Beruflich Dokumente
Kultur Dokumente
Department of Management
Assignment: Information Technology
Course: Mis107 |Sec-21
Submitted by Submitted To
Abdulla Afnan Abu Sayeed Arif(ASA1)
Id:1911921630 Lecturer
Sec:21 Department of Management
North South University
1|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
Table of Content
THE USE OF INFORMATION TECHNOLOGY.................................................................................3
Characteristics of Information Technology:...........................................................................................3
There are many uses of information technology:................................................................................3
Why Information Technology needed?....................................................................................................4
The Need of Information Technology in Society:........................................................................4
Globalization..............................................................................................................................4
Communication:........................................................................................................................5
Cost-effectiveness:......................................................................................................................5
The birth of a new job:..............................................................................................................5
Lots of time:...............................................................................................................................5
The Need of Information Technology in Education:...................................................................6
The Need of Information Technology in Finance:.......................................................................7
The Need of Information technology in Security:.......................................................................7
Challenges of Information Technology:...................................................................................................8
1. Security:.........................................................................................................................................8
2. Privacy Issues:...............................................................................................................................8
3. Cloud Computing:.........................................................................................................................8
4. Increased pressure on IT specialists:............................................................................................9
5. Hiring:............................................................................................................................................9
Recommendations:....................................................................................................................................9
Conclusion:..............................................................................................................................................10
REFERENCES:.......................................................................................................................................11
2|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
1
https://searchdatacenter.techtarget.com/definition/IT
3|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
5. Highly gainful for the average folks, as they can get to their
privileges and can make lawful move against the individual
who abuses his/her privileges.
4|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
5|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
working its hardest with web trades. As more trades are done, the web
requires more frameworks, more PCs, and more prominent security ventures
to ensure its purchasers. Without information advancement, these purchases
would be unfathomable, and it would be incomprehensible for banks to keep
these purchases secure.
7|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
1. Security: With gadgets like the web, developers have believed that it was
definitely not hard to hack into any PC or system as long as it is related on
web. Software engineers can without a lot of a stretch use an IP (Internet
Protocol) address to get to a customer's PC and assemble data for intolerant
reasons. In like manner the wide spread of web treats which accumulate
information at whatever point we use the web , has introduced IT customers to
high perils of distortion and conflicting interests. Various enormous
associations use these treats to make sense of which things or organization
they can announce to us. Concerning web banking, the trading of money can
without a lot of a stretch be obstructed by a software engineer and all the
money will be moved to their optimal records , which impacts both the bank
and the customers who is using electronic budgetary development.
8|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
computing is the second most testing employing zone on the planet. The open
doors for distributed computing are difficult to overlook. Cloud is a definitive
empowering agent, opening new channels of income by utilizing innovations
like man-made reasoning (AI) and the Internet of Things (IoT). Yet, experts
are expected to profit by this innovation, and right now, there aren't sufficient
of them. Regardless of the specialist lack, associations are in with no
reservations on cloud arrangements. Indeed, over half of associations utilize
more than one cloud provider. It's not remarkable for an association to require
cloud abilities in AWS, Microsoft Azure and Google Cloud. Furthermore,
conventional distributed computing skill isn't sufficient, particularly in case
you're a designer or engineer. It's basic that cloud experts have current ranges
of abilities and train on the stages they draw in with routinely.
Recommendations:
The present cloud-based applications require high data throughput which is more
noticeable than the basic web affiliation sellers have presented. Those venders that
have not adequately thought to be switching over or climbing to a fiber optics
affiliation should consider doing so now. This will oblige the speed or faithful quality
for all the data to process. Bringing fiber won't simply contemplate a dynamically
ground-breaking relationship for data throughput, it will moreover help your business
gainfulness by having speedier techniques.
9|Page
Abdulla Afnan
ID: 1911921630
Assignment:1
There are a couple of various methods for ensuring about your seller data and
establishment. The broadest is setting up your delegates on these suspicious risks and
how to manage any potential messages that ought to traverse your framework. Having
a recorded security process technique is an undeniable necessity in giving your
laborers rules of what is allowed and not to ensure the prosperity of your business
assets. Sellers should moreover have firewalls set up with significant programming
for interference contravention. This will set up wellbeing endeavors from a hardware
perspective and will monitor most outside threats. A formed and detailed security
expectation plan may even decrease the first rate cost of IT Security Insurance.
Most dealers today are being engaged for surveys by Microsoft alone. Those dealers
that are not in consistence are being hit with gigantic fines by the Business Software
Alliance. To keep up a key good ways from these fines, sellers need to ensure that
their laborers are not using unlicensed programming. A couple of various methods for
keeping up a key good ways from this is through suitable getting ready of the agent
on the "do's and don'ts" of programming downloads. Another way is to suitably
"lockdown" the PC and approvals of the end customer to not allow downloads of any
".exe" report. The fines related to a potential programming audit can be in the
millions. Sellers can't remain to disturb this. Without the most ideal trustworthiness
and strategies set up, this is basically one more risk your business could drive
forward. Best to be as cautious as could be expected under the circumstances, ensure
your business is secured by these potential perils to your essential concern.
Conclusion: In conclusion, information technology plays a big role in our life. However, if
you’re not in the field of information technology yourself, you might not know just how
information technology touches your life. Every sector in our life, IT helps us to bring innovative
things. Progress in huge numbers of the fundamental processing and Information Technologies
has been quick as of late, and the board doesn't anticipate that the pace of progress should back
off within a reasonable time-frame. While a few innovations are arriving at the development
now, numerous significant advancements have gigantic future potential. As a greater amount of
the world's data is digitized and more individuals and things are organized, the financial aspects
of the advanced, arranged economy will turn out to be always significant. This incorporates the
capacity to make duplicates of products and ventures at right around zero cost and convey them
anyplace on the planet quickly. Moreover, digitization of items, administrations, procedures, and
associations makes it conceivable to gauge and oversee work with unquestionably more
exactness. Information driven dynamic and AI give huge chances to improving profitability,
productivity, precision, and advancement.
10 | P a g e
Abdulla Afnan
ID: 1911921630
Assignment:1
REFERENCES:
1. https://www.globalknowledge.com/us-en/resources/resource-library/articles/12-
challenges-facing-it-professionals/
2. https://khaitanpublicschool.com/blog/information-technology-in-education/
3. https://www.techfunnel.com/fintech/the-role-of-information-technology-in-financial-
services/
4. https://www.acog.org/clinical/clinical-guidance/committee-
opinion/articles/2015/01/patient-safety-and-health-information-technology
5. https://www.udemy.com/blog/importance-of-information-technology/
6. Lecture slides
11 | P a g e
Abdulla Afnan
ID: 1911921630