0% found this document useful (0 votes)
99 views8 pages

BAC International Study Centre Overview

The document discusses hardware and software needs for a security company called Berimbolo Security. It identifies key internal stakeholders as the company owners who manage operations and budgets. It also discusses recently hired employees as internal stakeholders. The summary discusses software needs such as operating systems, utility software, and application software to help run operations smoothly and efficiently. It also identifies hardware needs such as personal computers, servers, input/output devices, storage, and mobile devices for employees. Lastly, it discusses the use of data connections and networks through use of CCTV security cameras to record visual evidence that can help locate intruders if needed in court.

Uploaded by

Naiyara Neeha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views8 pages

BAC International Study Centre Overview

The document discusses hardware and software needs for a security company called Berimbolo Security. It identifies key internal stakeholders as the company owners who manage operations and budgets. It also discusses recently hired employees as internal stakeholders. The summary discusses software needs such as operating systems, utility software, and application software to help run operations smoothly and efficiently. It also identifies hardware needs such as personal computers, servers, input/output devices, storage, and mobile devices for employees. Lastly, it discusses the use of data connections and networks through use of CCTV security cameras to record visual evidence that can help locate intruders if needed in court.

Uploaded by

Naiyara Neeha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Centre Name: BAC INTERNATIONAL STUDY CENTRE

Centre Code: 93195


Assessor: Mustasir Wahid

School of IT
Unit Number:
Unit Title:
Assessor: Muntasir Wahid
Semester:

Name: Naiyara Nahiyan


ID: 2020426014
Edexcel Reg. Number:

Handout date:
Submission date:
Task 1. Software that will meet the needs of the company and its stakeholders.

Any individual, organization, social group, or community at large that has a stake in the company is
referred to as a stakeholder. As a result, stakeholders may be either internal or external to the business.
A stake is a significant interest in the company or its operations. Ownership and land values, legitimate
interests and duties, and moral rights are all examples.

A stakeholder is someone who has a vested interest in a corporation and may influence or be influenced
by its activities and results. The owners in an organization may be internal or external to the company.
Internal stakeholders are individuals who have a direct interest in a business, such as by jobs, ownership,
or investment. External stakeholders are those who do not directly work for an organization but are
impacted by its decisions and consequences in any way. External stakeholders include suppliers,
insurers, and public organizations. Investors, workers, consumers, vendors, societies, states, and trade
unions are the principal stakeholders of a traditional company.

For consumers and commercial businesses, Berimbolo Security sells and implements security services.
The organization currently employs two people: the brothers who founded it, Royce and Rickson
Berimbolo. Four more employees have been hired to start working as the firm moves to a new location.

Internal stakeholders are people who have a vested interest in a business, whether by employment,
ownership, or investment. As, Royce and Rickson Berimbolo are company owners so, they are the
stakeholders of the company.
They manage the company’s budget and also the company payroll. Their work is to check and monitor
the work of all staff. They also communicate and negotiate with suppliers. In addition, it has also been
their work to visiting customers to discuss and analyze their security needs as well as to install security
systems.

Software is a set of directives, files, or applications that are used to operate computers and performing
particular tasks. Hardware, on the other hand, refers to the physical parts of a computer. To expand, the
business would need a wide range of software. The software which will be needed and how will it help
is explained below;
Software that acts as a base for other software is known as system software. Operating systems which
including macOS, Linux, Android, and Microsoft Windows are instances of machine software, as are
computer science software, game engines, process control, and software as a service app.

An operating system is a program that manages computer hardware and software resources while also
delivering common services to computer programs. The operating system allows to communicate with a
computer without having to understand its language. A computer or handheld device cannot be used
without first running an operating system.

Utility software is device software that can analyze, configure, automate, or administer a system. The
operation of the computing infrastructure, which includes the computer hardware, operating system,
applications, and data storage, is usually the focus of utility software. In contrast to program software,
utility software, such as operating system software, is classified as system software. Utility program
operates in conjunction with the operating system to execute routine tasks and keep the system running
smoothly. Utility software is intended to improve the capabilities and reliability of the operating system
in order to keep the application running smoothly.

Utility app is designed to help with everyday activities. Utility program performs routine functions such
as security tests and peripheral system control, such as cameras, scanners, and webcams.
Viruses are detected and removed using utility tools. This program does everything from providing
notifications or reminders that patches or backups are available to other software updates. This utility
program can also be used to back up data and clean up files. By scanning for junk data and purging it to
free up computing space, utility software may also be used to gather data in order to clean up the system
and increase performance.

Application software is a type of computer program that performs a certain personal, educational, or
business function. Each piece of software is intended to aid the user in a particular task, such as
performance, development, or interaction. Users can chat with their devices and perform a variety of
activities, including work and entertainment, using apps. Examples include Microsoft Word and Excel,
as well as web browsers.

The intended usage determines the features of device programs. A presentation app, for example, will
have features such as switching between slides while a slide show is playing, and a word processing app
will have features such as different forms of tab stops and margin control to help with text creation.
Market processes have vastly improved with the invention of application software. Application software
enables businesses to cut costs, boost efficiency, and track output by using integrated digital processes
and improved data processing power.
Task 2. Hardware that meets the need of the company and its stakeholders.

In order to grow and meet the needs of the company and their stakeholders, the features and uses of
digital devices as well as the hardware along with peripheral devices and media that the company will be
needing is below;

A personal computer may be a desktop computer or a laptop, netbook, tablet or a handheld PC. The


company will need at least five to six personal computers in order to operate and run the business
effectively.
For personal computers:
 Ram: This hardware stores data or code; it is a form of memory that can be accessed
quickly and has a direct link to the CPU. RAM is the main memory in a computer.
 Motherboard: This is the core of the machine, linking all of its elements in one place and
allowing them to communicate. None of the computer's components, such as the CPU,
GPU, or hard drive, will be able to communicate without it.
 Processor: A processor, also known as a processing unit, is a digital circuit that executes
operations on data from an external source, normally memory or another data stream.
 SDD: A solid-state drive is a modern type of disk storage unit. SSDs use flash-based
memory to supplement conventional mechanical hard disks. Because of their low read-
access times and high throughputs, SSDs greatly speed up processors.
 HDD: A hard disk drive is an electro-mechanical data storage system that uses magnetic
storage to store and retrieve digital data. HDDs are a form of non-volatile storage that
retains data even when the computer is turned off.
 Power Supply Unit: A power supply unit transforms mains AC into low-voltage,
controlled DC power for a computer's internal components.
 Optical drive: It is a disk drive that uses a laser to read or write information in an optical
disk.

Servers: A server is a device that provides information to other computers that link to it. Clients may
connect to a server through a local area network or a wide area network. When users link to a computer,
they can access the server's programs, databases, and other data.
 Input devices: In computing, an input device is a piece of equipment used to provide data and
control signals to an information processing system such as a computer or information
appliance. Input devices are keyboard, touch screen, pointing devices, such as, a mouse, stylus,
touchpad, graphics tablets, microphone, scanner, cameras, sensors.
 Output devices: An output device is any piece of computer hardware equipment which converts
information into human read able form. It can be text, graphics, tactile, audio, and video. Output
devices are screens, projectors, printers, actuators, motors.
 Accessibility devices like, alternative keyboards, sip-and-puff systems, wands and sticks, braille
embossers.
 Data processing is the conversion of data into usable and desired form.
1. Manual data processing: Data is processed manually without using any machine or tool to
get required results.
2. Automated data processing: Automated data processing is the creation and implementation
of technology that automatically processes data.
 Data capture and collection systems, for example, barcode scanners, RFID, sensors and weather
stations are a must.
 Storage devices, like, USB flash drives, memory cards, hard drives, optical drives/discs,
magnetic tape drives.
 Handheld devices like, smart phones, modular smartphones, specialist phones and tablets are
must. Employees requires mobile devices like smartphones for better communication and also
organization should consider providing a company phone to employees for betterment of
maintaining certain policies.
 Sim: For employees to maintain contact, a sim or subscriber identification module is needed.

Now lastly, Any movement within the visual range of CCTV is recorded, which can then be used
to locate the intruder and use the visual record as evidence in court.
Task 3. Use of data connections and networks.

Employees must use either Wi-Fi or cable networks to connect to a network. Every organizations uses
personal computers for their everyday work. A secure connection is often desired if workers are
expected to operate from home, and the same is true within an office setting, as a secure connection
would prevent any malicious events or attacks.
Peer-to-peer networking can be used for home Computers, that involves no servers and basic sharing of
internet, printing, and folder sharing. A power-on password or user identification for each device, a
WAP2 password for connecting to the Wi-Fi, and passwords for shared files are likely to be used for
security on a peer-to-peer network.
Client-server networking will be used in an organization, with servers controlling the resources that user
accounts have access to. In a client-server network, security is based on user authentication as they log
in, which is normally done by entering in their ID and password, and then on which sections of the
network they have access to. Separate authentication log-ins are common among networked systems.
All of an organization's computers, such as tablets, smartphones, laptops, desktops, and servers, is
possible to merged into a single operating system. Using and storing data through various computer
systems has some consequences for an enterprise and its employees. The majority of businesses use a
computer system with several devices attached to it.

Below there is a list of few concepts that impacts the storing of data across multiple systems.

1. Access: For employees who need to deal with customer accounts or other company data, data
access is essential. On a networked machine, this is an easy operation, but it becomes much more
complex when data synchronized through several computer systems that are not linked to each
other. Certain apps can be used within the network to simplify data management by allowing
data from various apps to be modified.
2. Implementation: It can be difficult to update and use data in a system that uses many computer
systems. Since retrieving data from one system can necessitate manual data entry into another
system, which can be time consuming and lead to human error.
3. Cost: The extra time required to obtain information or mistakes caused by using out-of-date data
on non-synchronized computer systems could result in a cost impact of storing data across
multiple computer systems.
4. Security: An integrated computer system can have better protection since security can be
managed from a single location and issues associated with safely transmitting data between
devices can be avoided. Data stored on mobile devices such as laptops or tablets may pose a
security risk.
5. Productivity: Data that is stored across numerous computer systems reduces productivity due to
the time spent synchronizing data, particular if it's being done manually.

Backups must be done and routinely monitored, with the frequency varying depending on the device
requirements. Every week, a complete backup could be made, with incremental backups two or three
times per day. A data recovery exercise should be performed on a regular basis to ensure that data can be
successfully restored to a device where it has never been used before.

Backing up refers to the process of replacing data that has been lost corrupt practices or pilot error. The
data is backed up elsewhere so that it can be used to replace missing data if necessary. It's easier to back
up data if it's all on a single server, so it can all be transferred to the backup media at once. Recovery
procedures are often much easier with a single central server as opposed to multiple servers or
networked computer systems.

Common questions

Powered by AI

Essential components for Berimbolo Security include RAM for quick data access, the motherboard for connectivity, the processor for executing data operations, SSD for faster storage, HDD for non-volatile storage, and power supply units for converting power. These components work together to ensure efficient operation and data management critical to security processes like client communication and system monitoring .

Input devices, such as keyboards and scanners, allow users to provide data and control signals, essential for entering client and system data. Output devices, like screens and printers, convert processed data into human-readable forms, enabling stakeholders to access and act on information quickly, thereby facilitating seamless interaction with computing systems .

System software, including operating systems like macOS and Windows, acts as a base for other software, managing hardware resources and offering essential services for application programs. This allows for efficient communication and operation of devices on a network, which is crucial for Berimbolo Security to run its business operations smoothly, including managing data and providing security services .

Utility software enhances system performance and reliability by performing routine tasks such as security tests, peripheral control, data backups, and file cleanups. It works with the operating system to maintain optimal system function and notify users of system updates, thereby preventing malicious activities and ensuring the reliability and efficiency of business operations .

Client-server networks improve security and efficiency by centralizing resource management and security protocols. Unlike peer-to-peer networks, client-server models allow for controlled access through user authentication, reducing the risk of unauthorized access and enabling efficient data management across multiple devices, which is vital for handling sensitive security data .

Data backup and recovery enhance productivity by preventing data loss and ensuring quick recovery of essential data, thus minimizing downtime. These strategies secure data against corruption and unauthorized access, ensuring business continuity and protecting sensitive client information, which are vital for Berimbolo Security's operations .

Challenges include increased risk of errors due to manual data entry during synchronization, higher costs from time inefficiencies, and security risks from decentralized data management. These issues complicate data updates, increase operational costs, and pose security threats, thereby requiring improved integrated systems for effective data handling .

Implementing multiple systems can complicate data access due to non-synchronized systems, leading to manual data entry, potential errors, and challenges in implementing updates. This complexity impacts data integrity and accessibility, necessitating integrated solutions to streamline management and improve reliability in accessing information across systems .

Internal stakeholders, such as Royce and Rickson Berimbolo, have direct interests in the business through employment, ownership, or investment, and they manage aspects like the company's budget and payroll. External stakeholders, like suppliers and public organizations, do not directly work for the organization but are affected by its decisions. Their interests can influence business operations as internal stakeholders must manage and negotiate with external stakeholders, like suppliers and clients, to ensure smooth operations .

Mobile devices are crucial for ensuring communication and accessibility on-the-go, which enhances operational flexibility and responsiveness. They integrate with the IT infrastructure to support tasks such as remote client communication, data access, and real-time security monitoring, thereby aligning with business needs of efficiency and accessibility .

You might also like