IT in business.
3.1The business organization needs to know the type of Computer software that can operate computer programs in the business system. The software is the non-tangible computer component that will enable the computer system of the business to operate its services efficiently. The business need to know the contrast of the computer software contrasts in the organization and its computer hardware that is the physical parts of computers. The software to be acquired should be compatible with the computer hardware .Computer software that business organization will need to buy includes computer programs depending on the architecture that the organization need to have control. Such architecture may require for instance, script, and libraries computer software. In the case of such system, software needed by the organization should clearly-defined instructions and procedure that upon execution, instructs system hardware to carry out the tasks it is designed.
The recent software that the business requires for its computer system includes:
The System software, that is an interface designed to operate and manage the computer hardware. It also provides basic functionality of the computer. The system software, moreover, provide a platform and system for running various application software. For the business, system software includes:
Operating system: These includes operating systems such as Windows 8, Windows Vista , OS X Tiger , Windows 8 Pro ,Windows XP , OS X Snow Le, Windows 7, and OS X Leopard. These are the essential collection of computer programs and t manages resources as well as providing common services for most other software. These operating software’s performs Supervisory programs, window systems management, boot loaders and shells and.
The most appropriate operating system is Windows 8 Pro. In practice, the business will consider the operating software because it comes bundled together with additional software such as application software. The above operating system makes the user can to potentially perform some using a computer that has only one operating system. Windows 8 Pro, in addition, is comparable to Windows 7 Professional as well as window 7Ultimate. It is the most targeted operating system towards business users and enthusiasts. Moreover, it includes all possible features that the normal Windows 8 contains. Additional features and compounds found in window 8 pro include the capability of receiving Remote Desktop connections, c ability of Encrypting File System, participating in the Windows Server domain, Virtual Hard Disk Booting and Hyper-V. It also participates in Group Policy and Bit Locker, and can enable the Bit Locker to Go. The most exciting component of window 8 is the Windows Media Center. A functionality that is available only for Windows 8 Pro. It serves as a separate or different software package. The advantages that the Windows 8 Pro has include presence of Mobile broadband features, Refresh and reset of OS, Touch and Thumb keyboard, secure boot, Microsoft account integration, and Supported third-party apps
Device driver include; Display Drivers, Sound drivers, LAN, Motherboard drivers
A computer program that always operates or controls a give type of device that attached to a computer. Each device requires at least a single corresponding device driver.
Utilities, that software designed to enable the users in maintenance and caring of their computers. They include DirectX End-User Runtime, window media players, Skype Microsoft safety scanner Bluetooth drivers, wireless drivers,
3.2 For the business protect its computer from different security threats, the business needs its computers to have security software such as antivirus software or any other antispyware technology installed in its computers. The business should also need to keep its computer firewall on at all time and try getting the latest updates for the computers’ operating system.
The business can protect its computer from viruses by either downloading free security virus software. The virus software can perform different levels of virus scans as needed. The business can also set a strong and secured password for its entire computer so that others unauthorized persons cannot access the in formations contained in the computers. The business should update its Mac computer system as soon security software providers such as Apple security updates become available and published. Software updates generally address recently and most of the discovered security issues. It is known that failure to update the computer system can be dangerous to the data stored in the computer system.
The business should choose virus and malware protection provided by the major players of computers security in the field. These players include; Microsoft, McAfee and Norton in the field of antivirus software. If the business has its computer running slower than the usual, then the business should sought to run a fresh scan of the whole computer system. Other security element that the business should include in their computer system are Anti Lightning, provided strong and Different Passwords after every two months, Dust plugging system and enhancing automatic updates of software such as Firewall in the computers.
Generally, the business should install Antivirus that Includes Phishing as well as Malware Defenses. Regularly maintenance is also necessary for both the Hardware and Software system of the computer.
Therefore, to protect its computers from attack over the internet, the business should consider the following element of the computers:
Firewall
As explained by the Microsoft Security, a firewall is either a hardware or software that can acts as a filter for all information passed over the Internet to the computers. A firewall filters and eliminates out malicious programs that may get into the computer as well as attempts by hackers to have access to the computer system. Therefore, the organization should always ensure proper and regular updates of the computer’s firewall.
System Updates
According the security providers such as Microsoft Security website, the operating systems should be constantly given recent updates that are important to the protection and security of a computer. Updates enable a computer system and software to have the latest security and protection updates that enables the secured and combat attacks on the computers.
Virus/Spyware
It is know that viruses or spyware are the most dangerous of malicious programs that can gain access or and control of a computer system. Anti-spyware and Anti-virus and programs help protectcomputer system from any attack. The updates for both Anti-spyware and Anti-virus are available in the internet to maintain protection and security at a high level.
Unfortunately, Antivirus software is the most neglected but important aspects of computer security. Often, most computer come with a free trial version of the Antivirus and therefore, the business need to buy one before the trial version get out of date.
The table bellow shows various Anti-virus and their prices that the business can opt to buy.
The properties of each antivirus include:
KASPERSKY TECH TITAN
Provides other Layers of Protection during services such as Financial Transactions in the Online Banking & Shopping
Combines Innovative such as Cloud-based Technologies that has With Advanced Antivirus security and Protection to enable the computer safe from the latest threat.
NORTON 360
Detects & Eliminates Viruses, Malware & Other Online Threats
Protects Against Online Identity Theft
Secures Your PC, Mac, Smartphone Or Tablet
MCAFEE
The antivirus offers Password Manager. It Remembers All the Passwords used in the computer system.
Identity Protection - It Guards Personal Information from Hackers & Identity Thieves
Cross Devise - Anti Virus - Protects all PC's & Mac’s, Smartphone and Tablets from Online Threats
MICROSOFT WINS 8.1 PRO
It enables access PC from another from another PC with a remote Desktop
Enables Connection of Company network with Domain Join
Plus, Get Windows Media Center
KASPERSKY PURE 3.0 for TOTAL SECURITY 3PC
Ultimate Protection for PCs, can Identity Passwords and Photos.
Uses the recent Cloud Data, has Anti-phishing Technologies as well as a Secure Keyboard Mode that Keep Personal and private Data from Being Stolen
The most appropriate and recommended antivirus for the business is KASPERSKY PURE 3.0 TOTAL SECURITY 3PC because of its important futures named above.
3.3 The table bellows shows the top five recent desktop available in the market:
The suitable model of desk top that the business should buy is Lenovo Think Station E32 SFF. It is because; the computer is fairly cheap and supports all the applications the business can need in its computer system.
The specification of the computer includes:
Specifications of Lenovo Think Station E32 SFF
» Intel Xeon E3-1240 and CPU of 3.4GHz.» 8GB internal memory.» Has Nvidia Quadro of type K600 and 1GB DDR3 with GPU of 331.87 driver» It has 1TB 7 and 200RPM » It has Intel C226 chipset of motherboard» Microsoft Windows 7
The most recent servers in the market include: Aberdeen Stirling 229 , Apple Xserve and Microsoft Windows Server 2008 Enterprise.
The recommended server for the business is Microsoft Windows Server 2008 Enterprise.
The specifications include:
The recent laptop mode include: HP Pavilion 15-e072sa, HP Envy X2 and Apple 13-inch MacBook
The best laptop for the business is Apple 13-inch MacBook
Specifications includes:"Core Duo “of 2.0 13-Inch in size ,features a 2.0 GHz Intel processor with two independent processor, 667 MHz , hard drive , 4X slot-loading layer read , DVD/CD-RW Drive, an Intel of GMA 950 integrated , wide screen of TFT display.
The laptop can support all the programs and software need by the business.
It has large storage capacity that stores most data for the business.
The best Smartphone for the business is Motorola Droid Razr XT912.
Specifications include:
-16GB internal memory
-1.2 GHz duo-core
-Android version 4.2.1
-memory 1 GB RAM, 16 GB ROM, 11.5 GB.
The phone is portable and therefore can used by the business operators anywhere.
The phone is cheap and avoidable.
The business should also include in their system the following input and output device:
Input device: keyboards, digital cameras, mouse, scanners, and joysticks.
The output devices include: projector, printers, monitor, sound card, Computer Output Microfilm and Speech-generating device.
4.1 (a)
(c) Server, hub, workstation, desktop and file server.
(c) Bus topology
(d) 1) It is simple to set-up the bus net work topology and extend bus network. 2) Cable length required for bus topology is the least compared to any other networks.4.2
(a) I. DSL – Digital Subscriber Line. It is technology that enables Internet access by transferring digital data through the wires of a locally connected telephone network
-Has Independent services
-Cheap line charges from the phone company.
ii. Broadband connection-a high speed internet connection. It is wide bandwidth that is characterized by a transmission medium. It has ability to transmit multiple signals as well as traffic types simultaneously.
-Rapid loading of web pages and e-mail
-Has fast downloading of files, programs, and computer updates
b. The recommended internet service provider is ADSL internet Broadband ISP.
Overall Budget plan for the business.
Reference
http://www.dicksmith.co.nz/computers/laptops-notebooks
http://www.dicksmith.com.au/computers/laptops-notebooks
http://www.dicksmith.com.au/computers/laptops-notebooks Laptops & Notebooks (- Computers & Tablets)
http://www.jbhifi.com.au/computers/
http://www.normancomputers.com/
http://www.pbtech.co.nz/
https://www.google.com/search?q=dick+smith+company&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
https://www.google.com/search?q=-Harvey+norman&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#q=-Harvey+norman+computers&rls=org.mozilla:en-US:official
https://www.google.com/search?q=JB+Hi-Fi+&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
https://www.google.com/search?q=pb+tech+nz&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
JB Hi-Fi | Computers, Laptops, Tablets, Ultrabooks & Desktops (JB Hi-Fi | Computers, Laptops, Tablets, Ultrabooks & Desktops)
Kouvatsos, D. D. (2011). Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet. Berlin, Heidelberg: Springer Berlin Heidelberg.
Kurose, J. F., & Ross, K. W. (2005). Computer networking: A top-down approach featuring the Internet. Boston: Pearson/Addison Wesley.
Laptops & Notebooks - Computers & Tablets (Laptops & Notebooks - Computers & Tablets)
Laptops & Notebooks (- Computers & Tablets)
Mueller, M. (2010). Networks and states: The global politics of Internet governance. Cambridge, Mass: MIT Press.
Norman Computers Norman Oklahoma (Computers and Technology, Norman, Oklahoma)
PB Tech - Computer Parts, PC Components, Laptop Computers, LCD Monitors, Tablets and more! (PB Tech - Computer Parts, PC Components, Laptop Computers, LCD Monitors, Tablets and more!)
Targett, D., Grimshaw, D. J., & Powell, P. (2009). IT in business: A manager's casebook. Oxford: Butterworth-Heinemann.