Computerhelp4all logo Articles AboutTopicsQuizzesComputer Questions & AnswersComputer Terms & DefinitionsActivitiesContact

What Is Information Technology? (IT)

What Is Information Technology (IT)

Date First Published: 22nd March 2022

Computer Terms & Definitions

Difficulty: Easy

Difficulty Level: 1/10

Learn more about what information technology (IT) is in this article.

Information technology (IT) is the study and use of computer systems, networks, hardware, software, and storage to process and manage information and exchange data. Information technology concerns anything related to computing and is used on a daily basis. For example, businesses use IT for storing their information electronically. This eliminates the need for paper and ink, which is better for the environment.

The release of IT has had a huge benefit on everyone since it allows them to store documents electronically, send emails rather than manually writing letters and using paper and ink, research information to find out more details, have meetings over the internet, and more.

IT Jobs

Lots of jobs exist in the IT industry, which are stated below.

Web developer

The role of a web developer is to build and develop webpages that are suitable for the needs of users and businesses. Web developers use their creativity to design interactive, compatible, fast, and eye-catching webpages for other users. The requirements of becoming a web developer are good knowledge of the programming and markup languages of the web, such as HTML, CSS, and JavaScript, good knowledge of SEO, good problem-solving skills, knowledge of accessible website design, etc.

Network administrator

The role of a network administrator is to ensure the reliability, productivity, security, and suitability of networks in an organisation. They ensure that networks in an organisation meet the needs of the organisation and are functioning properly. The requirements of becoming a network administrator are good knowledge of types of networks and how to configure them, such as LANs, WANs, VPNs, SANs, good knowledge of security features of networks, such as WPA and firewall, good network skills, a high level of technical knowledge, etc.

Software engineer

The role of a software engineer is to develop, evaluate, and maintain software that meets the needs of users and is fit for purpose. They ensure that software is compatible with a range of operating systems and is free from errors and test updates. The requirements of becoming a software engineer are good knowledge of programming languages used to build software, such as Java, Python, and C++, and a good understanding of compatibility issues within software and operating systems. Software engineers may make necessary adjustments to software based on the needs of users.

Hardware engineer

Hardware engineers focus on the physical components of a computer, such as the RAM, motherboard, expansion slots, CPU, power supply, rather than the programs that are used by computers. The role of a hardware engineer is to create advancements in computer hardware and develop electronic products, such as circuit boards, power supplies, processing units, and fans. The requirements of becoming a hardware engineer is a good understanding of how the physical parts of a computer are made and a bachelor’s degree in computer engineering.

Support technician

Support technicians, also known as IT technicians help people with issues related to computers. They resolve issues related to computer software and hardware for users. They may configure computer systems and diagnose faults. Several different types of technical support exist, which include configuring computer networks within an organisation, repairing physical parts within a computer, fixing issues with websites, resolving issues with operating systems and software, etc.

Database administrator

Database administrators ensure the integrity, consistency, security, and reliability of databases in an organisation. They help maintain and organise databases that hold information, such as customer records, and use functions to manipulate the data. In addition, they help ensure that data is recoverable in the event of an emergency, update and test database management systems, control access permissions and privileges, and make sure to be in line with data protection regulations, such as the Data Protection Act 1998 as some databases will hold confidential information about people. The requirements of becoming a database administrator are a good understanding of database management systems, the language used for manipulating data (SQL), and good technical skills.

Cybersecurity analyst

A cybersecurity analyst is a person in an organisation who provides protection for IT infrastructure, such as networks against a range of cyberattacks, such as unauthorised access, hacking, DDoS attacks, ransomware, brute force attacks, zero-day exploits, SQL injection, man-in-the-middle-attacks, and more. The role of a cybersecurity analyst may be to design, test and evaluate security systems, use tools to detect vulnerabilities, control access management and prevent access from unauthorised users, give staff guidance as to how to stay safe when using computer systems, such as not opening unknown programs or email attachments, create emergency plans in the event of security breaches, keep up to date with the latest technological developments, etc. The requirements of becoming a cybersecurity analyst are a good understanding of cybersecurity risks, a good understanding of network security technologies, good problem skills, and a bachelor’s degree in computer science. Most cybersecurity analysts have a bachelor’s degree in computer science.

Issues In IT

The use of IT to store, process, and manage information has caused issues, such as:

  • Risks of viruses and malware - As a result, this could cause confidential information to be stolen, loss of data, crashes to computer systems, annoying popups, hard drives being wiped out, and more. Computer viruses are commonly spread through malicious websites by downloading and running unknown files and email attachments.
  • Risk of cyberbullying - People being bullied online has greatly increased due to the release and development of services, such as chatrooms, email, and social media. As a result, cyberbullying can have a serious impact on people’s mental health, such as causing low self-esteem, anxiety, fear and more.
  • Risk of hacking - Hidden vulnerabilities that can be exploited by hackers are becoming much more common. Once exploited, the hacker could gain unauthorised access to that account and use it to perform malicious tasks. In addition, databases that hold people’s sensitive information could be hacked into by attackers, causing a data breach.
  • Spam and phishing emails - Email has become a very popular form of electronic communication. However, it is possible for anyone that has internet access to send spam and phishing emails, which impersonate a company and trick people into giving their sensitive information away.
  • Data protection violations - There are legislations about how businesses use personal data. An example of a legislation is the Data Protection Act 1998. The use of computer systems has increased the chance of violations of data protection laws, such as it being transferred to unauthorised users.
  • Copyright violations - This occurs when copyrighted content is reproduced or distributed without permission from the copyright holder in a way that infringes their copyright.
  • Privacy risks - Some websites can install spyware or add cookies that track the activity or collect sensitive information of a user which could be used by data brokers.

History

Data storage

IT has been around for a very long period of time. In 1932, the first form of non-volatile computer storage was invented. It was the magnetic drum, a data storage device that was invented by Gustav Tauschek in Austria. In the 1950s and 1960s, this was commonly used as a form of computer memory. In addition, it was used by the Ferranti Mark 1, the first commercially available electronic computer. However, magnetic drums were replaced by magnetic core memory as primary computer memory. These offered better speed, size, and reliability. Then, drums were replaced by hard disk drives for secondary storage and the manufacturing of drums stopped in the 1970s.

In 1956, the first hard disk drive (HDD) was introduced. It was introduced as a component of their 305 RAMAC system, the first computer system that used a moving head hard disk drive for secondary storage.

The Williams tube was the first random-access storage device. It was based on a standard cathode ray tube and the information and the information stored on it was volatile, meaning that it was lost when turned off.

Punched tape was used in early computers, such as Colossus to represent data. It was a long strip of paper where data was represented by a range of holes. This technology is now outdated and no longer used.

Databases

In the 1960s, database management systems (DBMS) were created for storing and retrieving data accurately and quickly. An early database management system is the Information Management System that was developed by IBM. It is still commonly used 50 years after it was released.

The first commercially available relational database management system was available in 1981. It was released by Oracle. In addition, a programming language called SQL (Structured Query Language) was released based on relational algebra.

Frequently Asked Questions

What is the difference between IT and ICT?

IT (Information Technology) and ICT (Information and Communication Technology) look similar, but they are two different fields. IT refers to the study and use of computer systems, networks, hardware, software, and storage to process and manage information and exchange data, whilst ICT is mostly used in an educational context and refers to the use of media broadcasting, audio and video processing, and telecommunications to process and manage information and exchange data. This is known as communication.

ICT is an extended abbreviation of IT that is used to refer to the combination of communication technology with information technology. IT is more commonly used in industry. The word ICT was introduced in 1997 by Dennis Stevenson in a report to the British government. However, the word IT has been around since 1958. It first appeared in the 1958 Harvard Business Review when the authors Harold Leavett and Thomas Whistler said "The new technology does not yet have a single established name. We shall call it Information Technology."


Feedback

  • Is there anything that you disagree with on this page?
  • Are there any spelling, grammatical, or punctuation errors on this page?
  • Are there any broken links or design errors on this page?

If so, it is important that you tell me as soon as possible on this page.