Wednesday, July 17, 2019

How ICT requirements are met in an organisation Essay

Re interface B How ICT requirements ar met in an physical composition Before Haden was introduced ICT, e rattlingthing was make by hand. This took longer and was not a unquestionable method of processing entropy. Haden has m both subdivisions and altogether they father many computers. I am going to solely analyse star of those departments beca hire doing the whole building with the tot of computers exit be ridiculous. The department I pass on be analysing is the Fraud department. This department deals with every(prenominal) the nation committing benefit fraud. They make believe with the police to get those stack in court.The Fraud department found it rocky to cope without computers. When the computers were introduced everything was easy. eitherthing needed ICT. In the Fraud department at that place ar 45 computers. Here ar the specifications of the seriouslywargon. Hardwargon Input impostures Keyboard- in that respect is 40 amount QWERTY keyboards and 5 ergon omic keyboards. Ergonomic keyboards be QWERTY that the layout is different. The keyboards tie by PS/2 port. Mice- There is 45 standard mice. These come as c belessness on all the computers. The mice affiliate also connect through PS/2 port.Digital Cameras- These cameras ar machinations that laughingstock take photos or moving images (films) and budge them on to a PC. The images are JPEG, GIF, UGA, UFO or PSO. There are a total of 4 cameras in the department. The digital cameras connect to the via USB port. S bearners- There is 2 scanners in the department and they also transfer images to the computer. They work equivalent photocopier barely can transfer the images to a PC. This device also connects through USB port. Web Cams- The tissue cams are use to project moving images on to the internet.Only 7 computers commence these and they are nevertheless used for handling confidential documents. The web cams connect to the computers by the USB port. The web cams are used for individualised use. Well, thats what I think An input device is something that transfers raw selective information into a computer for it to be processed. These can include images and evidence from fraud suspects. output devices Monitors- There is 45 monitors. 5 flat cover version monitors, also k promptly as LCD (liquid crystallizing display) screens and the rest are standard default monitors which are CRT (cathode ray tube) monitors.The monitors connect through the successive port. Colour printer- The colour printers are used to print documents with Hadens header on them. The colour makes it much professional. The printers connect through the LPT or double port. These are the main output devices. They take raw information/data and give it back to us processed. Every computer has many different specifications inside and outside. The computers are all the same so it ordain be easy to describe them. Below are the specifications. Compaq Deskpro 40 GB Hard drive CD/CD-RW rebuff Floppy Drive Zip Drive 512 mb DDR RAM64 mb DDR Geforce 4 graphics card Creative soundcard Ethernet Card Modem port 4 USB 2. 0 ports 2 serial ports 2 LPT/parallel ports 2 Fire wire ports 2 PS/2 ports 1 game pad port 1 Network port The hard drives are big so that a crowd of data can be stored. But there is a d averfall to that. It is easier for files to get lost and the file bail system measures is not great. The RAM is a ridiculously giant. It seems the the likes of the computers are made to play games and not do work. This also applies for the graphics card. It also has a large card memory. Most of it is wasted because it is not be used.The department can save a lot of m championy they had computers which are a bit light on the specifications. (RAM, Graphics card etc) As all the computers are same, it is easy for me to describe only one of the computers specifications because they lead the same specifications like the other computers in the department. There is a lar ge legion for the department. The innkeeper is very spry and quick. Below are the server specifications. Intel Pentium 4 M 3. 0 GHz central processing unit memory 1024 mb DDR RAM 120 GB Hard drive Tape drive CD/CD-RW Drive Floppy Drive All the computers are Compaq brand.They are reliable and safe to use. Software The computers put on different software installed on their hard drives. The computers are new. They have Microsoft Office 2002 installed on their hard drive. They also have other programs like anti-virus. Microsoft Word- This is the default ledger processing masking. It is easy to use and it has many features like recording macros and inserting pictures. Microsoft Excel- This application is installed on the system but it is not used often. It may be used to do calculations for wages and salaries. I am not very sure what it is used for in this department.Microsoft Access- This application is not used. Database- Haden have there own database. It is very complicated to u se their database. It comes up as a black screen with white writing. Almost like MS-DOS on old computers. The database holds information of volume that have benefits and that commit fraud. You have to be trained to use the database because it is so complicated. This is what I think are in the databases Name, address, post code, county, age, gender, contact inside information, national insurance outcome etc. Outlook Express- Easy to use and is fast for sending and receiving information.The e-mail is not for personalised use. The companies foreman can other employees can read the personal e-mails. Information is not confidential so it is a great and fast method of transferring data. Internet adventurer is used to surf the web for web link up fraud. The internet has a special tracking device that seeks out people exploitation other peoples insurance numbers and other details to get money. Intranet- All the computers are linked to an intranet. The intranet is a small network that only the company effect can read. No one from the outside, like me, can enter the intranet.Some of the files are password defend and only those who have the password can enter. Others are common files that everyone linked to the intranet can access. All effect have their own password. They also have a card key that is used to enter the PC otherwise they do not have access. Norton brass works is an antivirus application. All the computers have this software to nurture against viruses. There is however a outrage. There is no internet firewall. Although one will be installed soon, the auspices is at risk and therefore hackers can enter easily.Evidence Eliminator is an application that is used to destroy unwanted fraud evidence from the Fraud departments computers. The evidence will no longer be available for hackers. rating Hadens use of ICT is excellent. They are faster now than before computers were introduced. The department of Fraud has found that using ICT is a must for them. Most of it is writing up databases. They have improved in using their own database that has outstanding security due to it being hard to use. There are several advantages and disadvantages.The main one is that the computers can get out of date and will require fixing all the time. Another disadvantage is in the Fraud computers the security is not that good. Hackers can attack it easily. The evidence eliminator application will have to be used several times because there is no firewall and hacker can attack any time. The Fraud department has to step up its security to insure that it is safe to transfer files through the networks. Overall, the organisation has improved in keeping things up to date. The security has to improve for the internet, other than that the company is sophisticated and puff up improved.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.