Identify the Ethical Issues within the Field of Information Technology

Identify the Ethical Issues within the Field of Information Technology

19 May 0

Identify the Ethical Issues within the Field of Information Technology Kaplan University IT 190 When thinking about ethical issues within the field of information technology, you have to break it down to understand the meanings. What is ethics? What is an ethical issue? How does an ethical issue affect the field of information technology? What […]

Read More
Information Technology Concepts

Information Technology Concepts

19 May 0

Seminar Option 2 IT190 – Information Technology Concepts During the unit two seminar, you started off by the overview and then went into the objectives for the seminar. You started off with the four main functions of the computer. Input, processing, output, and storage. You went over language that a computer uses, which is a […]

Read More
Network Guidance

Network Guidance

19 May 0

Network Guidance IT 190. Unit 7 In regard to the Little Country store, constructed in the early 1900’s with standard wood construction and has all the wiring up to code. We are installing 3 laptops in total, two of which will be located within the store, the third will be inside the home. For A […]

Read More
IT 190-01 IT Concepts Unit 8 Assignment: Instruction Report

IT 190-01 IT Concepts Unit 8 Assignment: Instruction Report

19 May 0

Instruction Report  IT 190-01 IT Concepts Unit 8 Assignment Globalization is the process in which ideas, goods, and people spread throughout the world encouraging more interactions and integration between the world’s government, cultures, and economies (Rouse & Pratt, 2016). Globalization came into prominence around the 1980s, and although many people might think it is a […]

Read More
IT 190 Unit 4 Assignment: Software FAQ

IT 190 Unit 4 Assignment: Software FAQ

19 May 0

Software FAQ   Software is “a set of instructions or programs instructing a computer to do specific tasks.” (Techopedia, “What is Software? – Definition from Techopedia”). Software is a general term to describe computer programs. Other terms to describe software are scripts, applications, programs, and sets of instructions. Below are some frequently asked questions (FAQ) […]

Read More
IT 190 UNIT 10 Discussion

IT 190 UNIT 10 Discussion

19 May 0

Cyberloafing is a term that describes employees utilizing their company network, while at work, for non-work related activities. Facebook, emailing and messaging friends, watching youtube, or even booking dinner reservations are all examples of cyberloafing. A study in employee productivity revealed the current monetary value that companies have lost to be astounding. On average, cyberloafing […]

Read More
IT190 Unit 7 YOUR NETWORK

IT190 Unit 7 YOUR NETWORK

19 May 0

“Personal Area Network”, PAN was the first network I considered because it allows devices used by one person to communicate with each other. I feel this network is more of a smartphone, tablet and laptop connection. “Local Area Network”, LAN is the recommended network as it is normally used in home or office settings with […]

Read More
Computer Use Policy

Computer Use Policy

19 May 0

Computer Use Policy Purdue University Global Computer Use Policy This policy sets out the standards of ethical computing expected from each employee in the company. Ethical computing is a term used to describe “doing the right thing” while interacting with cyberspace. . To pass off and steal the ideas and words of someone else without […]

Read More
IT190 Unit 1 Assignment

IT190 Unit 1 Assignment

19 May 0

What is computer literacy and why is it important to be computer literate? Computer literacy is a level of familiarity with the basic hardware, software, and Internet navigation concepts that allow an individual to use personal computers for data entry, word processing, spreadsheets, and electronic communications. (“What is computer literacy”, n.d.) The importance of being […]

Read More
IT190 UNIT 9 ASSIGNMENT

IT190 UNIT 9 ASSIGNMENT

19 May 0

IT190 References: What is the risk to the network? There many threats that can put your network at risks such as viruses, spyware, worms, Trojans and computer hackers. Your networks are also vulnerable cybercriminals who commit cybercrimes. What risks are there to a computer connected to the network? If the computer shares the same network […]

Read More