

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Material Type: Notes; Professor: Tollison; Class: Intro to Information Systems; Subject: Business; University: Mississippi University for Women; Term: Fall 2007;
Typology: Study notes
1 / 3
This page cannot be seen from the preview
Don't miss anything!
Introduction to IT Infrastructure October 26 – November 1
equipment that, when combined, provide the underlying foundation to support the organization’s goals (p. 316). o As a knowledge worker, you will be continually faced with questions regarding how the IT infrastructure can best support your organization’s goals (p. 316). o As your business and the technology change, you will have the answer the question time and time again (p. 316).
the Internet , and n-tier infrastructures (p. 317).
servers and provide services to the other computers, called clients (p. 317). A basic client/server network is known as a 2-tier infrastructure since they are only two tiers – the client and the server (p. 319). Most software is located on the client PC (p. 319). This leads to a situation in which workers are storing data on their computers and not be accessible to co-workers (p. 319).
The n represents the number of tiers (p. 319).
tier infrastructure (p. 319). A 3-tier infrastructure contains clients, applications servers, and data servers (p. 319):
Today, most employees require an Internet connection. One of the decisions you will make regarding your IT infrastructure (p. 318). 78% of companies detect employee abuse of their Internet access privileges. Types of abuse include playing games, downloading movies, listening to music, gambling, trading stocks, e-mailing jokes, and even distributing critical company information (p. 318).
events are received (p. 320).
information from unauthorized access by the clients (p. 322).
(p. 327).
access by a special security feature called a firewall (p. 320). An intranet is a tool for presenting organizational information as it provides a central location where employees can find information such as benefits, schedules, strategic directions, and employee directories. The primary benefit of an intranet is that people outside the organization cannot access it.
outsiders, such as customers and suppliers (p. 320) Many companies are building extranets as they begin to realize the tremendous benefit of offering individuals outside the organization access to intranet-based information.