StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Technology (Computers) - Coursework Example

Cite this document
Summary
COMPUTERS IN THE WORKPLACE Ethical and legal usage of computers may be unclear for employees. Because of unstated boundaries, there are employees who unknowingly break laws as well as violate computer ethics unintentionally. According to the Free Encyclopedia of Commerce, a recent study on Fortune 500 companies revealed that about 97% of employees feel that it should be necessary to establish grounds which make ethical and non-ethical usage of computers clear…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Information Technology (Computers)
Read Text Preview

Extract of sample "Information Technology (Computers)"

Download file to see previous pages

Such legislations include the Foreign Corrupt Practices act of 1997 and the 1991 Federal Sentencing Guidelines. The Federal Sentencing Guidelines of 1991 states that companies are responsible for their employee’s actions. The Foreign Corrupt Practices act of 1997 was created to recognize questionable actions among corporations. Guidelines that have been created are amongst the following: 1. All forms of communication devices or otherwise that belong to the company can only be used for the benefit of the company.

Only those who are authorized may be able to use the internet but only for official business reasons. 2. Software that is needed to support your job must be analyzed and accepted by a supervisor and installed by the IT department. 3. Use of internet can provide security breaches and other harmful effects to your company’s system. Thus only authorized personal should be able to use the internet. 4. E-mail also applies to this. It can only be used for reasons that involve the company’s intention.

Any viewing of pornography or sending of pornographic messages will be logged and taken against the offender. Any discrimination found in e-mails will also be logged and can be grounds for termination. 5. Any information stored or sent from company’s devices are property of the company. No information created or stored in the workplace should be considered private. Your computer and information can be confiscated at any time. I agree with these terms because this equipment is company owned.

The company has every right to know what is going on with its employers and how its devices are being used. Secondly, work is work. There is time for one to play games but not during work hours and especially not with work property. Information and Hard Discs 1. First the information must be located on a disk. The wares that determine which part of the disk to read can be the application, operating system, system BIOS and a specialized driver software for the disk. 2. One or more translations steps are needed make a final request to the drive producing an address expressed in its geometry.

The drive’s geometry typically consists of terms such as the cylinder, the head and sector of the drive that is supposed to be read. Through the disk drive interface, a request is sent to the drive giving the specified address and permission to retrieve the sector of interest. 3. The control program of the hard disk will begin by checking if the requested information is in the hard disk’s cache. If it is present then the program will supply the information on the spot. 4. Drives are usually spinning.

If the power management has been modified to "spin down" to conserve energy, the drive's controller board will allow the spindle motor to “spin up” the drive so it can operate. 5. The controller board would continue reading and translate information .It would also consider the unique characteristics of the drive. The logic program of the hard disk would consider also the number of the cylinder. The cylinder then relays to the disk what track should be used on the disk’s surface. Then, the actuator finally reads/write the head to the right track. 6. As soon as the heads are in the right place, it starts reading the location.

It prioritizes the sector that was requested to be read. The disk would

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology (Computers) Coursework Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1410038-information-technology-computers
(Information Technology (Computers) Coursework Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/finance-accounting/1410038-information-technology-computers.
“Information Technology (Computers) Coursework Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/finance-accounting/1410038-information-technology-computers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology (Computers)

Ethics In Information Technology

In the current age of information technology, computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research.... hellip; Today, computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research.... Moreover, it leads to use of computers to destroy and harm other people, which is in contravention to the computer ethics.... This is in contravention to computer ethics that advocate for respect for societal values in the use of computer technology....
3 Pages (750 words) Research Paper

The Advancement of the Information Age

hellip; Despite the fact that information technology has been instrumental in increasing efficiency in every sector, there is the question of the right and wrong actions as it pertains to use of information technology and these issues are what are referred to as ethical considerations (Sembok, 2003).... Ethics in information technology is a branch of philosophy that deals with how people should make decisions concerned with their professional conduct, when using information technology....
4 Pages (1000 words) Term Paper

Improving Technology Management

Improving Technology management Name Institution In order for an information technology Manager to improve the performance of the technological based employees he should have good management skills, which involves determining both the probability, and the impact of occurrence.... This paper gives a foundation for the development of a good management program, including both definitions and some practical guidelines necessary for improving risks identified within information technology systems (Khosrowpour, 1999)....
4 Pages (1000 words) Research Paper

Growth of IT industry in Estonia: Government Strategies and Results

Estonia has emerged as a role model for other countries because the officials of the country understood the importance of information technology from a very early start.... The importance of computers started to emerge in the early nineties and the well-versed administration of Estonia oversaw the importance of computers in the daily life of the people and started to work in the favor of the technology.... This report "Growth of IT industry in Estonia: Government Strategies and Results" presents a comparison of the techno-economic situation of Estonia and Kenya, that dedication towards enhancement of technology environment assisted Estonia to emerge as an internationally recognized hub for business....
13 Pages (3250 words) Report

FingerID: A new Security Model on Distributed System By using Finger Print

Such a security technology which is gaining name is the biometric technology.... Users tend to maintain several online accounts at the same time but do not take extensive measures to keep them secure.... The authentication mechanism on the web is based on the conventional mode of… An efficient and convenient mode of authentication has been proposed in this research that is based on unique characteristics of individuals- fingerprints....
20 Pages (5000 words) Essay

Why Senior Citizens Refuse to Learn IT

People yearning to join the society in the information technology revolution compete along the lines of ethnicity, wealth and nationality.... hellip; One area that has not been covered extensively is the knowledge and skill levels of information technology among the elderly population or senior citizens.... The second force is the fact that senior citizens have more disposable income than youths to spend on information technology.... information technology is one of the ubiquitous developments that characterize the 21st century....
6 Pages (1500 words) Admission/Application Essay

Information Technology of Vehicles

(Packaging International, 2008)      We are in the age of the 'global village', information technology, computers, and the internet.... We can feature our products, the management staff, blogs for the customers to post their problems and complaints, and other valuable information.... The customers' information will be listed in the website's directory with their own customers' panel.... The customers will have to furnish us with the following information: what products they want, the date of delivery, quantity, transportation details, the staff, supervisor, and manager responsible for the handling and shipment of the products....
12 Pages (3000 words) Term Paper

Olympic Games in London

information technology will play a major role in facilitating, improving, and implementing measures geared toward the success of the 2012 London Olympics Games.... information technology support and improve transportation systems before, during, and after the Olympic Games....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us