Core Technologies in An Effective IT System
Core Technologies in An Effective IT System
(Computer Hope, 2020) provides the following definition for a program: "A program, also called an
application or software, is a set of instructions that process input, manipulate data, and output a result."
(Voong-Fadel, 2020) defines computer programming as "The process of designing and building an
executable computer program to accomplish a specific computing result." The role of computer
programming is to get a computer to do what you want it to do by writing specific instructions, which
would be the program. The ability to make a computer a useful tool as opposed to an odd decoration,
makes computer programs and programming a significant part of the IT system.
A computer network is a means to connect computing devices to share data, information, and
resources (Lawal, 2019). This can be as simple as connecting a printer to a computer in order to print an
image or as complex as millions of computer networks across the world connecting to the internet in
order to share information. Computer networks are important because they allow people to share and
access an infinite amount of information and resources.
According to (Encyclopaedia Britannica, 2020) a database is "any collection of data, or information, that
is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate
the storage, retrieval, modification, and deletion of data in conjunction with various data-processing
operations." Databases can be considered the heart of the company. All essential company information
is stored and accessed from a database. Databases can be maintained on-site, in remote locations, or
even on the internet. They allow users to efficiently search for and access information.
(Sosin, 2018) states that the Department of Defense Information Assurance Certification and
Accreditation Program (DIACAP) defines Information Assurance as "measures that protect and defend
information and information systems by ensuring their availability, integrity, authentication,
confidentiality, and nonrepudiation." Information Assurance is a way to manage risk and safeguard the
data being utilized in the IT system. Without information assurance, the system would be at a greater
risk of infiltration from hackers and other individuals, which could potentially endanger the IT system as
a whole.
According to (Reeves, 2019) "Web technologies are the various tools and techniques that are utilized in
the process of communication between different types of devices over the internet." These technologies
are what allow companies and individuals to connect to the World Wide Web. A company may use
them to service clients through a webpage, or individuals could utilize them to stay connected to friends
and family through video messaging services like Zoom or Skype. Web technologies also make it possible
for users to save and access data in virtual databases.
References
Computer Hope. (2020, April 30). Computer Hope Free Computer Help Since 1998. Retrieved from
https://www.computerhope.com/jargon/p/program.htm
Reeves, S. (2019, December 12). Web Technologies: A Journey from HTML to Web 3.0. Retrieved from
https://www.goodcore.co.uk/blog/web-technologies/#:~:text=Web%20technologies%20are%20the
%20various,web'%20and%20'technology'.
Sosin, A. (2018). How to increase the Information Assurance in the Information Age [pdf]. Retrieved
from Journal of Defense Resources Management:
http://www.jodrm.eu/issues/volume9_issue1/05_Sosin.pdf