SlideShare una empresa de Scribd logo
1 de 4
Case Study No. 2

      People use computers in a variety of fields, including education, finance,
government, health care, science, publishing, travel, and manufacturing. Although the
way people use computers varies, each use of a computer involves computer hardware,
computer software, and normally some type of communications capability over
networks, such as the Internet. Form a five member team and choose a field in which
you are all interested.

        Using the Web, and/or print media, assign two members of your team to
investigate hardware used in the field, another member to investigate software used in
the field, and the rest to investigate communication capabilities used in the field. After
your investigation characterize a hypothetical business or organization in the field.
Based on your investigation prepare a report that recommends specific hardware,
software, and networking capabilities that would be best for the business or
organization; explain your recommendations in the report.

The Field we chose is the Government.

        First of all what is hardware based on my research Hardware is a general term
for      equipment        that    can     be      touched/held       by    hand       such
as keys, locks, hinges, latches, handles, wire,                                     chains,
plumbing supplies, Electrical Supplies, tools, utensils, cutlery and machine parts.      In
Government one of the most used hardware is the computer .Computers are used in
Data processing for efficient and effective delivery of services, Power shifts between
branches of government (executive , legislative , and judicial) and federal versus state
jurisdictions, Usage in crime prevention: NCIC, Computerized defense systems: smart
weapons and depersonalized armies and many more.

       Next is the software. Software is a computer instructions or data. Anything that
can be stored electronically is software. The storage devices and display devices
are hardware. The distinction between software and hardware is sometimes confusing
because they are so integrally linked. Clearly, when you purchase a program, you are
buying software. But to buy the software, you need to buy the disk(hardware) on which
the software is recorded. One of the most used software in a government is the
information storage and retrieval system or also known as ISRS. An information storage
and retrieval system (ISRS) is a network with a built-in user interface that facilitates the
creation, searching, and modification of stored data. An ISRS is typically a peer-to-peer
network operated and maintained by private individuals or independent organizations,
but accessible to the general public. Some, but not all, ISRSs can be accessed from the
Internet. (The largest ISRS in the world is the Internet itself.)
Characteristics of an ISRS include lack of centralization, graceful degradation in
the event of hardware failure, and the ability to rapidly adapt to changing demands and
resources. The lack of centralization helps to ensure that catastrophic data loss does
not occur because of hardware or program failure, or because of the activities of
malicious hackers. Graceful degradation is provided by redundancy of data and
programming among multiple computers. The physical and electronic diversity of an
ISRS, along with the existence of multiple operating platforms, enhances robustness,
flexibility, and adaptability. (These characteristics can also result in a certain amount of
chaos.) In addition to these features, some ISRSs offer anonymity, at least in theory, to
contributors and users of the information.

       A significant difference between an ISRS and a database management system is
the fact that an ISRS is intended for general public use, while a database management
system is likely to be proprietary, with access privileges restricted to authorized entities.
In addition, an ISRS, having no centralized management, is less well-organized than a
database management system.

        Lastly, communication capabilities used in the government field. One of the most
used communication capabilities used in the government is using the internet.
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. So using
internet you can use it as a way to communicate to others or to communicate globally in
a easy way simply just by using the internet. And if you used it effectively it will result to
impressive and effective communication skill, which can make you happy, well known,
victorious, loving and content. Communication increases many aspects of life.
Communication is a part and parcel of our everyday life. There are many benefits of
good communication skills. And if there will be a good communication there will be
peace.
In this illustration we see the Alternating periods of economic growth and
contraction.

      One of the most basic analysis frameworks you can use to solve a business
problem is the “cost-benefit analysis”. This method is fairly self-explanatory. It involves
weighing up the total expected costs and benefits of one course of action against
another. Having done this, you will be able to formulate a more well-thought-out solution
to the business problem. So in this problem I recommend the use of Computers,
Information Storage and the Internet it makes the analization easy and you can use it as
a medium to make the work easier.
Case Study on Government Use of Computers, Software and the Internet

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Programming with Python
Programming with PythonProgramming with Python
Programming with Python
 
CSS for Beginners
CSS for BeginnersCSS for Beginners
CSS for Beginners
 
Introduction to JavaScript (1).ppt
Introduction to JavaScript (1).pptIntroduction to JavaScript (1).ppt
Introduction to JavaScript (1).ppt
 
C++ Programming
C++ ProgrammingC++ Programming
C++ Programming
 
Programming
ProgrammingProgramming
Programming
 
Programming Fundamentals lecture 1
Programming Fundamentals lecture 1Programming Fundamentals lecture 1
Programming Fundamentals lecture 1
 
Creating a webpage in html
Creating a webpage in htmlCreating a webpage in html
Creating a webpage in html
 
Function Pointer
Function PointerFunction Pointer
Function Pointer
 
Introduction to CSS
Introduction to CSSIntroduction to CSS
Introduction to CSS
 
Standard Library Functions
Standard Library FunctionsStandard Library Functions
Standard Library Functions
 
C by balaguruswami - e.balagurusamy
C   by balaguruswami - e.balagurusamyC   by balaguruswami - e.balagurusamy
C by balaguruswami - e.balagurusamy
 
Java chapter 2
Java chapter 2Java chapter 2
Java chapter 2
 
Basics PHP
Basics PHPBasics PHP
Basics PHP
 
Iostream in c++
Iostream in c++Iostream in c++
Iostream in c++
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
History of C Programming Language
History of C Programming LanguageHistory of C Programming Language
History of C Programming Language
 
Data Input and Output
Data Input and OutputData Input and Output
Data Input and Output
 
Python Course for Beginners
Python Course for BeginnersPython Course for Beginners
Python Course for Beginners
 
Flexbox
FlexboxFlexbox
Flexbox
 
Data structure and algorithm using java
Data structure and algorithm using javaData structure and algorithm using java
Data structure and algorithm using java
 

Destacado

Case Study on Business Communication
Case Study on Business Communication Case Study on Business Communication
Case Study on Business Communication Sunam Pal
 
Communications Case Study
Communications Case StudyCommunications Case Study
Communications Case StudyBest Practices
 
Case study barriers in communication
Case study barriers in communication  Case study barriers in communication
Case study barriers in communication AJ Raina
 
Case Study on Business Communication
Case Study on Business CommunicationCase Study on Business Communication
Case Study on Business CommunicationSunam Pal
 
Barriers of Communication
Barriers of CommunicationBarriers of Communication
Barriers of Communicationvenkatesh yadav
 
5 barriers to effective communication
5 barriers to effective communication5 barriers to effective communication
5 barriers to effective communicationDiego Rodrigo
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communicationNamrata Jadhav
 

Destacado (9)

Casestudy on effective communication
Casestudy on effective communicationCasestudy on effective communication
Casestudy on effective communication
 
Case Study on Business Communication
Case Study on Business Communication Case Study on Business Communication
Case Study on Business Communication
 
Communications Case Study
Communications Case StudyCommunications Case Study
Communications Case Study
 
Case study barriers in communication
Case study barriers in communication  Case study barriers in communication
Case study barriers in communication
 
Case Study on Business Communication
Case Study on Business CommunicationCase Study on Business Communication
Case Study on Business Communication
 
Barriers of Communication
Barriers of CommunicationBarriers of Communication
Barriers of Communication
 
5 barriers to effective communication
5 barriers to effective communication5 barriers to effective communication
5 barriers to effective communication
 
Breaking Barriers To Effective Communication
Breaking Barriers To Effective CommunicationBreaking Barriers To Effective Communication
Breaking Barriers To Effective Communication
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
 

Similar a Case Study on Government Use of Computers, Software and the Internet

Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxsherni1
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data ManagementArmanArafatAnik
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxJohnsmithAlberto2
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information SystemJack Frost
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information systemNareshBabu285920
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communicationKAYJOANNELIWANAGAN
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and YouAjboyDiog
 
future-of-interoperability.pdf
future-of-interoperability.pdffuture-of-interoperability.pdf
future-of-interoperability.pdfFredReynolds2
 
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptThe Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptFredReynolds2
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1shaik subhani
 

Similar a Case Study on Government Use of Computers, Software and the Internet (20)

Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Trends of it
Trends of itTrends of it
Trends of it
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data Management
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information System
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
future-of-interoperability.pdf
future-of-interoperability.pdffuture-of-interoperability.pdf
future-of-interoperability.pdf
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptThe Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Case Study on Government Use of Computers, Software and the Internet

  • 1. Case Study No. 2 People use computers in a variety of fields, including education, finance, government, health care, science, publishing, travel, and manufacturing. Although the way people use computers varies, each use of a computer involves computer hardware, computer software, and normally some type of communications capability over networks, such as the Internet. Form a five member team and choose a field in which you are all interested. Using the Web, and/or print media, assign two members of your team to investigate hardware used in the field, another member to investigate software used in the field, and the rest to investigate communication capabilities used in the field. After your investigation characterize a hypothetical business or organization in the field. Based on your investigation prepare a report that recommends specific hardware, software, and networking capabilities that would be best for the business or organization; explain your recommendations in the report. The Field we chose is the Government. First of all what is hardware based on my research Hardware is a general term for equipment that can be touched/held by hand such as keys, locks, hinges, latches, handles, wire, chains, plumbing supplies, Electrical Supplies, tools, utensils, cutlery and machine parts. In Government one of the most used hardware is the computer .Computers are used in Data processing for efficient and effective delivery of services, Power shifts between branches of government (executive , legislative , and judicial) and federal versus state jurisdictions, Usage in crime prevention: NCIC, Computerized defense systems: smart weapons and depersonalized armies and many more. Next is the software. Software is a computer instructions or data. Anything that can be stored electronically is software. The storage devices and display devices are hardware. The distinction between software and hardware is sometimes confusing because they are so integrally linked. Clearly, when you purchase a program, you are buying software. But to buy the software, you need to buy the disk(hardware) on which the software is recorded. One of the most used software in a government is the information storage and retrieval system or also known as ISRS. An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data. An ISRS is typically a peer-to-peer network operated and maintained by private individuals or independent organizations, but accessible to the general public. Some, but not all, ISRSs can be accessed from the Internet. (The largest ISRS in the world is the Internet itself.)
  • 2. Characteristics of an ISRS include lack of centralization, graceful degradation in the event of hardware failure, and the ability to rapidly adapt to changing demands and resources. The lack of centralization helps to ensure that catastrophic data loss does not occur because of hardware or program failure, or because of the activities of malicious hackers. Graceful degradation is provided by redundancy of data and programming among multiple computers. The physical and electronic diversity of an ISRS, along with the existence of multiple operating platforms, enhances robustness, flexibility, and adaptability. (These characteristics can also result in a certain amount of chaos.) In addition to these features, some ISRSs offer anonymity, at least in theory, to contributors and users of the information. A significant difference between an ISRS and a database management system is the fact that an ISRS is intended for general public use, while a database management system is likely to be proprietary, with access privileges restricted to authorized entities. In addition, an ISRS, having no centralized management, is less well-organized than a database management system. Lastly, communication capabilities used in the government field. One of the most used communication capabilities used in the government is using the internet. The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. So using internet you can use it as a way to communicate to others or to communicate globally in a easy way simply just by using the internet. And if you used it effectively it will result to impressive and effective communication skill, which can make you happy, well known, victorious, loving and content. Communication increases many aspects of life. Communication is a part and parcel of our everyday life. There are many benefits of good communication skills. And if there will be a good communication there will be peace.
  • 3. In this illustration we see the Alternating periods of economic growth and contraction. One of the most basic analysis frameworks you can use to solve a business problem is the “cost-benefit analysis”. This method is fairly self-explanatory. It involves weighing up the total expected costs and benefits of one course of action against another. Having done this, you will be able to formulate a more well-thought-out solution to the business problem. So in this problem I recommend the use of Computers, Information Storage and the Internet it makes the analization easy and you can use it as a medium to make the work easier.