The document discusses the capabilities and issues related to computing technology and storage devices. It outlines five key capabilities of computing as speed, accuracy, storage capacity, logical operations, and multimedia handling. The use of storage devices raises privacy, ownership, control, and security issues. This has triggered IT policy decisions around data disclosure, login details, network scanning, and portable storage device usage to protect against damages from unauthorized access to stored data and information.
2. Table of Contents
Capabilities of Computing Technology: ......................................................................................... 3
Five Capabilities of Computing: ..................................................................................................... 3
Issues Raised by Storage Devices due to its Application in Computing Technology: ................... 6
IT Policy Decisions Triggered by Storage Devices: ....................................................................... 8
Conclusion: ..................................................................................................................................... 9
References:...................................................................................................................................... 9
2
Capabilities of Computer
3. Capabilities of Computing Technology:
Computing Technology evolution and dynamism has continued to affect us in all areas of human
endeavor and has given computers new abilities in today’s technologically advanced world
thereby making the world aligned in the dissemination and sharing of information and data that
Computers are used in all aspect of human life and in very different aspects of our daily lives
from health, military to education and so on and has over the years develop various capabilities
which includes but are not limited to speed, accuracy, repetitiveness, storage, diligence,
multimedia handling, connectivity, versatility and so on.
This development and use of computing technology has given a whole new different meaning to
conventional standards and norms used in communication and socialization and have also given
way to various IT policies needed to address possible and potential threats that have risen and
may arise due to the advent and use of computing technology.
Computers have been known over the years to processes large volume of data at very
high speed and this has generally aided its general acceptance worldwide. With computer
speed reaching up to 100 million operations per second, computers have been able to
simplify previously bigger task, help in the reduction of manual effort needed for
competing tasks and the time taken for processing data and also help in accomplishing
higher number of tasks within specified time. This speed has also helped in the exchange
3
were hitherto inaccessible to the common user.
1. Five Capabilities of Computing:
Speed:
Capabilities of Computer
4. of information and or data between two or more computer systems connected through an
Computers have been known not to make mistakes over the years. They have constantly
retained high levels of precision and accuracy which can be measured as equals to a
Computers processes and give information based on input from the user. So if it has been
feed correct input, the output from the computer has 100% correctness while if the input
feed it is wrong, the output will also have 100% incorrectness. This gave rise to the term
GIGO – “Garbage In Garbage Out”. This means the output from a computer is highly
dependent on the input and if the parameters have been wrongly defined by the user, the
system would accurately continue to give erroneous results whereas if it had been given
the right parameters it would accurately give an precise result for the entire duration of
the execution of the particular task(s) (Asaolu, 2006).
Computing systems has the ability to store huge amount of data and information for
current usage or future referencing. Its ability for storage is also another major factor of
its global acceptance aside speed and accuracy.
Technological revolution, due to easy accessibility of potable music players, digital
cameras, mobile phones and so on, has responded to personal needs with the
development of electronic devices that include data storage capabilities.
Over the years the size of storage have continually increased and cost has decreased
alongside the needs of the users and now storage of up to terabytes for the conventional
4
external or internal network.
Accuracy:
100%.
Storage Capacity:
Capabilities of Computer
5. computers and portable storage devices and more for servers and super computers have
Cloud computing has also allowed data to be stored and retrieved easily and conveniently
on servers with big storage capability from any computer and or mobile device that have
been given access to the servers which has made accessibility to and availability of
information and data easily as this could be done from any location and on any computer
This type of storage has clearly encouraged portability into the more predictable data
management standards. (Costello, 2009).
Computing system has the capability to perform high end calculation and processes data
within seconds which would have been tasking if performed manually. This aided in the
creation of Artificial Intelligence which is the study of how computing machines can
imitate human intellect by taking self-decisions based on different courses of action.
Computing machines are to be developed with the ability to think, act and carry out
activities like we humans do. These capabilities have led to the creation of Deep Blue, the
first computer to win the leading chess champion Garry Kasparov in 1996 and NASA
Valkyrie a humanoid robot (Ackerman, 2013).
Computing systems have over the years evolved into playing and recording voice and
video contents which are stored as media files. Multimedia files include graphics, video,
animation and sound. Multiple media types are used symphonically together in creating
5
evolved.
and or devices.
Logical Operations:
Multimedia:
Capabilities of Computer
6. new experiences in areas such as image processing, video processing, audio analysis, text
retrieval and understanding, data mining and analysis, and data fusion.
2. Issues Raised by Storage Devices due to its Application in Computing
I choose storage devices because the use of portable storage devices has become commonplace
in the society. This is so because storage has become relatively cheap. Issues have arisen from
the use of these storage devices which has resulted in severe outcomes to individuals,
Cloud computing offers large storage space and this storage space are mostly not kept in
the country where the company is operating from or in country that has little or no
standard policies on the privacy and security of data thereby raising doubt about the
privacy of data stored on such storage devices. How secured are sensitive data hosted in
Also storage devices of old computers raises an important privacy issue as they still
contain personal and sensitive information such as emails, passwords and credit card
numbers, also of note is that files that have been thought deleted from system and also
from the recycle bin have actually not been totally removed from the computers storage
devices. The files still actually exist on the storage device but are just not visible in the
directory index. These data or files can be recovered maliciously and used without a trace
by merely using software that can be obtained freely on the net.
6
Technology:
corporation and organizations.
Privacy:
the cloud?
Capabilities of Computer
7. Accessibility of data over the internet and consequent storage of such data on any storage
media does not give control over ownership of such data. Storage devices are becoming
smaller in size and bigger in capacity, due to this, organization’s storage devices are to be
properly labelled and inventoried. For individual, corporation and organization, these
portable devices are to be kept securely at all times or be stored somewhere safe.
Data can be transferred from one storage device to another thereby making it difficult to
exercise control on such data. Therefore organizations should ensure that the use of
portable storage devices is strictly controlled by ensuring that only authorized portable
storage devices can be plugged into the system.
Also issues have been raised over who has control over data being stored or access via
cloud computing. Issue with theft of data storage devices has also raised serious concern
over control as they are very small and easily conceivable.
Data stored on storage devices follow that they are as accurate as the day they were
stored. This means that unless those data have been previously retrieved, edited and
saved back onto the storage devices, the data stored on any storage device remain as is.
Issues raised here might include how accurate data stored on the storage devices are
especially if they are for personal use that the organization has no controlled over or has
been stolen or lost and was later retrieved by the owner. There is no telling how accurate
the information that was on the storage device is to what is on it now after retrieval.
7
Ownership:
Control:
Accuracy:
Capabilities of Computer
8. How secured is our storage devices or how secured is the server or computer on which
my storage device is mounted are some of the issues raised as pertain to storage. Planned
and unplanned introduction of viruses, malware and so on through portable storage
devices can cause harm to the corporate network. It has been established that as of today
one of the big threats to organization and corporations still comes from trusted insiders.
This assertion simply suggests that it is the people working inside the company who are
attacking the systems whether intentionally or unintentionally.
3. IT Policy Decisions Triggered by Storage Devices:
The presence of advanced computing will affect the manner in which the data and information
stored on storage devices are kept safe. Great care should be taken in ensuring that Data storage
devices, whether be it for cloud computing, the internet (yes the internet, most databases are
stored on storage devices on the server), portable storage devices and the conventional storage
devices for personal systems do not fall into the wrongs hand as this can cause serious and or
substantial damage to the individual, corporation and or organizations. In this regard, the
following areas of IT policies would be affected:
Disclosure of data and information on storage devices.
The use of login details may be incorporated into the policy for reducing the chances of
infiltration into the computer disabling those without correct login credentials access.
Networks are to be scanned for unauthorized devices
8
Security:
Capabilities of Computer
9. Data to be stored on storage devices be encrypted
Introduction of Portable Storage Devices (PSD) policies
Computers are still evolving at alarming rate and storage devices will always evolved along too
as data and information been bandied about have to be kept somewhere for processing currently
or at a later date. Therefore rules and policies guiding the handling and usage of these devices
needs to be implemented and enforced strictly in order to avoid substantial damages. Also of
note is that not implementing these policies can cause harm to the professional, social and
business ethics of an individual and or organization.
1. Ackerman, E. (2013) NASA JSC Unveils Valkyrie DRC Robot [online]. Available from:
http://spectrum.ieee.org/automaton/robotics/military-robots/nasa-jsc-unveils-valkyrie-drc-
robot (Accessed: 09 February 2014).
2. Asaolu, O.S. (2006) 'On the Emergence of New Computer Technologies', Educational
Technology and Society, 9(1), pp.335 - 343.
3. Costello, T. (2009) Cloud Computing. [Online] Available from:
http://www.computer.org/portal/web/computingnow/archive/february2009 (Accessed 14
9
Conclusion:
References:
January 2013)
Capabilities of Computer
10. 4. McCormick, J. (2002) Take these precautions against inside security attacks [Online]
Available from: http://www.techrepublic.com/article/take-these-precautions-against-inside-
security-attacks/ (Accessed: 20 may 2016).
5. Nakpodia, E.D. (2010) 'An information system in Nigerian education: A study of data
storage', International Journal of Library and Information Science, 2(6), August,
10
pp.102–107.
Capabilities of Computer