Introduction To Information Technology
Introduction To Information Technology
Assignment
1. Explain how the following industries have been transformed with the
influence of Information Technology.
Education
Information technology (IT) refers to the knowledge process and its applied methods,
processing, transferring, and making information in progress. It includes gathering, organizing,
storing, publishing, and using information in the form of sound, picture graphics, text, and
numbers, by using computer and telecommunication tools. Significant changes resulting from
IT have become the source of fundamental changes in education. The most significant changes
have roots in the fact that technology has enabled students to access out-of-class information,
and this has caused an increase in their motivation for learning.
There are many options for integrating IT in education, as an analysis of learning models and the
effects of IT on learning reveals. Information can be displayed more easily, access to explicit
external data can be expanded, and knowledge can be shared and created more easily with the
use of technology (Hamidi et al. 2011). Alternative IT implementations in education start to take
shape because of research into how the various technologies interact with learning models and
with each other. It is not stated that technology will solve all the issues in education; in fact, a
lot of issues in education are social in nature rather than academic in nature. However,
technology can make it possible to apply constructive, cognitive, collaborative, and
sociocultural learning concepts in an efficient manner (Leidner and Jarvenpaa 1995).
Healthcare
Healthcare is an important pillar of society, critical for actively responding to public health
emergencies, and addressing disease, ill health, and poverty brought on by communicable
disease and non-communicable diseases, cancer, and infectious diseases. Current healthcare
systems undergo drastic changes in response to the growing need for efficient, preventive
healthcare. They also utilize the possibilities of modern technology, particularly information
technology.
•Emerging healthcare tech, like video and teleconferencing, aids knowledge sharing
Improved among professionals.
Communic •Teleconferencing eases communication across distances.
ation
•Health information technology enables the collection and analysis of big data, offering
insights into healthcare trends and predicting epidemics.
•Cloud storage ensures efficient data management and accessibility, facilitating
Big Data research and development of medical treatments.
•Healthcare tech, such as VR devices, enhances care by accessing medical history and
Improved easing symptoms.
Patient
Care
Today's travel and hospitality industries are undergoing significant change because of the
strategic use of information technology. It is motivated by both the industry's inherent
competitiveness and the rapidly developing cutting-edge concepts and procedures. Information
technology utilization is therefore essential to keep up with the competitive environment and to
stay ahead facing challenges.
Although IT has been successfully used to meet information needs, analyze behavior, and
streamline operational procedures, its potential in areas like marketing, promotion, and
customer management procedures is still largely unrealized. With the help of IT systems that
enable smooth communication between service providers, agencies, and tourists, modern
technology has completely changed the travel and tourism industry, changing both the demand
for and offers made to travelers (Khatri 2019). A more technologically driven approach to
meeting the changing needs of modern visitors is shown in the industry's adoption of e-tourism
and other digitalized activities such as travel blogging, online reservations, and service
platforms. There is a great deal of room for innovation and the development of better travel
experiences if the industry adopts new IT developments. This will ultimately lead to value
creation and competitive advantage.
Retail
Information technology's impact has significantly transformed the retail sector. With the rise of
e-commerce, retailers can reach a wider audience worldwide and provide clients with simple
online shopping experiences. Retailers can better understand and serve specific customer
preferences using IT solutions like personalized marketing and data analytics while supply
chains are optimized, and inventory management systems streamline stock levels (Piotrowicz
and Cuthbertson 2014).
Finance
The financial sector has experienced a significant shift in its operations and services due to the
impact of Information Technology. First and foremost, information technology has made it
easier for financial procedures to be automated, from transactions to risk assessment. This has
increased efficiency, decreased mistake rates, and sped up processing times. Customer
relations with financial institutions have entirely changed with the introduction of online
banking and mobile payment platforms.
The advent of cryptocurrencies and blockchain technology has presented safe and transparent
transaction methods, put established financial institutions to the test, and provided alternative
digital currencies that are not governed by central bodies. IT solutions have further strengthened
risk management processes by providing real-time transaction monitoring, fraud detection, and
regulatory compliance. Furthermore, the emergence of fintech firms has sparked innovation in
domains such as digital wallets, and peer-to-peer financing, forcing established organizations
to modify and improve their services (Shin 2001). Last, IT has dramatically enhanced the general
customer experience with tools like chatbots, AI-powered customer support, and tailored
recommendations, allowing financial institutions to deliver better services and interact with
clients more successfully. In conclusion, the banking business has transformed thanks to the
integration of information technology, which has promoted efficiency, innovation, and improved
consumer experiences.
Authentication
A security procedure used to check and validate the identity of a person, system, or device
trying to access a particular resource or service is known as authentication.
It verifies that the identity being claimed is accurate and that the person can carry out the tasks
asked of them or access particular data.
Access Control
Ensuring a user can only access the relevant information resources is the next step after being
authenticated. Access control is used to accomplish this. Access control determines which
users have access for controlling information.
Access Control List (ACL) refers to a list of authorized users who perform operations on data
files or other information resources. Every user has specific permissions, like reading, writing,
removing, or adding. Those functions can only be carried out by users who possess those rights.
In Role-Based Access Control (RBAC), users are assigned roles, and those roles are then
assigned access rather than assigning specific user access privileges to an information
resource. By managing users and roles separately, this makes administration simpler and hence
enhances security.
Encryption
Encoding data during transmission or storage to restrict access to only authorized parties is
known as encryption. Software that uses encryption to encrypt the plain text that needs to be
sent accomplishes this encoding. Then, the recipient receives the cypher text and decodes it.
Backups
Data backup reduces the possibility of data loss from various sources, including hardware
malfunctions, human mistakes, and cyberattacks. It makes duplicate copies of crucial files or
data and keeps them in several places. It is an essential component of data management for
businesses of all sizes since it guarantees the accessibility and protection of critical data. By
putting a thorough backup plan in place, organizations may guard against unanticipated
incidents, compromising their data integrity and operational effectiveness.
Firewalls
A firewall is a computer network security system, such as Windows Firewall, that restricts
internet traffic into, out of, or within a private network. A firewall protects the servers and
computers by stopping packets outside the organization’s network that do not meet the criteria.
Apart from the mentioned security mechanisms, Intrusion Detection Systems, Physical
Security, Security Policies, Anti-malware programs, and Security Awareness Training are widely
used security mechanisms to protect computers and data.
Advantages
Subscription mode Perpetual mode
Lower initial cost Cost effective in the long run
Continues updates and support. Potential of asset appreciation
Scalability growth Less reliance on internet connectivity
Predictable expense No risk of license expiration
Flexible to cancel. Ownership and control of upgrading
e.g.: Microsoft 365, Spotify, Netflix, Duolingo e.g.: Autodesk products, Adobe products,
Windows OS
Telecommunications Industry
Networking technologies are essential to Sri Lanka's telecommunications sector since they
connect and offer services to individuals and businesses across the country. These
technologies empower individuals and businesses by connecting them nationwide and offering
essential services:
Mobile Networks: High-speed internet access on the go is a reality thanks to 4G networks, with
5G on the horizon. Users can leverage these networks for data access, voice calls, and
messaging.
Fiber Optic Revolution: Sri Lanka Telecom's fiber optic networks deliver lightning-fast internet
connectivity across the country, surpassing the speed of traditional mobile networks.
Networking technologies are essential in ensuring the smooth functioning of Sri Lanka's banking
and financial services sector. They enable institutions to offer secure and convenient services,
fostering trust and efficiency:
Online Banking: Networking facilitates online banking platforms, allowing users to manage
accounts, transfer funds, pay bills, and conduct secure transactions remotely.
ATM Networks: Through networking infrastructure, Automated Teller Machines (ATMs) connect
to established banking networks, enabling users to withdraw cash, check balances, and
conduct other banking activities from various locations.
Electronic Payment Systems: Whether it's online payment gateways, mobile wallets, or
credit/debit card processing, these electronic payment systems rely on networking technology.
In conclusion, networking technologies are necessary for many industries in Sri Lankan. These
technologies promote efficiency, creativity, and economic growth nationwide by supporting vital
operations like communication, networking, data transmission, and service delivery.
References
Hamidi, Farideh, Maryam Meshkat, Maryam Rezaee, and Mehdi Jafari. 2011. “Information
Technology in Education.” Pp. 369–73 in Procedia Computer Science. Vol. 3.
Khatri, Ishwar. 2019. “Information Technology in Tourism & Hospitality Industry: A Review of Ten
Years’ Publications.” Journal of Tourism and Hospitality Education 9:74–87. doi:
10.3126/jthe.v9i0.23682.
Khattak, A. Waseem, and Muhammad Nasir. 2020. “The Role of Information Technology in
Media Industry.” Online Journal of Communication and Media Technologies 2(3). doi:
10.29333/ojcmt/2395.
Leidner, Dorothy E., and Sirkka L. Jarvenpaa. 1995. The Use of Information Technology to
Enhance Management School Education: A Theoretical Models of Learning The Use of
Information Technology to Enhance Management School Education: A Theoretical View.
Vol. 19.
Piotrowicz, Wojciech, and Richard Cuthbertson. 2014. “Introduction to the Special Issue
Information Technology in Retail: Toward Omnichannel Retailing.” International Journal of
Electronic Commerce 18(4):5–16.
Shin, N. 2001. The Impact of Information Technology on Financial Performance: The Importance
of Strategic Choice. Vol. 10.