StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Technology and the Networked Organization - Essay Example

Cite this document
Summary
"Computer Technology and the Networked Organization" paper focuses on the networking structure and the technologies suitable for a medium-sized food store to run its business-facing minimum communication hurdles. The choice of network structure plays a role to keep a track of the business progress. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Computer Technology and the Networked Organization
Read Text Preview

Extract of sample "Computer Technology and the Networked Organization"

? Computer Technology And The Networked Organization (Case) Introduction Computer network is an interrelated assemblage of devices that allows storing, recovering, and sharing of data. It also allows individuals to communicate efficiently within the different organizational dimensions. Conceptually, such network comprises a collection of computers, printers and other equipments that are connected together to result in smooth communication (Bakardjieva, n.d.). Various forms of computer networks like local area network, wide area network and metropolitan area network are used by modern business organizations for the same purpose. Geographical area coverage of the business has a strong impact on the choice of network selection. Moreover, the computer networking structure classification depends on its physical topology (Bonaventure, 2011). In this paper, the focus has been rendered on the networking structure and the technologies suitable for a medium sized food store to run its business facing minimum communication hurdles. The choice of network structure and its link with the technology used plays a vital role to keep a track of the business progress, without much human intervention and distortion. Discussion Networking Architecture In today’s world, computer network system is not just an interconnected device. It is widely used to bridge the gap between the two ends of a communication channel, i.e. the communicator and the receiver. The choice of the network design depends on the business structure and its underlying intention. The network configurations used by organizations commonly include peer-to-peer or the client/server frameworks (Bakardjieva, n.d.). The peer-to-peer network is used when there are less than ten computers connected with each other in a workplace to share the files, word documents, printers, and access to internet within a small geographical area i.e. in a same floor. It has no server; hence, the computers connect with each other in the form of a workgroup to share files (Bakardjieva, n.d.). Fig. 1: Peer- To-Peer Networking (Bakardjieva, n.d.) Again, client/server network configuration is regarded as suitable for larger workgroups. The model contains three components, viz. client, server and service. The central server acts as a storing place for files and applications shared through the network. Aided with NT Domain Controller, the client/server network allows all the computers of the workgroup to share common facility. The server controls the network access of the computers. These computers are referred as ‘client computers’. The server can also offer numerous benefits, including centrally transmitted Internet Access, file sharing and printer access, simultaneously safeguarding safety across the network. This network is most frequently found in corporate configurations, where security of network is essential for the business to run efficiently (Bakardjieva, n.d.). Fig: 2 Client- Server Networking (Bakardjieva, n.d.) The network design that can be implemented in the food store is the client/server network. This is because the business requires all the employees to log in to the system using one server for proper flow of information. Additionally, the management, with the use of one server can share files with the employees, minimizing security risks (Lewandowski, 1998). The management can also keep a track on the system performance of every computer linked with the server and can safeguard the business from any malpractice. The food business can generate secure and effortlessly maintained IT system with this network configuration. In case of any problem, the IT people can work from the main server and resolve the issue. However, when one computer system is trashed, the valuable data in it can be retrieved from the server as it has a back-up for all computers. On the other hand, if the main server fails to work, the computers linked to it cannot be logged on to, creating immense problem for the business (Bakardjieva, n.d.). This particular disadvantage can be mitigated by having regular maintenance of the system. Technology Technology will be used as a major support to the food store business. it is expected to keep a track of the business progress and accordingly, preserve ethical soundness and efficiency throughout the operational system . The technology used for the business will be the Barcode technology, which in general is used to maintain accurate records of the transactions. Barcode will be used in the billing process to make the operations time convenient and resourceful. Apart from this, the barcode scanner will be installed with the intention to assist the management with effective marketing and financial planning. One of the greatest benefits of the barcode technology is its ability to guide effective decisions (Barcode Symbol, 2007). The other technology used by medium sized businesses can be identified as the billing system. This technology will help the food store business in delivering quick services to the customer maintaining updated records of the bills. This will help to monitor the sales revenue growth trend along with customer preferences and project the flow of cash in the business. Likewise, this technology will eliminate the chances of fraud within the business. The billing invoice will also help the customer to obtain a detailed view of the purchases made. Furthermore, the technology will help to increase the efficiency, reliability and dependability of the system and thereafter, significantly reduce customer queries. This will eradicate hindrances due to continuous customer queries and facilitate better organizational performance (BMG food limited, 2012). In addition, the Fast Food automated ordering technology will also be used in the business. This technology will reduce the work pressure on employees at the back counter. Through this technology the customers can also place the order in the food store in a much convenient manner and can minimize the chances of mistakes in the delivery process. Furthermore, this technology will help to face the queues at the counter and in due course speed up the process of service deliverance (Wai, 2011). Conclusion From the above discussion, it can be concluded that a proper networking design and technology will help the business to run efficiently. The technologies planned to be used along with the client/server networking design is expected to be of significant benefits to the business. However, there might be certain challenges associated with this network configuration. For instance, the network system will require continuous maintenance, which may increase operational cost for the business. Additionally, the employees will also be required to be trained for using such complex network, adding to managerial challenges and costs. Thus the business will need to make realistic financial planning prior to implementing the computer technology. References Bakardjieva, T. (n.d.). Introduction to Computer Networking. Retrieved from http://vfu.bg/en/e-Learning/Computer-Networks--Introduction_Computer_Networking.pdf Barcode Symbol. (2007). Barcode Technology. Retrieved from http://www.barcodesymbols.com/information/barcode-technology.htm. Bonaventure, O. (2011). Computer Networking: Principles, Protocols and Practice. Washington: The Saylor Foundation. BMG food limited. (2012). Inpute Technologies’ Central Billing System delivers benefits to BW. Retrieved from http://inpute.com/assets/Inpute-BWG-Central-Billing-Case-Study.pdf. Lewandowski, M. S. (1998). Frameworks for Component-Based Client/Server Computing. ACM Computing Surveys, Vol. 30, No. 1. Wai, S.C. (2011). Customer Self- ordering system in fast food Restaurant. Retrieved from http://eprints.oum.edu.my/670/1/customer_chik.pdf. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer technology and the networked organization (Case) Essay”, n.d.)
Computer technology and the networked organization (Case) Essay. Retrieved from https://studentshare.org/information-technology/1486069-computer-technology-and-the-networked-organization
(Computer Technology and the Networked Organization (Case) Essay)
Computer Technology and the Networked Organization (Case) Essay. https://studentshare.org/information-technology/1486069-computer-technology-and-the-networked-organization.
“Computer Technology and the Networked Organization (Case) Essay”, n.d. https://studentshare.org/information-technology/1486069-computer-technology-and-the-networked-organization.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Technology and the Networked Organization

Network Security

A few years ago, the computer system was seen as a harmless piece of technology and not many people cared really for computer security.... However, since the mid 1980s, networked computer workstations became common and with this came the issue of information and network security.... This is the situation that makes network security such an important matter in today's highly networked society.... The word hacker was first coined by students at the Massachusetts Institute of technology (MIT)....
7 Pages (1750 words) Term Paper

The Computer Simulation Techniques

It can be understood that with the advancements of technology and their uses in the organizations, the internal operations of the organizations are affected particularly considering the case where the organization plans to incorporate computer simulation techniques that has an up-front cost for the company and it is not possible for the company to avoid these expenses.... Organizational changes can be clearly understood through such simulation techniques as an organization becomes capable of deciding on the measures that are needed to be considered in order to manage such changes....
12 Pages (3000 words) Case Study

Computer Information Security Certification

To earn this certification one ought to have four years experience in information technology and computer field although not necessary in high tech position.... Moreover, the individuals can be employed in organizations using information technology systems such as banks and supermarkets.... The certification is offered to Information technology Management and Business and Systems Analysts professionals (Plishner, 2001).... This paper ''computer Information Security Certification'' has provided an analytical discussion and evaluation of various certifications in information security and presented the work that the certified individuals are mandated to perform....
8 Pages (2000 words) Research Paper

CASE- 3 Computer technology and the networked organization

The entire facility will be well equipped with computers and other related devices networked with one another.... Moreover, LAN facilitates the file exchange, electronic mailing and other similar applications (Internetworking technology Handbook, 2012).... n order to establish Italian Food Restaurant I would require computer networking for customer orders, processing and delivery of services....
4 Pages (1000 words) Essay

SLP - 3 Computer technology and the networked organization

In an organisation wiki helps to share information regarding an SLP - 3 Computer Technology and the Networked Organization What Is a Wiki and How Can Be Useful For an Organization Wiki is an open website solution that allows an individual to edit information online.... Wiki is utilised for extensive variety of tasks including information taking, creating inner knowledge base, developing online community and managing website....
2 Pages (500 words) Essay

Network Security Attack Methodologies

The attack capabilities have also increased, due to the development of more advanced hacking and attack tools, following the increased knowledge and skills of computer operation and usage that have come with the advanced technology wave.... This essay "Network Security Attack Methodologies" is about the current computer network security systems which are faced by numerous attacks, thus creating the need for robust means of protecting the systems against threats and potential attacks....
7 Pages (1750 words) Essay

Challenges of Distributed Computing Environments

To begin with, distributed computing is a type of computing where the computational task is divided into subtasks that are performed on a collection of networked computers.... A network can be described as a system where hardware and software components are networked using different computers through which allows these computers to effectively communicate and communicate and coordinate their actions only by message passing(Bernard, Thalheim, JANOS,&Hans pp....
10 Pages (2500 words) Literature review

A Computer Network as a group of Computers Linked Together

Organizations are adopting the use of various network connectivity in order to improve communication between the organization and the other organization.... Additionally, the organization seeks to improve information sharing between branches so as to integrate the various departments of each branch with the central management.... epending on the network types adopted in an organization, there are various types of computer networks that can be used to connect various branches of an organization and the head office....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us