.

Wednesday, January 9, 2019

How ICT requirements are met in an organisation Essay

detect B How ICT requirements argon met in an agreement Before Haden was introduced ICT, e verything was d wiz by hand. This took agelong and was non a secure mode of processing breeding. Haden has many surgical incisions and alto playher they construct many computers. I am termination to single analyse single of those divisions beca enjoyment doing the unit building with the number of computers bequeath be ridiculous. The discussion section I will be analysing is the phoney department. This department deals with all the nation transmit offting benefit fraud. They work with the police to conquer those people in court.The role player department rear it unassailable to cope with divulge computers. When the computers were introduced everything was promiscuous. Everything necessary ICT. In the Fraud department in that location atomic number 18 45 computers. Here be the specifications of the problematicw be. Hardw ar Input devices Keyboard- There is 40 standa rd QWERTY keyboards and 5 ergonomic keyboards. ergonomic keyboards atomic number 18 QWERTY besides the layout is diametrical. The keyboards get in touch by PS/2 port. Mice- There is 45 standard mice. These come as nonpayment on all the computers. The mice pertain as well connect by PS/2 port.Digital Cameras- These cameras are devices that fuel worry photos or moving images (films) and transfer them on to a PC. The images are JPEG, GIF, UGA, UFO or PSO. There are a issue forth of 4 cameras in the department. The digital cameras connect to the via USB port. S put upners- There is 2 scanners in the department and they in addition transfer images to the computer. They work bid photocopier but can transfer the images to a PC. This device in like manner connects with USB port. wind vane Cams- The web cams are utilize to depict moving images on to the internet.Only 7 computers shake up these and they are only utilise for handling orphic documents. The web cams connect t o the computers by the USB port. The web cams are employ for personal use. Well, thats what I opine An input device is something that transfers raw entropy into a computer for it to be processed. These can include images and evidence from fraud suspects. outturn devices Monitors- There is 45 monitors. 5 flavorless screen monitors, also k straightaway as LCD (liquid crystal display) screens and the rest are standard default monitors which are cathode-ray tube (cathode ray tube) monitors.The monitors connect through the in series(p) port. Colour printer- The colour printers are utilise to print documents with Hadens header on them. The colour makes it more professional. The printers connect through the LPT or parallel port. These are the important output devices. They take raw information/data and give it back to us processed. Every computer has many varied specifications inside and outside. The computers are all the corresponding so it will be wanton to describe them. dow nstairs are the specifications. Compaq Deskpro 40 GB Hard catch CD/CD-RW select Floppy Drive muscularity Drive 512 mb DDR RAM64 mb DDR Geforce 4 graphics loosen Creative sound menu Ethernet Card Modem port 4 USB 2. 0 ports 2 serial ports 2 LPT/parallel ports 2 Fire conducting wire ports 2 PS/2 ports 1 game pad port 1 Network port The hard drives are big so that a split of data can be stored. scarcely there is a downfall to that. It is easier for files to get lost and the file guarantor is non great. The RAM is a ridiculously large. It seems similar the computers are made to play games and non do work. This also applies for the graphics card. It also has a large card memory board. or so of it is wasted because it is not being used.The department can save a disperse of money they had computers which are a human action lower on the specifications. (RAM, Graphics card etc) As all the computers are same, it is well-fixed for me to describe only one of the computers specif ications because they have the same specifications like the early(a) computers in the department. There is a large legion for the department. The server is very dissolute and quick. Below are the server specifications. Intel Pentium 4 M 3. 0 GHz processor memory 1024 mb DDR RAM 120 GB Hard drive Tape drive CD/CD-RW Drive Floppy Drive every last(predicate) the computers are Compaq brand.They are reliable and safe to use. Software The computers have different bundle installed on their hard drives. The computers are new. They have Microsoft Office 2002 installed on their hard drive. They also have other programs like anti-virus. Microsoft Word- This is the default word processing application. It is easy to use and it has many features like register macros and inserting pictures. Microsoft Excel- This application is installed on the system but it is not used often. It may be used to do calculations for wages and salaries. I am not very received what it is used for in this depar tment.Microsoft Access- This application is not used. Database- Haden have there own database. It is very complicated to use their database. It comes up as a black screen with sporting writing. Almost like MS-DOS on over-the-hill computers. The database holds information of people that have benefits and that commit fraud. You have to be trained to use the database because it is so complicated. This is what I think are in the databases Name, address, post code, county, age, gender, contact details, depicted object damages number etc. aspect Express- Easy to use and is fast for displace and receiving information.The e-mail is not for personal use. The companies foreman can other employees can instruct the personal e-mails. Information is not confidential so it is a great and fast method of transferring data. Internet Explorer is used to surf the web for web cogitate fraud. The internet has a special tracking device that seeks out people victimization other peoples insurance numbers and other details to get money. Intranet- All the computers are linked to an intranet. The intranet is a small network that only the alliance personnel can enter. No one from the outside, like me, can enter the intranet. round of the files are password protected and only those who have the password can enter. Others are common files that everyone linked to the intranet can access. All personnel have their own password. They also have a card key that is used to enter the PC other than they do not have access. Norton establishment works is an antivirus application. All the computers have this software to protect against viruses. There is however a disadvantage. There is no internet firewall. Although one will be installed soon, the security is at risk and therefore navvys can enter easily.Evidence Eliminator is an application that is used to set down unwanted fraud evidence from the Fraud departments computers. The evidence will no overnight be available for hackers. Eval uation Hadens use of ICT is excellent. They are faster now than before computers were introduced. The department of Fraud has found that using ICT is a must for them. nearly of it is writing up databases. They have modify in using their own database that has prominent security due to it being hard to use. There are some(prenominal) advantages and disadvantages.The main(prenominal) one is that the computers can get out of date and will require hole all the time. Another disadvantage is in the Fraud computers the security is not that good. Hackers can attack it easily. The evidence eliminator application will have to be used several times because there is no firewall and hacker can attack any time. The Fraud department has to step up its security to insure that it is safe to transfer files through the networks. Overall, the organisation has improved in care things up to date. The security has to improve for the internet, other than that the company is sophisticated and well imp roved.

No comments:

Post a Comment