1 / 22

Welcome to ICT IN Business Outcome 2

Welcome to ICT IN Business Outcome 2. During this outcome you will learn about Electronic Data Communication Systems. By the end of this programme, you should be able to:. By the end of this programme, you should be able to:. Describe different data communications systems

novia
Download Presentation

Welcome to ICT IN Business Outcome 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome to ICT IN Business Outcome 2 During this outcome you will learn about Electronic Data Communication Systems

  2. By the end of this programme, you should be able to: By the end of this programme, you should be able to: • Describe different data communications systems • Evaluate different data communications systems • Identify security threats and procedures • Describe new ICT innovations • Evaluate new ICT innovations

  3. LANS TOPOLOGY WANS COMMUNICATION INTERNET OUTCOME 2 OUTCOME 2 OUTCOME 3 OUTCOME 2 INNOVATION SECURITY

  4. COMMUNICATION SYSTEMS All organisations need good communication systems if they are to be successful. THE COMMUNICATION PROCESS DATA INFORMATION DECISION FEEDBACK REVIEW IMPLEMENT

  5. BENEFITS OF ELECTRONIC COMMUNICATION SYSTEMS • Improves communication within and between organisations • Reduces costs • Improves quality of information • Improves availability of information • Allows sharing of resources • Allows for flexible working • Promotes collaboration • Contributes to success of business

  6. WHAT IS A NETWORK? A network is two or more computer systems linked by a communication medium such as cable, telephone line, radio waves, satellite or infra-red light. A network will provide the following benefits: • Sharing of information • Sharing of resources • Improve efficiency • Allow electronic communication TYPES OF NETWORK The main types of network are: Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN) Click here to learn more about different types of networks

  7. File Server HOW A LAN WORKS A computer called a file server controls the network by sending files from its disk drive to all parts of the system. LOCAL AREA NETWORK A Local Area Network generally has the following characteristics: • Confined to a relatively small area • Limited to a particular building • Computers usually less than 1 mile apart • Used by small to medium sized businesses

  8. WIDE AREA NETWORK A Wide Area Network generally has the following characteristics: • covers a wide geographical area • used by large organisations • connected by telephone line, leased line or satellite • provides online conferencing between employees in different locations

  9. NETWORK HARDWARE The following components are used in computer networks • Servers • Clients or Workstations • Routers • Hubs • Switches • Network Interface Cards Click on the above image and then on devices to find out more about network components

  10. OPERATING SYSTEMS The two main types of network operating systems are: • Client/Server • Peer to Peer Click here and then on network types to find out more

  11. NETWORK TOPOLOGIES Network topology refers to the physical layout of the network systems. The main topologies are • Bus • Ring • Star • Mesh • Hybrid Click on the this image and then on topologies to find out more

  12. INTERNET The Internet is a network of networks that links computers across the world. It consists of servers and communications links between them. Click on the image below for more information.

  13. BUSINESS USES OF THE NET • Email provides a quick and cheap method of communication • World Wide Web provides means of publishing company information globally • File Transfer allows files to be transferred across the internet • Newsgroups are discussion forums that can be used for market research purposes

  14. Theft Power Surge SECURITY THREATS Hackers Flood Disclosure Virus Data Deletion Fire Data Modification Accidental Damage Power Failure

  15. SECURITY PROCEDURES Good practice involves: • Development of security policy • Allocation of responsibilities • Security training • Incident reporting • Implementing Security Measures • Reviewing and updating Security Measures

  16. SECURITY MEASURES • Fireproof cabinets • Positioning of computer to minimise unauthorised use • Shred confidential printouts • Passwords • Door Locks • Identification System • Equipment Log • Burglar Alarms • Regular Back-ups • Install anti-virus software • Encryption System • Install firewall

  17. INNOVATION Tasks Links Wi-fi Innovation OUTCOME 3 XML Broadband

  18. LINKS • http://www.zdnet.com • http://technology.guardian.co.uk/ • http://www.microsoft.com/homepage/ms.htm • http://news.bbc.co.uk/1/hi/technology/default.stm

  19. You have now completed this tutorial Click here to return to the home page

  20. OUTCOME 2 ICT in Business OPERATING SYSTEMS • Client/Server In a client/server system resources are controlled by a central computer called a file server. Client resources are accessed through the server

  21. OUTCOME 2 ICT in Business OPERATING SYSTEMS • Peer to Peer A peer-to-peer system does not have a dedicated server. Each computer may act as both a client and a server. Users can share folders and peripherals.

  22. OUTCOME 2 ICT in Business FIREWALL • Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria

More Related