Professional Documents
Culture Documents
Final Assignment-MIs107
Final Assignment-MIs107
Submitted By
NAME & ID & SECTION Score
MD. Zahid Hossan
ID:1911877630
Section: 21
Submitted To
Abu Sayeed Arif (ASA1)
Lecturer
Department of Management
North South University
❖ Table of Contents
THE USE OF INFORMATION TECHNOLOGY .................................................................................. 2
❖ Information Technology ..................................................................................................................... 2
❖ Characteristics Of Information : ....................................................................................................... 2
❖ Use of information technology: .......................................................................................................... 2
❖ Reasons why Information Technology needed ................................................................................. 3
➢ Information Technology is needed in Business: ........................................................................... 3
➢ Information Technology is needed in Education: ........................................................................ 4
➢ Information Technology is needed in Finance.............................................................................. 4
➢ Information Technology is needed in Healthcare ........................................................................ 5
➢ Information technology is needed in Security .............................................................................. 5
❖ Challenges of Information Technology: ............................................................................................ 5
➢ There are a lots of challenges that IT needs to face ..................................................................... 5
1. Security ........................................................................................................................................ 5
2. Privacy Issues .............................................................................................................................. 6
3. Copyright Infringement ............................................................................................................. 6
4. Increased pressure on IT specialists .......................................................................................... 7
5. Digital isolate ............................................................................................................................... 7
❖ Recommendation: ............................................................................................................................... 7
Conclusion: .................................................................................................................................................. 8
REFERENCES: .......................................................................................................................................... 9
1|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
❖ Characteristics Of Information :
➢ There ought to be few characteristics of information technology. These
characteristics are must:
2|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
5. Highly gainful for the average folks, as they can get to their
privileges and can make lawful move against the individual who
abuses his/her privileges.
3|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
is available online securely. This licenses advance pros, protection offices, and
associations to run a smart credit mind you making it far less difficult to open
credit.
1. Security: With gadgets like the web, developers have believed that it was
definitely not hard to hack into any PC or system as long as it is related
on web. Software engineers can without a lot of a stretch use an IP
(Internet Protocol) address to get to a customer's PC and assemble data
5|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
for intolerant reasons. In like manner the wide spread of web treats which
accumulate information at whatever point we use the web , has introduced
IT customers to high perils of distortion and conflicting interests. Various
enormous associations use these treats to make sense of which things or
organization they can announce to us. Concerning web banking, the
trading of money can without a lot of a stretch be obstructed by a software
engineer and all the money will be moved to their optimal records , which
impacts both the bank and the customers who is using electronic
budgetary development.
❖ Recommendation:
The present cloud-based applications require high information throughput which is more
perceptible than the fundamental web association merchants have introduced. Those sellers that
have not enough idea to switch over or moving to a fiber optics alliance ought to consider doing
so now. This will oblige the speed or devoted quality for all the information to process. Bringing
fiber won't just mull over a progressively weighty relationship for information throughput, it will
in addition help your business profit by having speedier systems.
➢ There are two or three different techniques for guaranteeing about your dealer
information and foundation. The broadest is setting up your representatives on
these suspicious dangers and how to deal with any potential messages that
should navigate your system. Having a recorded security process procedure is
a verifiable need in giving your workers rules of what is permitted and not to
guarantee the thriving of your business resources. Dealers ought to besides have
firewalls set up with critical programming for obstruction contradiction. This
will set up prosperity tries from an equipment viewpoint and will screen most
7|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
outside dangers. A shaped and point by point security desire plan may even
diminish the top notch cost of IT Security Insurance.
➢ Most sellers today are being locked in for studies by Microsoft alone. Those
vendors that are not in consistence are being hit with colossal fines by the
Business Software Alliance. To keep up a key decent ways from these fines,
dealers need to guarantee that their workers are not utilizing unlicensed
programming. A few different techniques for keeping up a key decent ways
from this is through reasonable preparing of the operator on the "do's and don'ts"
of programming downloads. Another path is to appropriately "lockdown" the
PC and endorsements of the end client to not permit downloads of any ".exe"
report. The fines identified with a potential programming review can be in the
millions. Venders can't stay to upset this. Without the best reliability and
systems set up, this is essentially one more hazard your business could drive
forward. Best to be as mindful as could be normal the situation being what it is,
guarantee your business is made sure about by these potential risks to your
fundamental concern.
Conclusion:
In conclusion, information technology plays a big role in our life. However, if you’re not in the
field of information technology yourself, you might not know just how information technology
touches your life. Every sector in our life, IT helps us to bring innovative things. Progress in huge
numbers of the fundamental processing and Information Technologies has been quick as of late,
and the board doesn't anticipate that the pace of progress should back off within a reasonable time-
frame. While a few innovations are arriving at the development now, numerous significant
advancements have gigantic future potential. As a greater amount of the world's data is digitized
and more individuals and things are organized, the financial aspects of the advanced, arranged
economy will turn out to be always significant. This incorporates the capacity to make duplicates
of products and ventures at right around zero cost and convey them anyplace on the planet quickly.
Moreover, digitization of items, administrations, procedures, and associations makes it
conceivable to gauge and oversee work with unquestionably more exactness. Information driven
dynamic and AI give huge chances to improving profitability, productivity, precision, and
advancement.
8|Page
MD. Zahid Hossan
Date:18-04-2020
Assignment:1
REFERENCES:
1. https://www.globalknowledge.com/us-en/resources/resource-library/articles/12-
challenges-facing-it-professionals/
2. https://medium.com/@lolitopesimoii/the-role-of-information-technology-in-business-
success-ecb2d7e2283
3. https://khaitanpublicschool.com/blog/information-technology-in-education/
4. https://www.techfunnel.com/fintech/the-role-of-information-technology-in-financial-
services/
5. https://www.acog.org/clinical/clinical-guidance/committee-
opinion/articles/2015/01/patient-safety-and-health-information-technology
6. https://www.udemy.com/blog/importance-of-information-technology/
9|Page
MD. Zahid Hossan
Date:18-04-2020