Activity 1......................................................................................................................................................2
Introduction.................................................................................................................................................4
Software......................................................................................................................................................4
Operating Systems...................................................................................................................................4
Security................................................................................................................................................4
User Interface......................................................................................................................................4
A Graphical Interface....................................................................................................................4
Command line..............................................................................................................................4
Menu Based..................................................................................................................................5
Utility Software........................................................................................................................................6
Application Software...............................................................................................................................7
Hardware.....................................................................................................................................................8
Data Connections........................................................................................................................................9
Wired.....................................................................................................................................................10
Wireless.................................................................................................................................................10
Networks...................................................................................................................................................11
WAN & LAN............................................................................................................................................11
Star........................................................................................................................................................11
Emerging Technologies..............................................................................................................................11
Cloud computing....................................................................................................................................11
Augmented Reality................................................................................................................................11
Benefits of improving the IT infrastructure...............................................................................................11
Activity 2....................................................................................................................................................12
Definitions.................................................................................................................................................14
Just in Time Model.....................................................................................................................................16
Online Communities..................................................................................................................................16
Instant Messaging..................................................................................................................................16
Video Blogs............................................................................................................................................16
Social Media..........................................................................................................................................16
Wiki........................................................................................................................................................16
Activity 3....................................................................................................................................................18
Threats to data, information and systems.................................................................................................20
,Processes and procedures.........................................................................................................................21
File permission.......................................................................................................................................21
Backup & Recover Procedures...............................................................................................................21
Passwords..............................................................................................................................................22
Physical access Control..........................................................................................................................22
Privacy...................................................................................................................................................22
Environmental.......................................................................................................................................22
Data Protection Act...............................................................................................................................22
Health and Safety Laws..........................................................................................................................23
Activity 4....................................................................................................................................................25
Devices......................................................................................................................................................27
Network.....................................................................................................................................................27
, Activity 1
ACTIVITY 1 - suggested time 6 hours
Produce a report for Hanish Aziz evaluating how IT infrastructure could be used to meet the needs of
Remmah Repairs.
The report should:
• explore ways in which software, hardware, data connections, networks and emerging technologies
can meet the needs of the company and its stakeholders
• explore the impact of IT infrastructure on the company and its stakeholders
• provide justified recommendations for an IT infrastructure solution for the company.
It is suggested that you use a combination of written, tabulated and diagrammatic information in your
report.
This activity covers learning aim A.
A.P1, A.P2, A.P3, A.M1, A.D1
Pass Merit Distinction
Learning aim A: Explore how IT infrastructure meets the needs of organisations and their
stakeholders
A.P1 Explain ways in which A.M1 Analyse how IT A.D1 Evaluate how IT
software can meet the needs of infrastructure can impact an infrastructure can impact an
an organisation and its organisation and its organisation and its
stakeholders. stakeholders. stakeholders.
A.P2 Explain ways in which
hardware can meet the needs
of an organisation and its
stakeholders.