Using the attachment below:
Prepare a short paper describing the roles and significance of each of the five core technologies in the overall system. Discuss their relationships and interdependence.
An information technology (IT) system has many components that are needed for it to function. This course will introduce various core technologies of an IT system. Each component discussed is a field of IT expertise in itself and each has many subspecialties within the overarching field. Consequently, in today’s world there are many IT professions. In this course, the general fields and technologies will be discussed and a management point of view will be taken. Any IT manager needs to have a general knowledge of the core technologies that make up an IT infrastructure and the experts who work with those components. Managers may have specialized in one area but will still need to understand the other core technologies and their roles. It is also important for management professionals to understand the relationships among core technologies of an IT system.
Computer Programs and Programming: A computer program is a specific piece of software (organized operating information or instructions) that is used to direct the operations of a computer. Examples can range from an operating system (e.g., Microsoft Windows, MacOS, Unix) on a computer to an application like MS Word. Computer programming is the field that writes the code that creates these computer programs. This is a very highly regarded field, and computer programmers are in high demand.
Computer Networks: Computer networks are the systems that connect multiple computers and allow them to communicate with one another. This includes computers connecting to the internet. This is a very technical field, and expertise in computer networks has great value for all organizations today.
Databases: Databases store data in an organized way that allows users to add, extract, and analyze data easily. Databases are rarely seen but are often at the heart of many functions done today. For example, when entering a username and password to a website, the website is checking that information against a database.
Information Assurance: This is a broad field that covers all of information technology security. This ranges from federal policies related to internet security to the access-based security on an individual machine. It is about managing risks when transferring data and communicating between computers.
Web Technologies: Web technologies are advancing every day. Websites have improved at very fast rates over the last five years. They are interactive, they work on mobile devices, they store information, and they can display amazing graphics. All of the technologies that make these things possible are web technologies.
All of these core technologies comprise an overall IT system. They are all interconnected. For example, Information assurance is critical to each of the other areas. The following is an illustration of an IT system: An individual is using a home computer network to access the internet. The computer being used employs basic computer software. The individual logs into a website that then accesses a database. All of these activities have risks that need to be managed while data is being transmitted