• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ICT in Organisations.

Extracts from this document...


Assignment 2: ICT in Organisations Portfolio Assignment (2b) Graduate School of Education at Queens' University of Belfast Michael Edwards 11D Mr Kinkaid Introduction In the Graduate School of Education they use many different types of computers for many different things. Some staff will use their computers for typing long documents or letters; others may use them for creating PowerPoint presentations for lectures. In most organisations people will use their computers for similar things, but this isn't the case in a university. Server Hardware There are a number of servers, and these all do different jobs. Each server is allocated a name, and this is unique over the whole campus. Most of the main file servers are held within the computer centre. This allows them to rectify any problems that may arise if a server fails. All of the main servers work on dual hardware, and are hot swappable. This means that if one processor fails, or if one Random Access Memory slot fails, they are able to replace it, without any down time. The only time the server would go down would be in the case of a Power Supply Unit failing, and this can be fixed in a matter of minutes. ...read more.


Networking The university network is quite a big system, and could probably be described as a Wide Area Network, because of its size, although it is really just a very large Local Area Network. Here is a small network diagram showing how the Queens' Network works. Hopefully from this very simple diagram you can see how big the university really is, and how much it costs for electricity alone every year. Between all the universities in the United Kingdom there is a shared Internet connection. This is a fibre optic system. There is a slight difference between using a fibre and using copper cables. One small fibre can carry up to 1,900 phone calls. This is quite a big difference compared to 30 over one copper cable. This means that the computer users in the University will have very fast Internet access, and between other universities, it can be possible to download a full CD's worth of data (700MB) in around 10 seconds, and that isn't with just one user using the network at that time. The speed of JANET is quite hard to measure with complete accuracy, and it is changing in speed every day. ...read more.


Many larger businesses may have their own database software written for them. Many companies like Northbrook Technologies write these programs especially for them. It can cost thousands to get that kind of software written. They often use many different programming languages, usually C++, which is very advanced and can take years to learn. As the university does not have many departments that do exactly the same thing, database software designed just for the university would cost too much, and probably push student fees up quite a considerable amount. Often Microsoft Access is more than enough to fulfil the needs of the departments requiring databases. Other Hardware There are many different hardware devices in the university. The most expensive would probably be the digital cameras and projectors, and these may take some time to replace if they are damaged. The cheaper devices like mice, keyboards and disk drives are easily replaced, and there are many spares in the university. There are many different types of printers available, usually mono colour laser printers and colour ink jets, but there are some colour laser printers available. Printer cartridges are replaced when needed, and are purchased with discount, as they are in very large numbers. Scanners are available in computer rooms for student use. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Teign and Tow then lose brand loyalty. To ensure that these events do not occur, Teign and Tow need to make sure that all the software is fully updated and in working order so it doesn't need to jeopardize the system.

  2. Free essay

    Reduce Damage to organisations

    Preventing Technologies One of the technologies that can be used to protect an organisations' computers is by simply using firewalls. By using firewalls it will prevent intruders from getting into the organisations' computers. It works by checking the filters that are coming through the network or internet and if they

  1. implementation of an ITC system

    An exceptional database development program called Oracle 10g will be installed on to the network, as this is the worlds leading software in database development. It is not only offers the best database user interface, but it had effortless problem checking and data consolidation which is ideal for BlackBurry's Ltd.

  2. The impact of ICT on an adult in full-time employment and the effects on ...

    for 3 months and this was derived from a program made for businesses but has been adapted to suit the councils needs, all the people who use this went training weekends but they are still having problems. Along with all the usual office hardware like scanners, photocopiers and fax machines

  1. Building Local Area Networks

    �1.76 inc. The RJ45 Cat 5e patch is perfect for use with 10/100/1000BaseT networks. Specification of network protocols: Transmission Control Protocol/Internet Protocol (TCP/IP) is widely used for connectivity to the Internet and as a standard routable protocol for an organization-wide Internetwork. TCP/IP has become the standard protocol used for interoperability among many different types of computers.

  2. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    The Hello protocol operates on a per link basis. 2.2 Database Synchronization and Flooding The Database Synchronization protocol's purpose is to distribute the currently known routing information between two neighboring nodes that are in the same peer group. When the database synchronization process is complete both neighboring nodes will have exactly the same routing information.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Failure Token Ring Fibre Optic Multimode Connector - C/S Token Damaged Wire Ethernet Cable Summary Specification Cable Type Maximum length 10BaseF Fiber Optic 2000 meters Mesh A computer that is directly connected to all other computers is known as mesh.

  2. Visual Basic and Databases.

    Adequate introductory material is presented. Even if you've worked with databases before, it is suggested you read through this introductory information to become acquainted with the nomenclature used by the author for databases and their component parts. * This course does not teach you how to build a Visual Basic application.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work