IT 200 Project One Technology Hardware and Software Guidelines and Rubric

In this project, you will demonstrate your mastery of the following competency:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Describe the technologies, hardware, and software used within the information technology field

Scenario

You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly and is opening a new office. They are focused on hiring and retaining the best in the field, and they believe that one way to do this is to provide every employee with the appropriate tools and technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and network for the three employees in the new office. They would also like you to address the security needs of the various employees.

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

  • Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
  • Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
  • Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Describe all hardware components, including peripherals, needed to create the systems
  • Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:Operating systemsApplications such as:Office automation productsSecurity products
  • Describe security measures needed to support this system. Security measures could focus on:AccessAdministration and user passwordsFirewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

What to Submit

To complete this project, you must submit the following:

Technology Needs ReportYour technology needs report should be 3–5 pages in length. For each of the new employees, you must describe all hardware components needed to create the system, identify specific software programs that the employees would need, and describe security measures needed to support the systems. Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

Network DiagramYou have also been asked to include a visual representation of the topology you selected and the network equipment needed to support interactions between these employees. Use Visio to create a 1-page (or 1-slide) diagram that identifies the networking equipment needed to enable the workflow between these employees.

Supporting Materials

Technology Needs Template Word Document

This template can be used as a note-taking or organizational tool. You may submit it along with your report and diagram, but it is not a requirement and it will not be graded.

IT 200 Network Configuration Model Guidelines and Rubic
IP Address and DNS
An Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet. It’s a numeric label assigned to devices that use the internet to
communicate. An IP address allows information to be sent between devices on a network: they
hold location information and make devices accessible for communication. There are 4 types of
IP addresses: public, private, static, and dynamic. Every device with an internet connection has
an IP address, whether it’s a computer, laptop, IoT device, or even toys. The IP addresses allow
for the efficient transfer of data between two connected devices, allowing machines on different
networks to talk to each other.
A Domain Name System (DNS) turns domain names into IP addresses, which allow browsers to
get to websites and other internet resources. They translate what a user types into a browser into
something the machine can use to find a webpage. This process of translation and lookup is
called DNS resolution.
Server and Client
A server stores, sends, and receives data. It “serves” something else and exists to provide
services. A computer, software program, or even a storage device may act as a server, and it may
supply one service or several. An example: web server, a computer program that serves
requested HTML pages or files. A web browser acts as the client. Application server is a
program in a computer in a distributed network that provides the business logic for an
application program.
A client is any computer hardware or software device that requests access to a service provided
by a server. The server is often on another computer system, in which case the client accesses the
service by way of a network. Clients start communication sessions with servers, which await
incoming requests. Examples of computer applications that use the client- server model are
email, network printing, and the World Wide Web.
VPN
VPN (Virtual Private Network) runs in the background while you are using the internet, keeping
you safe and protecting your privacy. When used, it encrypts all your data from when it leaves
your device. Your information passes through a safe intermediate stage which is known as VPN
server. This server can hide your confidential information. It can also pretend that you are
logging on from elsewhere globally, which allows you to access geo-locked services. A VPN is
used once you browse on a device, it will run in the background, protecting you 24/7. Some
benefits of using a VPN: secure connection from anywhere, extra layer against hackers,
anonymous browsing, and geographic freedom.
Firewalls
A security system designed to prevent unauthorized access into or out of a computer network.
They are often used to make sure internet users without access are not able to work with private
networks, or intranets, connected to the internet. Firewalls have become so important with the
rise of data theft and criminals holding systems hostage. They prevent hackers from gaining
unauthorized access to your data, emails, systems and more. It can stop a hacker completely or
deter them from choosing an easier target.
LANs and WANs
A local area network (LAN) consists of a series of computers linked together to form a network
in a circumscribed location. The computers in a LAN connect to each other via TCP/IP ethernet
or Wi-Fi. A LAN is normally exclusive to an organization, such as a school, office, association
or church.
A wide-area network (WAN) is the technology that connects your offices, data centers, cloud
applications, and cloud storage together. It spans beyond a single building or large campus to
include multiple locations spread across a specific geographic area, or even the world.
Reference
“What Is an IP Address? How Does It Work?” Fortinet-site,
www.fortinet.com/resources/cyberglossary/what-is-ip-address.
Accessed 12 Nov. 2023.
“What Is VPN? How It Works, Types of VPN.” Kaspersky,
usa.kaspersky.com/resource-center/definitions/what-is-a-vpn.
Accessed 12 Nov. 2023.
Justin Altuve operates a small photography business out of his home. He connects to the internet
through a cable modem connected to a wireless router. For information security, he uses a
firewall. On his network, he has a desktop PC, a laptop, an IP phone, and a printer. He uses a
digital camera that he regularly syncs with his laptop.
Justin runs a small photography business out of his home. The network configuration would first
start with the cable modem which connects to the internet. The modern is connected to a wireless
router. The router is protected by a firewall, which helps to prevent unauthorized access and
protect Justin’s data.
Justin’s devices a laptop, desktop PC, an IP phone and printer are connected to the network. The
wireless router is connected to the laptop and desktop PC. The printer and IP phone can be either
connected to Ethernet cables or wireless. And with a USB connection the digital camera sync
with the laptop.
I would recommend that Justin use a strong, long and unique password for his wireless network
to prevent unauthorized access. He should have regular updates to all devices with any protection
software he has. Also, make sure that the firewall is properly configured to block potential
threats. The firewall provides an added layer of security, safeguarding against potential threats
from the internet and helping to protect his business data.
Justin can access the internet from his devices, make calls through the IP phone, sync photos
from his digital camera to his laptop and print photos.
Technology Needs Template
Certified Public Accountant (CPA)
The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal
tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by
the tax and data-entry specialist employees.
Hardware
Components
Software
Security Measures
Human Computer
Interaction (HCI)
Networking
Equipment
Tax Specialist
The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer
interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
Hardware
Components
Software
Security Measures
Human Computer
Interaction (HCI)
Networking
Equipment
Data Entry Specialist
This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist
works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist
for review.
Hardware
Components
Software
Security Measures
Human Computer
Interaction (HCI)
Networking
Equipment

Still stressed with your coursework?
Get quality coursework help from an expert!