SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Case Study No. 2

      People use computers in a variety of fields, including education, finance,
government, health care, science, publishing, travel, and manufacturing. Although the
way people use computers varies, each use of a computer involves computer hardware,
computer software, and normally some type of communications capability over
networks, such as the Internet. Form a five member team and choose a field in which
you are all interested.

        Using the Web, and/or print media, assign two members of your team to
investigate hardware used in the field, another member to investigate software used in
the field, and the rest to investigate communication capabilities used in the field. After
your investigation characterize a hypothetical business or organization in the field.
Based on your investigation prepare a report that recommends specific hardware,
software, and networking capabilities that would be best for the business or
organization; explain your recommendations in the report.

The Field we chose is the Government.

        First of all what is hardware based on my research Hardware is a general term
for      equipment        that    can     be      touched/held       by    hand       such
as keys, locks, hinges, latches, handles, wire,                                     chains,
plumbing supplies, Electrical Supplies, tools, utensils, cutlery and machine parts.      In
Government one of the most used hardware is the computer .Computers are used in
Data processing for efficient and effective delivery of services, Power shifts between
branches of government (executive , legislative , and judicial) and federal versus state
jurisdictions, Usage in crime prevention: NCIC, Computerized defense systems: smart
weapons and depersonalized armies and many more.

       Next is the software. Software is a computer instructions or data. Anything that
can be stored electronically is software. The storage devices and display devices
are hardware. The distinction between software and hardware is sometimes confusing
because they are so integrally linked. Clearly, when you purchase a program, you are
buying software. But to buy the software, you need to buy the disk(hardware) on which
the software is recorded. One of the most used software in a government is the
information storage and retrieval system or also known as ISRS. An information storage
and retrieval system (ISRS) is a network with a built-in user interface that facilitates the
creation, searching, and modification of stored data. An ISRS is typically a peer-to-peer
network operated and maintained by private individuals or independent organizations,
but accessible to the general public. Some, but not all, ISRSs can be accessed from the
Internet. (The largest ISRS in the world is the Internet itself.)
Characteristics of an ISRS include lack of centralization, graceful degradation in
the event of hardware failure, and the ability to rapidly adapt to changing demands and
resources. The lack of centralization helps to ensure that catastrophic data loss does
not occur because of hardware or program failure, or because of the activities of
malicious hackers. Graceful degradation is provided by redundancy of data and
programming among multiple computers. The physical and electronic diversity of an
ISRS, along with the existence of multiple operating platforms, enhances robustness,
flexibility, and adaptability. (These characteristics can also result in a certain amount of
chaos.) In addition to these features, some ISRSs offer anonymity, at least in theory, to
contributors and users of the information.

       A significant difference between an ISRS and a database management system is
the fact that an ISRS is intended for general public use, while a database management
system is likely to be proprietary, with access privileges restricted to authorized entities.
In addition, an ISRS, having no centralized management, is less well-organized than a
database management system.

        Lastly, communication capabilities used in the government field. One of the most
used communication capabilities used in the government is using the internet.
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. So using
internet you can use it as a way to communicate to others or to communicate globally in
a easy way simply just by using the internet. And if you used it effectively it will result to
impressive and effective communication skill, which can make you happy, well known,
victorious, loving and content. Communication increases many aspects of life.
Communication is a part and parcel of our everyday life. There are many benefits of
good communication skills. And if there will be a good communication there will be
peace.
In this illustration we see the Alternating periods of economic growth and
contraction.

      One of the most basic analysis frameworks you can use to solve a business
problem is the “cost-benefit analysis”. This method is fairly self-explanatory. It involves
weighing up the total expected costs and benefits of one course of action against
another. Having done this, you will be able to formulate a more well-thought-out solution
to the business problem. So in this problem I recommend the use of Computers,
Information Storage and the Internet it makes the analization easy and you can use it as
a medium to make the work easier.
Case Study on Government Use of Computers, Software and the Internet

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesGyanmanjari Institute Of Technology
 
Operators and expressions in C++
Operators and expressions in C++Operators and expressions in C++
Operators and expressions in C++Neeru Mittal
 
Queue in C, Queue Real Life of Example
Queue in C, Queue Real Life of ExampleQueue in C, Queue Real Life of Example
Queue in C, Queue Real Life of ExampleHitesh Kumar
 
array of object pointer in c++
array of object pointer in c++array of object pointer in c++
array of object pointer in c++Arpita Patel
 
project report in C++ programming and SQL
project report in C++ programming and SQLproject report in C++ programming and SQL
project report in C++ programming and SQLvikram mahendra
 
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1Demian Antony DMello
 
Function in c language(defination and declaration)
Function in c language(defination and declaration)Function in c language(defination and declaration)
Function in c language(defination and declaration)VC Infotech
 
Difference between structure and union
Difference between structure and unionDifference between structure and union
Difference between structure and unionAppili Vamsi Krishna
 
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2Demian Antony DMello
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in CHarendra Singh
 
Mid point circle algorithm
Mid point circle algorithmMid point circle algorithm
Mid point circle algorithmMani Kanth
 
Number System in CoMpUtEr
Number System in CoMpUtErNumber System in CoMpUtEr
Number System in CoMpUtErvishal bansal
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programmingprogramming9
 

Was ist angesagt? (20)

FINAL revised LIST in Python.pdf
FINAL revised LIST in Python.pdfFINAL revised LIST in Python.pdf
FINAL revised LIST in Python.pdf
 
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
 
Operators and expressions in C++
Operators and expressions in C++Operators and expressions in C++
Operators and expressions in C++
 
Queue in C, Queue Real Life of Example
Queue in C, Queue Real Life of ExampleQueue in C, Queue Real Life of Example
Queue in C, Queue Real Life of Example
 
array of object pointer in c++
array of object pointer in c++array of object pointer in c++
array of object pointer in c++
 
project report in C++ programming and SQL
project report in C++ programming and SQLproject report in C++ programming and SQL
project report in C++ programming and SQL
 
user defined function
user defined functionuser defined function
user defined function
 
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1
Python Programming ADP VTU CSE 18CS55 Module 1 Chapter 1
 
Function in c language(defination and declaration)
Function in c language(defination and declaration)Function in c language(defination and declaration)
Function in c language(defination and declaration)
 
Difference between structure and union
Difference between structure and unionDifference between structure and union
Difference between structure and union
 
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2
Python Programming ADP VTU CSE 18CS55 Module 4 Chapter 2
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in C
 
Unit 3. Input and Output
Unit 3. Input and OutputUnit 3. Input and Output
Unit 3. Input and Output
 
CONDITIONAL STATEMENT IN C LANGUAGE
CONDITIONAL STATEMENT IN C LANGUAGECONDITIONAL STATEMENT IN C LANGUAGE
CONDITIONAL STATEMENT IN C LANGUAGE
 
Structure of a C program
Structure of a C programStructure of a C program
Structure of a C program
 
Polish
PolishPolish
Polish
 
Operators in C
Operators in COperators in C
Operators in C
 
Mid point circle algorithm
Mid point circle algorithmMid point circle algorithm
Mid point circle algorithm
 
Number System in CoMpUtEr
Number System in CoMpUtErNumber System in CoMpUtEr
Number System in CoMpUtEr
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programming
 

Andere mochten auch

Case Study on Business Communication
Case Study on Business Communication Case Study on Business Communication
Case Study on Business Communication Sunam Pal
 
Communications Case Study
Communications Case StudyCommunications Case Study
Communications Case StudyBest Practices
 
Case study barriers in communication
Case study barriers in communication  Case study barriers in communication
Case study barriers in communication AJ Raina
 
Case Study on Business Communication
Case Study on Business CommunicationCase Study on Business Communication
Case Study on Business CommunicationSunam Pal
 
Barriers of Communication
Barriers of CommunicationBarriers of Communication
Barriers of Communicationvenkatesh yadav
 
5 barriers to effective communication
5 barriers to effective communication5 barriers to effective communication
5 barriers to effective communicationDiego Rodrigo
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communicationNamrata Jadhav
 

Andere mochten auch (9)

Casestudy on effective communication
Casestudy on effective communicationCasestudy on effective communication
Casestudy on effective communication
 
Case Study on Business Communication
Case Study on Business Communication Case Study on Business Communication
Case Study on Business Communication
 
Communications Case Study
Communications Case StudyCommunications Case Study
Communications Case Study
 
Case study barriers in communication
Case study barriers in communication  Case study barriers in communication
Case study barriers in communication
 
Case Study on Business Communication
Case Study on Business CommunicationCase Study on Business Communication
Case Study on Business Communication
 
Barriers of Communication
Barriers of CommunicationBarriers of Communication
Barriers of Communication
 
5 barriers to effective communication
5 barriers to effective communication5 barriers to effective communication
5 barriers to effective communication
 
Breaking Barriers To Effective Communication
Breaking Barriers To Effective CommunicationBreaking Barriers To Effective Communication
Breaking Barriers To Effective Communication
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
 

Ähnlich wie Case Study on Government Use of Computers, Software and the Internet

Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxsherni1
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data ManagementArmanArafatAnik
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxJohnsmithAlberto2
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information SystemJack Frost
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information systemNareshBabu285920
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communicationKAYJOANNELIWANAGAN
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and YouAjboyDiog
 
future-of-interoperability.pdf
future-of-interoperability.pdffuture-of-interoperability.pdf
future-of-interoperability.pdfFredReynolds2
 
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptThe Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptFredReynolds2
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1shaik subhani
 

Ähnlich wie Case Study on Government Use of Computers, Software and the Internet (20)

Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Trends of it
Trends of itTrends of it
Trends of it
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data Management
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information System
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
future-of-interoperability.pdf
future-of-interoperability.pdffuture-of-interoperability.pdf
future-of-interoperability.pdf
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.pptThe Future of Interoperability Why Compatibility Matters More Than Ever.ppt
The Future of Interoperability Why Compatibility Matters More Than Ever.ppt
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Case Study on Government Use of Computers, Software and the Internet

  • 1. Case Study No. 2 People use computers in a variety of fields, including education, finance, government, health care, science, publishing, travel, and manufacturing. Although the way people use computers varies, each use of a computer involves computer hardware, computer software, and normally some type of communications capability over networks, such as the Internet. Form a five member team and choose a field in which you are all interested. Using the Web, and/or print media, assign two members of your team to investigate hardware used in the field, another member to investigate software used in the field, and the rest to investigate communication capabilities used in the field. After your investigation characterize a hypothetical business or organization in the field. Based on your investigation prepare a report that recommends specific hardware, software, and networking capabilities that would be best for the business or organization; explain your recommendations in the report. The Field we chose is the Government. First of all what is hardware based on my research Hardware is a general term for equipment that can be touched/held by hand such as keys, locks, hinges, latches, handles, wire, chains, plumbing supplies, Electrical Supplies, tools, utensils, cutlery and machine parts. In Government one of the most used hardware is the computer .Computers are used in Data processing for efficient and effective delivery of services, Power shifts between branches of government (executive , legislative , and judicial) and federal versus state jurisdictions, Usage in crime prevention: NCIC, Computerized defense systems: smart weapons and depersonalized armies and many more. Next is the software. Software is a computer instructions or data. Anything that can be stored electronically is software. The storage devices and display devices are hardware. The distinction between software and hardware is sometimes confusing because they are so integrally linked. Clearly, when you purchase a program, you are buying software. But to buy the software, you need to buy the disk(hardware) on which the software is recorded. One of the most used software in a government is the information storage and retrieval system or also known as ISRS. An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data. An ISRS is typically a peer-to-peer network operated and maintained by private individuals or independent organizations, but accessible to the general public. Some, but not all, ISRSs can be accessed from the Internet. (The largest ISRS in the world is the Internet itself.)
  • 2. Characteristics of an ISRS include lack of centralization, graceful degradation in the event of hardware failure, and the ability to rapidly adapt to changing demands and resources. The lack of centralization helps to ensure that catastrophic data loss does not occur because of hardware or program failure, or because of the activities of malicious hackers. Graceful degradation is provided by redundancy of data and programming among multiple computers. The physical and electronic diversity of an ISRS, along with the existence of multiple operating platforms, enhances robustness, flexibility, and adaptability. (These characteristics can also result in a certain amount of chaos.) In addition to these features, some ISRSs offer anonymity, at least in theory, to contributors and users of the information. A significant difference between an ISRS and a database management system is the fact that an ISRS is intended for general public use, while a database management system is likely to be proprietary, with access privileges restricted to authorized entities. In addition, an ISRS, having no centralized management, is less well-organized than a database management system. Lastly, communication capabilities used in the government field. One of the most used communication capabilities used in the government is using the internet. The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. So using internet you can use it as a way to communicate to others or to communicate globally in a easy way simply just by using the internet. And if you used it effectively it will result to impressive and effective communication skill, which can make you happy, well known, victorious, loving and content. Communication increases many aspects of life. Communication is a part and parcel of our everyday life. There are many benefits of good communication skills. And if there will be a good communication there will be peace.
  • 3. In this illustration we see the Alternating periods of economic growth and contraction. One of the most basic analysis frameworks you can use to solve a business problem is the “cost-benefit analysis”. This method is fairly self-explanatory. It involves weighing up the total expected costs and benefits of one course of action against another. Having done this, you will be able to formulate a more well-thought-out solution to the business problem. So in this problem I recommend the use of Computers, Information Storage and the Internet it makes the analization easy and you can use it as a medium to make the work easier.