Information Technology Foundations
About this Course
Information technology (IT) can be viewed as a system, a combination of independent parts all working together to accomplish a certain goal. Systems are everywhere. For example, the respiratory, circulatory, nervous, and other subsystems of the body work together towards the common goal of keeping humans alive. IT is similar in that it consists of various subsystems all working towards a common goal. Information Technology Foundations will examine how the system called IT helps an organization advance its business goals and vision, resulting in improved growth, profits, and productivity. The course will explore the different components of IT and how they work together as a system to support the different aspects of an organization. Specifically, the course will explore different categories of software such as operating systems, programming, and databases. The hardware components that will be examined are the structure of computers and their peripherals. The role of people will be an important focus of the course, describing which roles are necessary for the IT system to function efficiently and effectively. This focus includes the various administrative roles, the methodologies used by people tasked with developing new systems, and the ethical issues that must be considered by individuals involved with IT. In IT, as with many other systems, the independent parts must be integrated together to reach the common goal. This integration is accomplished by networking, which encompasses the core components of hardware, software, and users. IT supports and improves many aspects of an organization, including communication (both internal and external), resource sharing, cross-department integration, information management, security of organization and employee information, and organization adherence to ethical practices.Created by: Western Governors University
Level: Introductory

Related Online Courses
Para el proceso de minería de datos es fundamental conocer a priori qué productos compran nuestros clientes y hacer un análisis de la cesta de la compra con los datos de entrada disponibles. Es... more
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to... more
Much of the world's data lives in databases. SQL (or Structured Query Language) is a powerful programming language that is used for communicating with and manipulating data in databases. A working... more
Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. In this course,... more
Build professional VR apps using Unity 3D, a powerful cross-platform 3D engine that provides a user-friendly development environment. In this course, part of the Virtual Reality Professional... more