Introduction
An information technology system consists of several core technologies which support each other. The system is complex with areas of specializations like computer programing, computer networks, information assurance, database and web technologies which all depend on each other for support. IT managers must have an understanding of the core technologies that make up IT infrastructure and how they are interconnected to each other.
Computer programming is essential knowledge in the entire information technology ecosystem because it involves coding of information and feeding into computers to direct the computer to perform specific tasks. The programming helps the programmer to identify problems and solutions then use coding language to direct the computer to convert a problem into solutions using the same format. There are several examples of computer programs such as the spreadsheet, video games, Mozilla Firefox, among several others that make the computer more useful in processing information (Knuth, 2014).
Computer networks are essential is another critical technology which allows the computers to communicate and share information. Information processing and communication are the two important factors with regard to information technology. Computer networks allow for the remote sharing of data, files, video conferencing, among other important communications faster than any other means (Peterson & Davie 2012). Computer networks help the organizations or individuals in public to share information quickly regardless of the physical distances in which they are operating. The database is a technology that helps in the storage of large volumes of data electronically. The data is stored in an organized and easily retrievable manner such that technology allows users to have a wide range of information within a click of a button on the computer. Some examples of the database include Oracle, Informix, and Sybase all which help in easy retrieval and processing of information stored electronically (Chakraborty, Ramireddy,Raghu & Rao 2010).
Information assurance is complex, but basically, it entails activities such as the arrest of malicious software, firewalls, security updates all directed towards securing electronic information from access to unauthorized users. The information assurance system helps the users to maintain the confidentiality of information shared and stored electronically within computer systems. Information assurance involves critical criteria such as authentication, non-repudiation, confidentiality, integrity, and availability.Web technologies are essential in making computers communicate. Through web technologies, the user can easily network using computers. There are different examples of web technologies such as CGI, HTML, HTTP, and Java script among several others. Web technologies rely heavily on internet connectivity to work efficiently. W. The database, web servers, and programming language are parts of web technologies (Sklar, 2011).
Conclusion
All the above technologies are highly interrelated and interdependent. A database helps to store large information, but information assurance helps to protect that data from access by unauthorized people. Computer programming helps to code information and simplify complex tasks, but it depends on the web technologies to communicate such vital solutions with other people with the same computers elsewhere. Computer networks helps in sharing data stored in the database while the information assurance technologies will ensure that such communication is done with integrity and devoid of the bleach of privacy rights. Such interdependencies in technologies help to strengthen and complement each other within the information technology framework.
References
Chakraborty, R., Ramireddy, S., Raghu, T. S., & Rao, H. R. (2010). The information assurance practices of cloud computing vendors. IT professional, 12(4), 29-37. https://ieeexplore.ieee.org/abstract/document/5432137
Knuth, D. E. (2014). Art of computer programming, volume 2: Seminumerical algorithms. Addison-Wesley Professional. https://books.google.co.ke/books?hl=en&lr=&id=Zu-HAwAAQBAJ&oi=fnd&pg=PT17&dq=Knuth,+D.+E.+(2014).+Art+of+computer+programming,+volume+2:+Seminumerical+algorithms.+Addison-Wesley+Professional.&ots=9ngiYoRq7V&sig=E8xybEbuoGiX7H2A-LvNKJRbyqA&redir_esc=y#v=onepage&q=Knuth%2C%20D.%20E.%20(2014).%20Art%20of%20computer%20programming%2C%20volume%202%3A%20Seminumerical%20algorithms.%20Addison-Wesley%20Professional.&f=false
Peterson, L. L., & Davie, B. S. (2012). Computer networks: A systems approach. Burlington, MA: Morgan Kaufmann. https://books.google.co.ke/books?hl=en&lr=&id=pspnGbHFGLcC&oi=fnd&pg=PP1&dq=Peterson,+L.+L.,+%26+Davie,+B.+S.+(2012).+Computer+networks:+A+systems+approach.+&ots=7-9FWNW-RQ&sig=T0LjAatRZ4jymN0Et9SiBigQxzo&redir_esc=y#v=onepage&q&f=false
Sklar, J. (2011). Principles of web design: the web technologies series. Cengage Learning. https://books.google.co.ke/books?hl=en&lr=&id=1cgIAAAAQBAJ&oi=fnd&pg=PR5&dq=Sklar,+J.+(2011).+Principles+of+web+design:+the+web+technologies+series.+Cengage+Learning.&ots=04d57YUNbx&sig=nVhooztdzaPZ-mwU4E_At2Od7UQ&redir_esc=y#v=onepage&q=Sklar%2C%20J.%20(2011).%20Principles%20of%20web%20design%3A%20the%20web%20technologies%20series.%20Cengage%20Learning.&f=false
Cite this page
Unlock the Full Potential of IT Infrastructure With Computer Programming - Essay Sample. (2023, Jan 31). Retrieved from https://proessays.net/essays/unlock-the-full-potential-of-it-infrastructure-with-computer-programming-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Box Station - Analysis of Vulnerabilities
- Accidents That Led to Improvements in Aviation Safety Standards
- Articles Analysis Essay on Scam, Identity Theft and Fraud
- Art and Technology Essay
- Essay Sample on Acme Inc. Migration to Cloud Database
- Essay Sample on Cybersecurity Threats and Vulnerable Assets
- Microsoft vs. Google and Apple: The Software War - Essay Sample