Cosc 105
Cosc 105
TECHNOLOGY.
COMPUTER APPLICATIONS IN BUSINESS
Name:
Department:
Date:
1.You hear a member of the board of your financial organization,
while in discussion with major customers, say that “Mobile
computing renders all traditional IS/IT obsolete.”
Discuss and justify the extent to which you agree or disagree with
the above statement.
Mobile computing deals with human using mobile devices. Traditional computing is
possessed of using physical data centers for storing assets and running complete networking
system of operations. In business, mobile computing is a technology that allows
transmission of data, via a computer, without having to be connected to a physical link.
Types of mobile computers are handheld, tablets, cell phones and unsafe climate.
Mobile computers are remote gadgets that can video call, picture sharing and
information sharing. They are characterised by portability, social interactivity, connectivity
and size. They are commonly used to access the web or the internet, emergency services
such as ambulance services, education programs and social media live interactions.
Mobile computing renders faces challenges in rendering their IT services but that
does not mean that these services are obsolete or imperfectly developed. The services are
just prone to change due to diversification of technology. Mobile computers are versatile
therefore one can utilize their gadgets freely, this makes the users become used to these
gadgets and can work with them efficiently.
Mobile computing renders offers services that are up to date due to access to internet
where the lates updates are posted. Better time the executives is unsured by utilizing the
web and one can introduce any time following an application by which that application can
make more readily deal with time, this accessibility assists you with getting sorted out
yourself. Mobile computers also offer efficient services in recognizing high traffic by
utilizing Google maps, u can discover the traffic on streets too. In the event that any street
has high traffic, at that point you can take some other street for your voyaging.
Mobile computing renders ensures that you get the best from them by ensuring
that your advertisements are effective by doing research moreover, they advise clients on
social movements that you can do on your on portable mobile computer. In meetings where
you don’t have a webcam connected to your PC, you can utilize your versatile camera when
required moreover.
2.Discuss various methods/ways/techniques an organization can put in
place to protect its systems.
Protect with password. This may seem like a no brainer, but many cyber attacks succeed
precisely because of weak password protocals. Access to all equipment, wireless networks and
sensitive data should be guarded with unique user names and password keyed to specific
individuals. The strongest passwords contain numbers, letters and symbols and aren’t based on
common place words. This way the systems are more secure and free from cyber attacks.
Design safe systems. Reduce exposure to hackers and thieves by limiting access to your
technology infrastructure. Minimize points of failure by eliminating unnecessary access to
hardware and software and restricting individual users’ and systems’ privileges only to needed
equipment and programs. Whenever possible, minimize the scope of potential damage to your
networks by using a unique set of email addresses, logins, servers and domain names for each
user, work group or department as well.
Conduct screening and background checks. While rogue hackers get most of the press
then the majority of unauthorized intrusions occur from inside network firewalls. Screen all
prospective employees from the mailroom to the executive suite. Beyond simply calling
references, be certain to research their credibility as well. An initial trial period during which
access to sensitive data is either prohibited or limited, is also recommended.
Provide basic training. Countless security breaches occur as a result of human error or
carelessness. You can help build a corporate culture that emphasizes computer security through
training programs that warn of the risks of sloppy password practices and the careless use of
networks, programs and devices. All security measures, from basis document disposals
procedures to protocols for handling lost passwords, should be second to members of your
organization.
Avoid unknown email attachments. Never click on unsolicited email attachments,
which can contain viruses, Trojan programs or computer worms, before opening them always
contact the sender to confirm message contents. If you’re unfamiliar with the source, it’s always
best to err on the side of caution by deleting the message then potentially blocking the sender’s
account and warning the others to do the same.
Think before clicking. Phishing scams operate by sending innocent looking emails
from apparent trusted sources asking for usernames, passwords or personal information. Some
scam artists even create fake web sites that encourage potential victims from inputting the data
themselves. Always go directly to a company’s known internet addressors pick up the phone
before providing such info or clicking on suspicious links.
3.Describe why a word processing application is important to an
organization and state any two words processing software application
you would recommend for use.
Besides saving time, word processing offers ways to improve workers’ efficiency and
accuracy. Word processors contain software to automatically correct common errors and identify
misspellings, improving overall speed and reducing errors.
Word processing allows you to ensure that you can have everything processed to a high
standard. You may be processing certain information or you may want to work process a
document that is hand written. You can print out anything that has been word processed and you
can ensure that there are no mistakes on the document that you have written. Word processing
will make sure that you have not made any mistakes long the way and that your work can be neat
and tidy as opposed to hand written and scruffy.
You can be sure that everything is going to look professional for meetings and that you
can present the same sheet of paper with the same information on to everyone that may be
present at the meeting and this is what makes word processing so important. It makes you look
professional and it saves time and effort of having to write everything more than once.
Once you have mastered word processing you will find that the importance of it is to
ensure that everything is in order and that you have it presented exactly as want it to be. If there
was no word processing everything by hand typewriter and this is not going to benefit anyone
in today’s fast paced society.
You will find that you use word processing most days of your life when you are on
your computer and want something written quick that can be checked as you go along. Any
editing can be easily done and making any mistakes as the word processor is going to pick them
up and ensure that you correct them. There are simply no disadvantages to word processing that
you will find.
The most efficient word processing application I recommend is Microsoft Word because it often
comes with integrated with the Windows operating system iWork pages that help Apple users in
processing, creating and work with word documents.
4. By use of a clear diagram explain the architecture
of a computer system.
CPU
CONTROL UNIT
MEMORY UNIT
Internet is used in making automation platform where the use of marketing automation platforms
for business is another advantage of that is currently in demand. Automation means internet
application and therefore the software is used to manage and run the businesses from which they
are assigned.
Customer support is the most essential part of the business process, using social media pages and
less costly to solve customer problems without the visiting physical location of the business. Its
also making customer and clients more powerful and the companies who think their customer
will get a competitive advantage over others.
Employee training and development which are very important to grow and run a business
successfully. On the internet, there are various methods that your staff can access and they can
improve their skill at their own pace.
Employee engagement where internet allows business owners to increase employee engagement
to achieve business and personal goals.