time. Another disadvantage is in the Fraud computers the security is not that good. Hackers can attack it easily. The evidence eliminator application will have to be used several times because there is no firewall and hacker can attack any time. The Fraud department has to step up its security to insure that it is safe to transfer files through the networks. Overall, the organisation has improved in keeping things up to date. The security has to improve for the internet, other than that the company is sophisticated and well improved.

No comments:

Post a Comment