Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

USB and Fire Wire Controllers for Computers

Question:

Describe about the ICT Service Management.
 

The USB and Fire Wire are the controllers for the computers. As stated by Bhuasiri et al. (2012), users can implement the communication system between computer and a device through the USB and Fire Wire. It has been observed that users have used the USB and Fire Wire as general purpose controllers. Generally, the USB and Fire Wire are the port of the computer. The USB and Fire Wire are used in the CPU to communicate with the external storage devices (Yu et al. 2012).

The bus is a bidirectional universal switch, and is used in between the central processing unit and main memory of the computer. The bus communication systems are generally of two types, such as parallel communication and serial communication. As stated by Livingstone (2012), the parallel communication system allows several communication paths to transfer bits simultaneously. On the other hand, in the serial communication system, the bits are transferred one after through the single communication path.

It has been observed that the modern smart phones run on different operating system such as Android, Windows and iOS.  User Interface and Kernel are two components in the operating system.  The User Interface is a communication between the device and user. There are two types of user interfaces such as text based (Shell) and Graphical User Interface (GUI). As stated by Habib et al.  (2012), the user interface acts as an intermediately between the Users and the operating system of Kernel.

The Kernel is a performance based required functions. There are different options available in the Kernel such as File manager, Device drivers, Memory Manager, Scheduler and Dispatcher.  As stated by Livingstone (2012) , Kernel helps the users to create a directory and a directory path. The directory is a user-created bundle of files and other directories. The directory path is a sequence of directories within directories. As stated by Katsaros et al. (2012), Kernel allocates space in the main memory for storing the data. Sometimes Kernel creates illustration in the main memory system. It has been observed that Kernel creates virtual memory by playing a shell game in which blocks of data are shifted back and forth between the main memory and mass storage.

The SaaS is a computing cloud which provides storage to the users so that they may store data. The network cloud is connected to three different components such as corporate data centre, AWS IaaS data centre and the Google Mail application. The users have stored the data in the network cloud system (Guo et al. 2012). It has been observed that SaaS is interfacing with the Google Software as a cloud service provider. The SaaS is a Cloud Service Provider which implements their own application named as SaaS.

It has been observed that IaaS has provided the Network cloud service to the users. The IaaS is connected with the corporate data centre. IaaS has its own server and cloud storage space.  Moreover, it has provided storage facility to the individual users, virtual client and organization. As stated by He et al. (2012), the clients have got the opportunity to share their data with others. 

Bus Communication Systems in Computers

The encoding standards depend on the categories. The categories of the ASCII codes are divided into different segments such as upper-case letters, lower-case letters, digits, punctuation and control codes. Apart from this, the encoding systems can be of varied types such as encoding text as ASCII, conversion binary to decimal, encoding decimal to binary, binary encoding for number of alternatives and voice encoding (Ahlgren et al. 2012). The conversion process from Binary to Decimal depends on the seven positional exponents such as position value in decimal, decimal number, decimal representation, position value in decimal and binary numbers, equivalents decimal and representation of decimal numbers.  The encoding process from the decimal numbers to binary numbers is based on different values such as the binary position, the binary value, where step 0: Decimal number= 11, step 1, step 2 and step 3 and final binary number. As stated by Mann et al. (2012), the microphone is a converter which converts the human voice from analog to electrical signal.

In the contemporary world of globalization, social engineering attacks on human judgment have been a major concern for a considerable time. The social engineering attacks refer to forcing the victim to act against personal or organizational interests by trick. The major attack on human judgment includes the Phishing attacks (Tran et al. 2012). The phishing attacks are nothing but a sophisticated online trickery for acquiring sensitive information by authentic looking e-mails or websites. There are many examples of such kinds of attacks such as credit card number theft as well as identity theft. On the other hand, as stated by Gerstel et al. (2012),  another most critical attack is hacking which refers to accessing the computer resources internationally. This access is mostly conducted without authorization of those resources or in access of the authorization. The person who is performing the hacking activity is called as the hacker. Mostly, the hackers are known for using viruses such as Trojan horse as well as Malware which are illegal programming for damage.

The two sided network connection is the example of the optical fiber connection between the users and the hosts. This network design is based on the requirements of speed. The speed is different in the two directions. It has been noticed that most transmission lines are symmetric in speed. Therefore the higher-speed is transmitted through the lines (Chang and Ju 2012).

On the other hand, the three site traffic is the another network connection among the users and host. It has been observed that there are three sites connected by the two links.  Moreover, it has been observed that more than 300 Mbps connecting speed is required for the three site connections. However, there are some uneven speed distributions such as 45 Mbps and 2 Gbps. As stated by Bhuasiri et al. (2012), the link between the two sites must carry the flowing traffic.  However, it has been found that each pair of sites is connected with lines which carry traffic only between paired sites. 

Operating System Components: User Interface and Kernel

Knowledge Management (KM) system is an IT system that stores and retrieves information, improves collaboration, locates sources of knowledge and in some other ways enhances KM processes. This system also helps to acquire, create, save, and distribute knowledge. This system mainly collects internal knowledge and experiences within the organization and spreads it among the employees so that they can access it. This system also creates links with external sources of knowledge. However, according to Katsaros et al. (2012), there are several factors of failure in this such as lack of higher management support, organizational culture, individual budget are resistance to chance.

According to Ahlgren et al. (2012), customer relationship management system or CRM includes all the tools, technologies and processes to enhance and improve sales. It also helps to enhance customer relationship and relationship with the business partners. The CRM software serves to consolidate customer information and documents into a single CRM database (Tran et al. 2012). Thus business users can easily access the data and can manage it. Some common and useful features of CRM tool are marketing automation, sales force automation, contact center automation and geolocation technology. The biggest four companies that use this software are Salesforce.com, Microsoft, SAP and Oracle (Chang and Ju 2012).

A good project manager who wants to minimize any risks related to ICT failure must have the trait to provide action oriented tasks. Besides, in the same scenario a project manager must be a result driven person. He must have the skills to focus on his goals and the goals of his organization. In any situation, he should not be distracted, which is the main reason of ICT failures (Chang and Ju 2012). He will have to face the unpleasant parts of the project, as most of the project team members will avoid this part. A project manager must apply his experience and knowledge to command with authority and respect. A perfect project manager will set realistic deadlines for team members and will dictate clearly, what should be done. He will also describe the available resources to the team members so that they can understand how to use them in order to achieve the project goal (Gerstel et al. 2012).

Another important skill that a project manager must have is vision. A visionary project manager should have the ability to see the big picture and he must have the ability to understand any future trouble that might occur. Therefore, a project manager will be able to break down larger goals into smaller ones which will be more manageable.

In the contemporary world, it can be found, that outsourcing is experiencing failure. There are several important underlying reasons for this progressive failure which have been identified. According to Katsaros et al. (2012), exposure of the confidential data is the most critical cause of failure. As the outsourcing process involves the end user system, which uses there third party applications, the risk involved with the process is the exposure of the confidential information of the organizations. On the other hand, Bhuasiri et al. (2012), illustrated that vague outsourcing objectives is another vital reason for the continuous failure of the outsourcing business. Although outsourcing is based on the basis of cost reduction, the business does not need to make it their sole reason. It has been observed, that the organizations tend to grasp cost reduction as their sole objective rather than welcoming the bonus. This scenario compromises the quality of the product and service which in turn reduce the business scope.

The project manager plays a significant role in respect of success of the entire project. There are several attributes of the manager which can prevent the failure most impressively. As identified by Chang and Ju (2012), the major attributes of the project manager include good communicator, effective leadership skills, good decision maker, and clear and effective vision developer as well as have sound technical knowledge. This attributes help the project manager to conduct the entire project in a single handed fashion. At the same time, Mann et al. (2012) disclosed that the project manager must thrive under pressure. Moreover, the negotiation skills will impact the project in a positive way. Added to that, it has been also revealed that the project manager must be emphatic.  Enthusiasm will pave the pathway of the successful project. It is evident that these attributes are capable of turning the tide of the trend of contemporary project management in a most substantial manner.  

Reference list:

Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D. and Ohlman, B., 2012. A survey of information-centric networking. Communications Magazine, IEEE, 50(7), pp.26-36.

Bhuasiri, W., Xaymoungkhoun, O., Zo, H., Rho, J.J. and Ciganek, A.P., 2012. Critical success factors for e-learning in developing countries: A comparative analysis between ICT experts and faculty. Computers & Education, 58(2), pp.843-855.

Chang, J.Y. and Ju, P.H., 2012. An efficient cluster-based power saving scheme for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2012(1), pp.1-10.

Gerstel, O., Jinno, M., Lord, A. and Yoo, S.B., 2012. Elastic optical networking: A new dawn for the optical layer?. Communications Magazine, IEEE, 50(2), pp.s12-s20.

Guo, S., Xie, H. and Shi, G., 2012. Collaborative forwarding and caching in content centric networks. In NETWORKING 2012 (pp. 41-55). Springer Berlin Heidelberg.

Habib, B., Zaharia, G. and El Zein, G., 2012, April. Hardware simulator: Digital block design for time-varying MIMO channels with TGn model B test. In Telecommunications (ICT), 2012 19th International Conference on (pp. 1-6). IEEE.

He, X., Lee, P.P., Pan, L., He, C. and Lui, J.C., 2012. A panoramic view of 3G data/control-plane traffic: mobile device perspective. In NETWORKING 2012 (pp. 318-330). Springer Berlin Heidelberg.

Katsaros, K.V., Fotiou, N., Vasilakos, X., Ververidis, C.N., Tsilopoulos, C., Xylomenos, G. and Polyzos, G.C., 2012. On inter-domain name resolution for information-centric networks. In NETWORKING 2012 (pp. 13-26). Springer Berlin Heidelberg.

Livingstone, S., 2012. Critical reflections on the benefits of ICT in education.Oxford review of education, 38(1), pp.9-24.

Mann, V., Gupta, A., Dutta, P., Vishnoi, A., Bhattacharya, P., Poddar, R. and Iyer, A., 2012. Remedy: Network-aware steady state VM management for data centers. In NETWORKING 2012 (pp. 190-204). Springer Berlin Heidelberg.

Tran, T.T., Shin, Y. and Shin, O.S., 2012. Overview of enabling technologies for 3GPP LTE-advanced. EURASIP Journal on Wireless Communications and Networking, 2012(1), pp.1-12.

Yu, F., Li, P., Song, P., Wang, B., Zhao, J. and Han, K., 2012. An ICT-based strategy to a colorimetric and ratiometric fluorescence probe for hydrogen sulfide in living cells. Chemical communications, 48(23), pp.2852-2854.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Understanding USB, Fire Wire, Bus, OS, Cloud Computing, Encoding, Social Engineering Attacks, Network Connections, And Knowledge Management Is Essential For Essay.. Retrieved from https://myassignmenthelp.com/free-samples/ict-service-management.

"Understanding USB, Fire Wire, Bus, OS, Cloud Computing, Encoding, Social Engineering Attacks, Network Connections, And Knowledge Management Is Essential For Essay.." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/ict-service-management.

My Assignment Help (2017) Understanding USB, Fire Wire, Bus, OS, Cloud Computing, Encoding, Social Engineering Attacks, Network Connections, And Knowledge Management Is Essential For Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/ict-service-management
[Accessed 21 September 2024].

My Assignment Help. 'Understanding USB, Fire Wire, Bus, OS, Cloud Computing, Encoding, Social Engineering Attacks, Network Connections, And Knowledge Management Is Essential For Essay.' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/ict-service-management> accessed 21 September 2024.

My Assignment Help. Understanding USB, Fire Wire, Bus, OS, Cloud Computing, Encoding, Social Engineering Attacks, Network Connections, And Knowledge Management Is Essential For Essay. [Internet]. My Assignment Help. 2017 [cited 21 September 2024]. Available from: https://myassignmenthelp.com/free-samples/ict-service-management.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close