IT Application for Business 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Bulacan State University

SY 2024-2025_1st Sem

TOPICS:
 Computer Hardware and Software
 File Management and Transferring Data
 Networked Systems and Security Hardware/Software Functions and Maintenance

Computer Hardware and Software

Hardware is any element of a computer that's physical. This includes things like monitors, keyboards, and also the
insides of devices, like microchips and hard drives.

Software is anything that tells hardware what to do and how to do it, including computer programs and apps on your
phone. Video games, photo editors, and web browsers are just a few examples.

In the simplest of terms, hardware needs software to tell it what to do, but software also needs hardware in order to act
out its directions. When you combine the two, you can do all sorts of things, whether you're using a smartphone,
computer, or any other type of device.

External Hardware
 External hardware devices (peripherals) – any hardware device that is located outside the computer.
 Input device – a piece of hardware device which is used to enter information to a computer for processing.

Examples: keyboard, mouse, trackpad (or touchpad), touchscreen, joystick, microphone, light pen, webcam,
speech input, etc.
 Output device – a piece of hardware device that receives information from a computer.
Examples: monitor, printer, scanner, speaker, display screen (tablet, smartphone …), projector, head phone, etc.
Computer Software
 System software- it is designed to run a computer’s hardware and application software, and make the computer
system available for use. It serves as the interface between hardware, application software, and the user.
Main functions:
 allocating system resources
 managing storage space
 storing and retrieval of files
 providing security
Examples:
 Microsoft Windows
 Apple iOS
 Android OS
 macOS, Linux

 Device driver- a software program that is designed to control a particular hardware device that is attached to a
computer.
Main functions:
 Acts as a translator between the hardware device and operating systems or applications that use it.
 Instructs computer on how to communicate with the device by translating the operating system’s
instructions into a language that a device can understand in order to perform the necessary task.
Examples:
 printer driver
 display driver
 USB driver
 sound card driver
 motherboard driver
 ROM driver

 Utility software- a type of system software that helps set up, analyze, configure, strengthen, maintain a
computer and performs a very specific task
 antivirus software
 backup software
 memory tester
 screen saver

References:
Computer Science: hardware and software. (n.d.). GCFGlobal.org.
https://edu.gcfglobal.org/en/computer-science/hardware-and-software/1/

Wang, M. (2020, November 27). Topic B: Computer hardware and software. Pressbooks.
https://opentextbc.ca/computerstudies/chapter/computer-hardware-and-software/
File Management and Transferring Data

Basic file management refers to a way to name, save, backup, organize files/folders and keep track of files on a
computer.

Effective File Management

1. Save Only Relevant Documents: Avoid clutter by saving only necessary files.
2. Use Consistent Naming: Create a clear folder structure with descriptive names.
3. Group Related Documents Together: Store all files related to a project in one folder.
4. Separate Ongoing from Completed Work: Keep active files accessible, then archive when done.
5. Avoid Overloading Folders: Break large folders into subfolders for better organization.
6. Organize by Date: Include dates in filenames for easy chronological sorting.
7. Digitize Paper Documents: Create digital copies for easier access and storage, when appropriate.

Benefits of a File Management System

Better Organization: Systematically organized files are easy to find and access, reducing the risk of duplicate
files wasting storage.

Boosted Productivity: Efficient file management saves time, allowing you to work more effectively without
the hassle of searching for misplaced files.

Version Control: Virtual filing systems often offer version control, helping you track changes, revert to
previous versions, and avoid accidental overwrites.

Scalability: As your organization grows, a scalable file management system makes it easier to handle an
increasing volume of data.

File Transfer

According to Techopedia: “File transfer is the process of copying or moving a file from one computer to
another over a network or internet connection. It enables sharing, transferring or transmitting a file or a logical
data object between different users and/or computers both locally and remotely.”

Key File Transfer Protocols

1. FTP (File Transfer Protocol): A standard network protocol used to transfer files from one host to another.
2. SFTP (Secure File Transfer Protocol): An extension of FTP that includes encryption to secure the transfer
process.

Importance of Security- Ensuring secure file transfers is essential, especially for businesses dealing with
sensitive data. Protocols like SFTP help in maintaining data integrity and confidentiality.

Modern File Transfer Solutions:

 Integration with cloud services allows for scalable file management.


 Automation tools streamline the transfer process, reducing manual intervention.
 Compliance with data regulations is achieved by implementing secure transfer methods.

Scalability and Efficiency- As organizations grow, the volume of data increases, making scalable and
efficient file transfer solutions crucial. These systems support managing large amounts of data without
compromising on speed or security.

Effective file transfer methods are essential for smooth and secure data management in any organization. They
help in maintaining productivity, ensuring data security, and complying with regulatory requirements.

References:

What is File Management? Definitions, benefits & tools. (n.d.). https://www.rock.so/blog/what-is-file-management

What is file transfer? | IBM. (n.d.). https://www.ibm.com/topics/file-transfer

MindTools | Home. (n.d.). https://www.mindtools.com/ahjudzv/7-tips-for-effective-file-management


Networked Systems and Security Hardware/Software Functions and Maintenance

Computer Network Types


- The network allows computers to connect and communicate with different computers via any medium. LAN,
MAN, and WAN are the major three types.

1. LAN (Local Area Network)


- connects network devices in such a way that personal computer and workstations can share data, tools and
programs. The group of computers and devices are connected together by a switch, or stack of switches, using a
private addressing scheme as defined by the TCP/IP protocol. Private addresses are unique in relation to other
computers on the local network. Routers are found at the boundary of a LAN, connecting them to the larger
WAN.

2. MAN (Metropolitan Area Network)


- Covers a larger area than that of a LAN and a smaller area as compared to WAN. It connects two or more
computers that are apart but resides in the same or different cities. It covers a large geographical area and may
serve as an ISP (Internet Service Provider). MAN is designed for customers who need high-speed connectivity.
-

3. Computer Network or network


is a group of computers and
devices.
4. Being connected to the
network can communicate.
Information exchange and
5. equipment Network sharing
"network that has multiple
dimensions. From a small
6. computer connected by
only a few machines. For
use in the home or in a
small
7. company. To a large
network of interconnected
worldwide Home Network or
home
8. network. A LAN (Local
Area Network) , the reader
will find the following. A
small
9. computer network. Refers to
the introduction of computers and
devices. The connected
10. home. What was the purpose of

computing the like

11. Computer Network or network


is a group of computers and
devices.
12. Being connected to the
network can communicate.
Information exchange and
13. equipment Network sharing
"network that has multiple
dimensions. From a small
14. computer connected by
only a few machines. For
use in the home or in a
small
15. company. To a large
network of interconnected
worldwide Home Network or
home
16. network. A LAN (Local
Area Network) , the reader
will find the following. A
small
17. computer network. Refers to
the introduction of computers and
devices. The connected
18. home. What was the purpose of
computing the like
Uses Of Metropolitan Area Network. MANs are typically used for:

 Education. Connecting a university inside a city.

 Military. Facilitating armed forces communication.

 Financial. Allowing banks and other financial institutions to talk.

3. Wide Area Network (WAN)

- is a computer network that extends overa large geographical area, although it might be confined within the bounds of a
state or country. A WAN could be a connection of LAN connecting to other LAN’s via telephone lines and radio waves
and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high
speed and relatively expensive.
Examples of Wide Area Network

 Mobile broadband networks. This category includes 4G Networks.

 Private networks. A company with many offices in one region can be linked together via a WAN.

 Last mile networks. Telecommunication companies can use fiber-optic connections to provide customers with
Internet access and services.

Network Maintenance

A proper network maintenance equates to keeping all aspects of the infrastructure running like a well-oiled machine it
provides three critical benefits: Continuous Network Operations, Lower Maintenance costs, and Enhanced Security
Posture. IT leaders must recognize this continual care as imperative, not optional.

Three IT Team Roles in Network Maintenance

 Network Technicians- Handle most routine daily, they ensure basic operations.
 Network Engineers – Conduct more complex performance optimization, they focus on enhancements.
 Network Administrators – Take on big-picture responsibilities. They connect strategic priorities to on-the-
ground execution.

Essential Network Maintenance Tasks and Best Practices

SOFTWARE

 Continuous Monitoring and Alerting


- Proactively monitoring network health metrics in real-time and configuring alert thresholds is crucial for
catching potential problems before they disrupt operations.

For example, if a core router’s CPU usage suddenly spikes, connectivity slowdowns may follow. Alerts notify
IT staff who can then quickly investigate and address the condition before complaints roll in.

 Regular Data and Config Backup


- Backups should include network device configs, directory services data, telecom configs, network
documentation/diagrams, security plans, and software installer files. Failing to maintain reliable backups
exposes organizations to severe downtime and recovery costs if disaster strikes.

 Maintaining a Network Asset Inventory


- This inventory enables IT teams to proactively replace aging hardware on schedule, quickly identify devices
needing upgraded software, validate lifecycle costs, and adaptively adjust support contracts. Avoiding untracked
inventory blindspots that lead to outages down the road.

 Guarding Against Malware and Ransomware


- Updating antivirus and antimalware signatures and definitions in endpoints and security solutions is a crucial
maintenance protocol in today’s threat climate.

HARDWARE

 Regular Hardware Inspections data center management


- While software and configurations power networks, the underlying physical gear remains critical. Technicians
must periodically inspect equipment for deficiencies including:
 Dust buildup that leads to overheating
 Broken ports or cable connections
 Mislabeled or unplugged cables
 Outdated modules and transceivers
 Damage from environmental factors like moisture
 Lack of space between devices for ventilation
 Telecom room and cabinet organization
 Corrective actions like cleaning, repairs, part replacements, and reorganizations improve reliability.

 Scheduled Preemptive Repairs and Parts Replacement


 To avoid disruptions from component failures, IT teams should strategically replace parts on a schedule
before they reach the expected end of life.
 For example, replacing firewalls every 5 years or wiring switches on a 7-year cycle prevents availability
issues. Age analysis reports from network monitoring inform preemptive planning.
 Scheduling infrastructure refreshes during maintenance windows and budgeting accordingly allows
organizations to stay ahead of problems through proactive upkeep.

References:

Patel, H., & Patel, H. (2023, December 13). Mastering Network Maintenance: 11 Essential Tasks for Peak performance.
WPG Consulting. https://wpgc.io/blog/mastering-network-maintenance-11-essential-tasks-for-peak-
performance/

Studocu. (n.d.-b). Lesson 2 Network System - NETWORK SYSTEMS WHAT IS NETWORK SYSTEMS Computer
Network or network is a - Studocu. https://www.studocu.com/ph/document/world-citi-college/networking/
lesson-2-network-system/21707673
Terra, J. (2024, August 13). What is a computer network? Definition, components, objectives, and best practices.
Simplilearn.com. https://www.simplilearn.com/what-is-computer-network-article

You might also like