The safe working procedures used in their administration and support guarantee the stability,
dependability, and security of different IT systems. These systems are made to protect the people who
interact with them in addition to the data and resources that they manage.
The best approach to describe the purpose of secure working practices in the IT industry is as follows:
Safe working practices help to avoid IT system errors and malfunctions, which can lead to data loss,
service disruptions, and other undesirable outcomes.
Data security: IT systems frequently contain sensitive data, including personal, financial, and proprietary
information. Safe working practices are intended to thwart hacking, including fraud and unauthorised
access.
Employee safety: Since electrical devices are frequently used in IT systems, workers may be exposed to
hazardous substances or other risky situations. To lower these dangers and protect employee wellbeing,
secure working practices are developed.
Safe working practices in IT can take on a wide variety of various shapes depending on the specific
systems and environments in which they are used. But some traditions are as follows:
1. Both documentation and training are essential. Employees must receive in-depth training on
how to use IT systems securely, and all documentation must be accurate and current.
2. Physical security is essential for preventing damage to IT systems from unauthorised entry,
theft, fire, and other mishaps.
3. Cybersecurity: Defending IT systems against online dangers like viruses, phishing, and hackers is
crucial. Firewalls, malware programmes, and other security measures can accomplish this.
4. Environmental controls: IT systems should only be used in settings that support their secure and
efficient operation, such as climate-controlled spaces with sufficient lighting and air.
5. When installing, maintaining, or troubleshooting IT systems, employees should adhere to secure
work practices, which include donning safety gear, abiding by electrical safety regulations, and
using the appropriate lifting techniques.
Safe working practices are essential to the administration and support of IT systems because they
guarantee their security, dependability, and stability as well as the protection of the users of those
systems and the data they store.
Systems based on information technology, or IT-based systems, process, store, and share information
using computer hardware, software, and communication technologies. Numerous applications, such as
data processing, communications, and multimedia creation, are made possible by these platforms.
Examples of networks created using IT include:
1. Information is processed, stored, and exchanged using computers. Examples include desktop
computers, laptops, and servers.
2. Software: A range of software programmes, including word processors, spreadsheets, and
database management systems, are used to organise and analyse information.
, 3. Networks are used by PCs and other devices to share data and resources. The Internet, LANs,
and wide area networks are some of these networks (WANs).
4. Mobile devices: Information can be watched and shared at any time and from any location using
smartphones, laptops, and other mobile devices.
5. The term "cloud computing" describes the Internet-based delivery of computing services like
computation and storing.
6. IT systems are shielded from online dangers like malware and hacks by cybersecurity systems.
Firewalls, security programmes, and encryption techniques are all part of these systems.
Retail, government, healthcare, and education are just a few of the sectors and businesses that use IT-
based tools. Because they allow for the efficient processing, storing, and exchange of information, these
systems are crucial to today's civilization. They also offer fresh opportunities for communication and
engagement.
Servers:
A computer system designed as a server can process queries and transmit data to other networked
devices. Servers, which are in charge of providing services like file storage, web hosting, email, and
database management, are at the heart of many IT systems.
There are many different types of computers, including:
1. File servers: These servers enable user access and network communication by managing and
storing files.
2. Websites are hosted by web servers, which also provide browsers with internet content.
3. Applications can be viewed and used by numerous users over a network thanks to application
servers, which host and handle software applications.
4. Database servers: These servers maintain databases and make them accessible, editable, and
query-able by a large number of people over a network.
5. Users can send and receive email communications thanks to mail servers, which control email
networks.
In terms of dependability, storage space, and computing speed, servers typically outperform desktop
computers. They also use specialised server software that enables them to service numerous clients at
once. In a networked environment, clients such as desktop computers, smartphones, and other servers
connect to the server when searching for services or data. The server responds to the client with the
relevant information after handling these queries. Because they provide vital services and enable the
effective transfer of data and resources across networks, servers play a crucial role in many IT systems.
Virtual personal computers:
Virtual machines (VMs) and "virtual personal computers" are terms used to describe software-based
computing platforms that run on top of a host operating system (VPCs). They make it possible for several
virtual machines to run simultaneously on a single physical computer, each with its own operating
system, software library, and data.
, There are several advantages to virtual computers, including:
1. Virtual machines are independent of one another, failure of one won't impact the other virtual
machines running on the same physical computer.
2. Even if they are incompatible with the host operating system, virtual machines can run a variety
of operating systems and apps.
3. Resource sharing: Virtual machines can work together with the primary operating system and
other virtual machines to share resources like processing power, memory, and storage.
4. Management and deployment of computer systems are made easier by the simplicity with
which virtual machines can be transferred from one real computer to another.
5. By using virtual machines to test operating systems and software applications, software
developers and IT pros can test new software in a safe, isolated environment.
To create a virtual personal computer, you need virtualization software that runs on the primary
operating system, like VMware or Oracle VirtualBox. You can set up and run a guest operating system
and applications in a virtual environment using this software.
Numerous computer systems can be operated on a single physical computer thanks to the advantages
of virtual personal computers, including isolation, compatibility, resource sharing, portability, and
testing.
Cloud storage:
Cloud storage is the practise of keeping documents and data online rather than on a local computer or
hard disc. Users are able to view their data from any location with an internet connection thanks to the
servers that cloud storage providers use and maintain.
There are several advantages to cloud storage, including:
1. Accessibility: If a user has an internet connection, they can access data saved in the cloud from
any location at any time using any device.
2. Scalability: Because cloud storage providers can rapidly add more storage capacity as required,
users don't have to worry about running out of space to store their data.
3. Savings: Compared to purchasing and keeping physical storage devices like hard drives and
tapes, using cloud storage is usually less expensive.
4. Backup and disaster recovery: Important data can be stored in the cloud and recovered in an
emergency, like a hardware malfunction or a natural calamity.
5. Collaboration is made simpler using cloud storage, which enables multiple users to view the
same files and data from various locations.
Cloud storage is typically provided by businesses like Amazon Web Services (AWS), Microsoft Azure, and
Google Cloud Platform and can be used for file, object, and block storage. Cloud storage is an efficient
and reasonable way to keep and retrieve data because of features like accessibility, scalability, cost
effectiveness, backup and disaster recovery, and collaboration.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jamesharrison123. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.80. You're not tied to anything after your purchase.