SlideShare a Scribd company logo
rmmakaha@gmail.com
DUTIES & RESPONSIBILITIES OF:
COMPUTER PERSONNEL
OR IT DEPARTMENT STAFF
DATABASE ADMINISTRATOR (DBA)
 This employee is responsible for the organization's data and maintains the data
structure.
 The database administrator has control over all the data; therefore, detective controls
and supervision of duties must be observed closely.
 This is usually a role filled by a senior information systems employee because these
employees have control over the physical data definition, implementing data
definition controls and defining and initiating backup and recovery.
 undertake daily administration, including monitoring system performance, ensuring
successful backups, and developing/implementing disaster recovery plans
 manage data to give users the ability to access, relate and report information in
different ways
 develop standards to guide the use and acquisition of software and to protect
valuable information
 modify existing databases or instruct programmers and analysts on the required
changes
 test programs or databases, correct errors and make necessary modifications
 train users and answer questions
rmmakaha@gmail.com
COMPUTER SUPPORT SPECIALISTS
 Provide technical assistance, support, and advice to customers and other
users.
 This occupational group includes technical support specialists and help-desk
technicians.
 These troubleshooters interpret problems and provide technical support for
hardware, software, and systems.
 They answer telephone calls, analyze problems by using automated
diagnostic programs, and resolve recurring difficulties.
 Support specialists may work either within a company that uses computer
systems or directly for a computer hardware or software vendor.
 Increasingly, these specialists work for help-desk or support services firms,
for which they provide computer support to clients on a contract basis.
rmmakaha@gmail.com
Technical support specialists
 They Answer telephone calls from their organizations’ computer
users and may run automatic diagnostics programs to resolve
problems.
 Working on monitors, keyboards, printers, and mice, they install,
modify, clean, and repair computer hardware and software.
 They also may write training manuals and train computer users in
how to use new computer hardware and software.
 In addition, technical support specialists oversee the daily
performance of their company’s computer systems and evaluate
software programs with regard to their usefulness.
rmmakaha@gmail.com
Help-desk technicians
 Accepts problem calls from users and registers each call on a help desk database
 Solves the problem for the user over the phone if possible. The assistance is usually limited to simple
problem solving related to the operating system, software and basic peripheral devices
 If the problem cannot be solved over the phone, the help desk mobilises the relevant it staff member,
usually by email or in the help desk database, to assist the user.
 Assist computer users with the inevitable hardware and software questions that are not addressed in a
product’s instruction manual.
 Help-desk technicians field telephone calls and e-mail messages from customers who are seeking
guidance on technical problems.
 In responding to these requests for guidance, help-desk technicians must listen carefully to the
customer, ask questions to diagnose the nature of the problem, and then patiently walk the customer
through the problem-solving steps.
 Help-desk technicians deal directly with customer issues, and companies’ value them as a source of
feedback on their products.
 These technicians are consulted for information about what gives customers the most trouble, as well
as other customer concerns.
 Most computer support specialists start out at the help desk.
rmmakaha@gmail.com
Network support
 Assist users in rectifying network-related problems
such as security access, Internet access, network
failure, printer failure
 Assist the network administrator in managing user
accounts, installing software on the network,
backing up and retrieving files and maintaining
network security
 Maintain the help desk database by recording
problem resolution on problem calls attended to.
rmmakaha@gmail.com
Software support
 Monitor the state of custom software systems
 Troubleshoot when the software fails to work properly
 Keeping records of hardware and software purchased,
including the purchase of consumable items
 Ensuring equipment is well maintained and serviced
where required.
rmmakaha@gmail.com
NETWORK ADMINISTRATORS / SYSTEMS ADMINISTRATORS
Closely related jobs:
 Network Technician,
 Network Engineer,
 Website Administrator,
 Systems Administrator,
 Telecommunications Engineer
 Network administrators provide operational support for and management of computer networks to ensure they
run efficiently. The IT networks can range from internet and private networks to large communications
networks.
 Design, install, and support an organization’s local-area network (LAN), wide-area network (WAN), network
segment, Internet, or intranet system.
 They provide day-to-day onsite administrative support for software users in a variety of work environments,
including professional offices, small businesses, government, and large corporations.
 They maintain network hardware and software, analyze problems, and monitor the network to ensure its
availability to system users.
 These employees are responsible for maintenance and configuration of network equipment, such as routers,
switches, firewalls, wireless access points, and so on.
 These workers gather data to identify customer needs and then use the information to identify, interpret, and
evaluate system and network requirements. Administrators also may plan, coordinate, and implement network
security measures.
rmmakaha@gmail.com
 install, configure and maintain PCs, networking equipment and
network operating systems
 monitor and configure networks to optimize performance and resolve
faults
 undertake recovery action in the event of a system failure
 establish and control system access and security levels
 provide training and support for system software
 Implement and co-ordinate housekeeping procedures, including system
back-ups, setting up user accounts, monitoring file access etc.
 plan and implement maintenance and upgrades for system software
and hardware
 maintain peripheral devices connected to the printer such as printers
and scanners
CONTINUED……………….
rmmakaha@gmail.com
SYSTEMS ADMINISTRATORS
 Are the information technology employees responsible for the efficient use of
networks by organizations?
 This employee is responsible for the operation and maintenance of the LAN and
associated components such as mid-range or mainframe systems. Although
small organizations might have only one systems administrator, larger
organizations have many.
 They ensure that the design of an organization’s computer site allows all of the
components, including computers, the network, and software, to fit together and
work properly.
 Furthermore, they monitor and adjust the performance of existing networks and
continually survey the current computer site to determine future network needs.
 Administrators also troubleshoot problems reported by users and by automated
network monitoring Systems and make recommendations for enhancements in
the implementation of future servers and networks.
rmmakaha@gmail.com
SYSTEM ANALYST AND DESIGNERS
Job Titles
 Network Designer
 Systems Analyst
 Solutions Architect
 Senior Systems Engineer
 Senior Solutions Architect
 Systems Architect
 Principal Solutions Architect
 Analyzing problems in software development and guiding the
rectification of faults in programs
 Analyzing software requirements and defining program parameters and
specifications
 Undertaking analysis of current software products and determining
approaches which will improve their user interface, performance and
integrity
 Leading team members and third parties in client organizations in the
integration of technological methodologies and components of projectsrmmakaha@gmail.com
 Ensuring and being accountable for the technical integrity of the design in
accordance with the client’s requirements
 Ensuring that programs meet marketing/user requirements by testing and
monitoring initial field use and problems
 Guiding the preparation of software manuals and guides
 Improving the interface between systems users, the operating system and
applications software
 Conducting user requirements analysis to match customer needs to company
products and services
 Assisting the sales force with pre-sales activity such as proposal preparation,
systems demonstrations and presentations, particularly in relation to larger and
more important clients.
 These employees are involved in the system development lifecycle (SDLC)
process. They are responsible for determining the needs of users and developing
requirements and specifications for the design of needed software programs
CONTINUED……………….
rmmakaha@gmail.com
COMPUTER SECURITY SPECIALISTS
 May plan, coordinate, and implement the organization’s information
security.
 These workers may be called upon to educate users about computer
security,
 Install security software,
 Monitor the network for security breaches,
 Respond to cyber-attacks
 Gather data and evidence to be used in prosecuting cybercrime.
 The responsibilities of computer security specialists has increased in
recent years as there has been a large increase in the number of cyber-
attacks on data and networks.
 This and other growing specialty occupations reflect an increasing
emphasis on client-server applications, the expansion of Internet and
intranet applications, and the demand for more end-user support.rmmakaha@gmail.com
IT SECURITY
 They’re in charge of keeping organizations safe from malicious
digital attacks.
 This includes implementing and running security software,
 Scanning for abnormalities
 Upgrading systems
 Keeping their company informed of the risks involved in daily
activities.
 This job requires a lot of problem solving, crisis management, and
effective communication between team members and higher-ups.
rmmakaha@gmail.com
COMPUTER PROGRAMMERS
 Computer programmers write, test, and maintain the programs that computers follow when
performing specific functions.
 The main task of computer programmers is problem solving and development of systems
solutions using the appropriate methodologies and techniques.
 A programmer uses programming languages, such as C++, PHP, or Java to communicate with
computer to perform a set of instructions.
 In addition to writing new programs, computer programmers update and maintain existing
programs.
 They test programs to ensure efficiency, accuracy, and to identify programming errors
 Write, test, and maintain the detailed instructions, called programs that computers must follow
to perform their functions.
 Programmers also conceive, design, and test logical structures for solving problems by
computer.
 Programmers write programs according to the specifications determined primarily by computer
software engineers and systems analysts.
 After the design process is complete, it is the job of the programmer to convert that design into
rmmakaha@gmail.com
 The programmer codes these instructions in a conventional programming
language such as COBOL; an artificial intelligence language such as prolog; or
one of the most advanced object-oriented languages, such as Java, C++, or actor.
Different programming languages are used depending on the purpose of the
program.
 Work with field experts to create custom software
 Analyze technical data, designs, and prototypes
 Prepare and present reports on project specifications, activities, and status
 Write computer software, programs, or code
 Document reliability of technical specifications
 Work with software providers to increase proficiencies while working within
applications
 Work cross-departmental on development and support
 Prepare software documentation for end users
CONTINUED……………….
rmmakaha@gmail.com
DATA PREPARATION STAFF
 Are those people responsible for the translation of data into machine readable form?
COMPUTER SCIENTISTS
 Work as theorists, researchers, or inventors.
 Their jobs are distinguished by the higher level of theoretical expertise and innovation they apply to
complex problems and the creation or application of new technology.
 Those employed by academic institutions work in areas ranging from complexity theory to hardware to
programming-language design.
 Some work on multidisciplinary projects, such as developing and advancing uses of virtual reality,
extending human-computer interaction, or designing robots.
 Their counterparts in private industry work in areas such as applying theory; developing specialized
languages or information technologies; or designing programming tools, knowledge-based systems, or
even computer games.
rmmakaha@gmail.com
DATA ENTRY AND INFORMATION PROCESSING WORKERS
 Help ensure the smooth and efficient handling of information and entering all data.
 By keying in text, entering data into a computer, operating a variety of office machines, and
performing other clerical duties, these workers help organizations keep up with the rapid changes that
are characteristic of today’s “Information Age.”
 Although most data-entry activities are now outsourced, in the not-too-distant past, these activities
were performed in-house at an information processing facility (IPF).
 If this role is still used, key verification is one of the primary means of control.
 In addition to the job titles discussed—such as word processors, typists, and data entry keyers—data
entry and information processing workers are known by various other titles, including electronic data
processors, keypunch technicians, and transcribers.
 Bar codes, scanning, and web entry forms have also reduced the demand for these services.
rmmakaha@gmail.com
DATA ENTRY KEYERS
 Usually input lists of items, numbers, or other data into computers or
complete forms that appear on a computer screen.
 They also may manipulate existing data, edit current information, or
proofread new entries into a database for accuracy.
 Some examples of data sources include customers’ personal information,
medical records, and membership lists.
 Usually, this information is used internally by a company and may be
reformatted before other departments or customers utilize it.
rmmakaha@gmail.com
DATA CONTROL
 This section receives and distributes all incoming data for appropriate processing;
they set up batch reporting for all agencies and submit schedules for processing to
Computer Operations.
 After processing has occurred, they check and distribute reports to all customers.
 This area interacts with agency customers and other Information Technology areas
to resolve processing problems.
 This area maintains all tape media including updating the tape inventory system
and it also has responsibility for offsite tape storage.
 Updating the Information Technology web page using HTML and other software
tools is done by Data control.
 Data control is also responsible for all data preparation prior to centralized
processing.
 Assisting the paper peripheral area and reception area are also functions of this
section.
rmmakaha@gmail.com
COMPUTER OPERATOR
 A computer operator is the person who keeps the large computers running.
 This person’s job is to oversee the mainframe computers and data centers in
organizations.
 Responsible for the operation of all enterprise, operating systems and personal
computers that are utilized to service the customer base.
 This area receives all hardware service calls, assists in terminal and communication
equipment installation and software/hardware trouble diagnosis.
 Processing of all batch production work as well as all paper peripheral processing
are also functions of Computer Operators
 Some of their duties include keeping the operating systems up to date, ensuring
available memory and disk storage, and overseeing the physical environment of the
computer.
 Since mainframe computers increasingly have been replaced with servers, storage
management systems, and other platforms, computer operators’ jobs have grown
broader and include working with these specialized systems.
rmmakaha@gmail.com
COMPUTER LIBRARIAN
 Responsible for all types of media, including tapes, cartridges,
CDs, DVDs, and so on.
 Librarians must track, store, and recall media as needed.
 They also must document when the data was stored and retrieved,
and who accessed it.
 If data moves off-site, librarians track when it was sent and when
it arrived.
 They may also be asked to assist in an audit to verify what type of
media is still being held at a vendor's site.
rmmakaha@gmail.com
WEB DEVELOPER
 They’re the ones who are responsible for building websites and the infrastructures behind
them—
 Web developers may also be known as “web producers,” “multimedia architects,” and “internet
engineers”, making their titles as diverse as their work portfolios.
 They create web pages, web applications and web content,
 They also need proficiency in Web languages, like HTML and JavaScript.
Writing well designed, testable, efficient code by using best software development practices
 Write well designed, testable, efficient code by using best software development practices
 Create website layout/user interface by using standard HTML/CSS practices
 Integrate data from various back-end services and databases
 Gather and refine specifications and requirements based on technical needs
 Create and maintain software documentation
 Be responsible for maintaining, expanding, and scaling our site
 Stay plugged into emerging technologies/industry trends and apply them into operations and
activities
 Cooperate with web designers to match visual design intent
rmmakaha@gmail.com

More Related Content

What's hot

CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
RogerPrimo2
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
guest75acf2
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
Rohana K Amarakoon
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Eoin Woods
 
Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...
Mubashir Ali
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
It Technical Support
It Technical SupportIt Technical Support
It Technical Support
Elena Benson
 
User Support
User SupportUser Support
User Support
Irfan Haidar
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
SkyCentral
 
Data flow diagram(19th march)
Data flow diagram(19th march)Data flow diagram(19th march)
Data flow diagram(19th march)
Ravi Shekhar
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
School Management System
School Management SystemSchool Management System
School Management System
Zain Basit
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 

What's hot (20)

CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 
Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
It Technical Support
It Technical SupportIt Technical Support
It Technical Support
 
User Support
User SupportUser Support
User Support
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 
Data flow diagram(19th march)
Data flow diagram(19th march)Data flow diagram(19th march)
Data flow diagram(19th march)
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
School Management System
School Management SystemSchool Management System
School Management System
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 

Similar to Duties & Responsibilities of IT Department Staff

Class 6
Class 6Class 6
Class 6
er_udayveer
 
Suresh D
Suresh DSuresh D
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
Joseph Lynn
 
Michaela Panganiban resume
Michaela Panganiban resumeMichaela Panganiban resume
Michaela Panganiban resume
Michaela Panganiban
 
Ashley Budd Resume 01-15-16
Ashley Budd Resume 01-15-16Ashley Budd Resume 01-15-16
Ashley Budd Resume 01-15-16
Ashley Budd
 
Current Resume
Current ResumeCurrent Resume
Current Resume
Michael Myers
 
Rajesh Resume
Rajesh Resume Rajesh Resume
Rajesh Resume
rajesh iyer
 
Scott Speakman Resume
Scott Speakman ResumeScott Speakman Resume
Scott Speakman Resume
Scott Speakman
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
James Hall
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
James Hall
 
Shirley grimm resume1
Shirley grimm resume1Shirley grimm resume1
Shirley grimm resume1
grimmrunner362
 
Alex R Brown Resume
Alex R Brown ResumeAlex R Brown Resume
Alex R Brown Resume
Alex Brown
 
Resume
ResumeResume
Resume
Roger Forsch
 
2016
20162016
Resume
ResumeResume
Resume
sangeeth gdv
 
It proffesionals
It proffesionalsIt proffesionals
It proffesionals
ahsan riaz
 
Mutassem Shalab CV
Mutassem Shalab CVMutassem Shalab CV
Mutassem Shalab CV
paldosar
 
Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department members
effinsquirrel
 
Technical Support
Technical SupportTechnical Support
Technical Support
michael brown
 
What Ability Connecton Does
What Ability Connecton DoesWhat Ability Connecton Does
What Ability Connecton Does
cwg866
 

Similar to Duties & Responsibilities of IT Department Staff (20)

Class 6
Class 6Class 6
Class 6
 
Suresh D
Suresh DSuresh D
Suresh D
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
Michaela Panganiban resume
Michaela Panganiban resumeMichaela Panganiban resume
Michaela Panganiban resume
 
Ashley Budd Resume 01-15-16
Ashley Budd Resume 01-15-16Ashley Budd Resume 01-15-16
Ashley Budd Resume 01-15-16
 
Current Resume
Current ResumeCurrent Resume
Current Resume
 
Rajesh Resume
Rajesh Resume Rajesh Resume
Rajesh Resume
 
Scott Speakman Resume
Scott Speakman ResumeScott Speakman Resume
Scott Speakman Resume
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
 
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
Resume for James D.Hall (Jr Systems Admin-Senior Desktop Admin v3)
 
Shirley grimm resume1
Shirley grimm resume1Shirley grimm resume1
Shirley grimm resume1
 
Alex R Brown Resume
Alex R Brown ResumeAlex R Brown Resume
Alex R Brown Resume
 
Resume
ResumeResume
Resume
 
2016
20162016
2016
 
Resume
ResumeResume
Resume
 
It proffesionals
It proffesionalsIt proffesionals
It proffesionals
 
Mutassem Shalab CV
Mutassem Shalab CVMutassem Shalab CV
Mutassem Shalab CV
 
Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department members
 
Technical Support
Technical SupportTechnical Support
Technical Support
 
What Ability Connecton Does
What Ability Connecton DoesWhat Ability Connecton Does
What Ability Connecton Does
 

More from Makaha Rutendo

MYSQL Practical Tutorial.pdf
MYSQL Practical Tutorial.pdfMYSQL Practical Tutorial.pdf
MYSQL Practical Tutorial.pdf
Makaha Rutendo
 
Basic Communication Revision
Basic Communication RevisionBasic Communication Revision
Basic Communication Revision
Makaha Rutendo
 
Introduction To ICTs
Introduction To ICTsIntroduction To ICTs
Introduction To ICTs
Makaha Rutendo
 
Construction Law
Construction LawConstruction Law
Construction Law
Makaha Rutendo
 
Microsoft Office: Practice Questions
Microsoft Office: Practice Questions Microsoft Office: Practice Questions
Microsoft Office: Practice Questions
Makaha Rutendo
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
Makaha Rutendo
 
Communication Basics
Communication BasicsCommunication Basics
Communication Basics
Makaha Rutendo
 
COMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLSCOMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLS
Makaha Rutendo
 
PRINCIPLES OF LAW : LAW OF CONTRACT
PRINCIPLES OF LAW : LAW OF CONTRACTPRINCIPLES OF LAW : LAW OF CONTRACT
PRINCIPLES OF LAW : LAW OF CONTRACT
Makaha Rutendo
 
HUMAN RESOURCES MANAGEMENT
HUMAN RESOURCES MANAGEMENTHUMAN RESOURCES MANAGEMENT
HUMAN RESOURCES MANAGEMENT
Makaha Rutendo
 
INDUSTRIAL RELATIONS
INDUSTRIAL RELATIONSINDUSTRIAL RELATIONS
INDUSTRIAL RELATIONS
Makaha Rutendo
 
CORPORATE COMMUNICATION
CORPORATE COMMUNICATIONCORPORATE COMMUNICATION
CORPORATE COMMUNICATION
Makaha Rutendo
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
Makaha Rutendo
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
Makaha Rutendo
 
PUBLIC RELATIONS
PUBLIC RELATIONSPUBLIC RELATIONS
PUBLIC RELATIONS
Makaha Rutendo
 
C++ & VISUAL C++
C++ & VISUAL C++ C++ & VISUAL C++
C++ & VISUAL C++
Makaha Rutendo
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)
Makaha Rutendo
 
OPERATIONS RESEARCH
OPERATIONS RESEARCHOPERATIONS RESEARCH
OPERATIONS RESEARCH
Makaha Rutendo
 
Microsoft Office Package: Practical Questions
Microsoft Office Package: Practical QuestionsMicrosoft Office Package: Practical Questions
Microsoft Office Package: Practical Questions
Makaha Rutendo
 

More from Makaha Rutendo (19)

MYSQL Practical Tutorial.pdf
MYSQL Practical Tutorial.pdfMYSQL Practical Tutorial.pdf
MYSQL Practical Tutorial.pdf
 
Basic Communication Revision
Basic Communication RevisionBasic Communication Revision
Basic Communication Revision
 
Introduction To ICTs
Introduction To ICTsIntroduction To ICTs
Introduction To ICTs
 
Construction Law
Construction LawConstruction Law
Construction Law
 
Microsoft Office: Practice Questions
Microsoft Office: Practice Questions Microsoft Office: Practice Questions
Microsoft Office: Practice Questions
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Communication Basics
Communication BasicsCommunication Basics
Communication Basics
 
COMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLSCOMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLS
 
PRINCIPLES OF LAW : LAW OF CONTRACT
PRINCIPLES OF LAW : LAW OF CONTRACTPRINCIPLES OF LAW : LAW OF CONTRACT
PRINCIPLES OF LAW : LAW OF CONTRACT
 
HUMAN RESOURCES MANAGEMENT
HUMAN RESOURCES MANAGEMENTHUMAN RESOURCES MANAGEMENT
HUMAN RESOURCES MANAGEMENT
 
INDUSTRIAL RELATIONS
INDUSTRIAL RELATIONSINDUSTRIAL RELATIONS
INDUSTRIAL RELATIONS
 
CORPORATE COMMUNICATION
CORPORATE COMMUNICATIONCORPORATE COMMUNICATION
CORPORATE COMMUNICATION
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
 
PUBLIC RELATIONS
PUBLIC RELATIONSPUBLIC RELATIONS
PUBLIC RELATIONS
 
C++ & VISUAL C++
C++ & VISUAL C++ C++ & VISUAL C++
C++ & VISUAL C++
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)
 
OPERATIONS RESEARCH
OPERATIONS RESEARCHOPERATIONS RESEARCH
OPERATIONS RESEARCH
 
Microsoft Office Package: Practical Questions
Microsoft Office Package: Practical QuestionsMicrosoft Office Package: Practical Questions
Microsoft Office Package: Practical Questions
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 

Duties & Responsibilities of IT Department Staff

  • 1. rmmakaha@gmail.com DUTIES & RESPONSIBILITIES OF: COMPUTER PERSONNEL OR IT DEPARTMENT STAFF
  • 2. DATABASE ADMINISTRATOR (DBA)  This employee is responsible for the organization's data and maintains the data structure.  The database administrator has control over all the data; therefore, detective controls and supervision of duties must be observed closely.  This is usually a role filled by a senior information systems employee because these employees have control over the physical data definition, implementing data definition controls and defining and initiating backup and recovery.  undertake daily administration, including monitoring system performance, ensuring successful backups, and developing/implementing disaster recovery plans  manage data to give users the ability to access, relate and report information in different ways  develop standards to guide the use and acquisition of software and to protect valuable information  modify existing databases or instruct programmers and analysts on the required changes  test programs or databases, correct errors and make necessary modifications  train users and answer questions rmmakaha@gmail.com
  • 3. COMPUTER SUPPORT SPECIALISTS  Provide technical assistance, support, and advice to customers and other users.  This occupational group includes technical support specialists and help-desk technicians.  These troubleshooters interpret problems and provide technical support for hardware, software, and systems.  They answer telephone calls, analyze problems by using automated diagnostic programs, and resolve recurring difficulties.  Support specialists may work either within a company that uses computer systems or directly for a computer hardware or software vendor.  Increasingly, these specialists work for help-desk or support services firms, for which they provide computer support to clients on a contract basis. rmmakaha@gmail.com
  • 4. Technical support specialists  They Answer telephone calls from their organizations’ computer users and may run automatic diagnostics programs to resolve problems.  Working on monitors, keyboards, printers, and mice, they install, modify, clean, and repair computer hardware and software.  They also may write training manuals and train computer users in how to use new computer hardware and software.  In addition, technical support specialists oversee the daily performance of their company’s computer systems and evaluate software programs with regard to their usefulness. rmmakaha@gmail.com
  • 5. Help-desk technicians  Accepts problem calls from users and registers each call on a help desk database  Solves the problem for the user over the phone if possible. The assistance is usually limited to simple problem solving related to the operating system, software and basic peripheral devices  If the problem cannot be solved over the phone, the help desk mobilises the relevant it staff member, usually by email or in the help desk database, to assist the user.  Assist computer users with the inevitable hardware and software questions that are not addressed in a product’s instruction manual.  Help-desk technicians field telephone calls and e-mail messages from customers who are seeking guidance on technical problems.  In responding to these requests for guidance, help-desk technicians must listen carefully to the customer, ask questions to diagnose the nature of the problem, and then patiently walk the customer through the problem-solving steps.  Help-desk technicians deal directly with customer issues, and companies’ value them as a source of feedback on their products.  These technicians are consulted for information about what gives customers the most trouble, as well as other customer concerns.  Most computer support specialists start out at the help desk. rmmakaha@gmail.com
  • 6. Network support  Assist users in rectifying network-related problems such as security access, Internet access, network failure, printer failure  Assist the network administrator in managing user accounts, installing software on the network, backing up and retrieving files and maintaining network security  Maintain the help desk database by recording problem resolution on problem calls attended to. rmmakaha@gmail.com
  • 7. Software support  Monitor the state of custom software systems  Troubleshoot when the software fails to work properly  Keeping records of hardware and software purchased, including the purchase of consumable items  Ensuring equipment is well maintained and serviced where required. rmmakaha@gmail.com
  • 8. NETWORK ADMINISTRATORS / SYSTEMS ADMINISTRATORS Closely related jobs:  Network Technician,  Network Engineer,  Website Administrator,  Systems Administrator,  Telecommunications Engineer  Network administrators provide operational support for and management of computer networks to ensure they run efficiently. The IT networks can range from internet and private networks to large communications networks.  Design, install, and support an organization’s local-area network (LAN), wide-area network (WAN), network segment, Internet, or intranet system.  They provide day-to-day onsite administrative support for software users in a variety of work environments, including professional offices, small businesses, government, and large corporations.  They maintain network hardware and software, analyze problems, and monitor the network to ensure its availability to system users.  These employees are responsible for maintenance and configuration of network equipment, such as routers, switches, firewalls, wireless access points, and so on.  These workers gather data to identify customer needs and then use the information to identify, interpret, and evaluate system and network requirements. Administrators also may plan, coordinate, and implement network security measures. rmmakaha@gmail.com
  • 9.  install, configure and maintain PCs, networking equipment and network operating systems  monitor and configure networks to optimize performance and resolve faults  undertake recovery action in the event of a system failure  establish and control system access and security levels  provide training and support for system software  Implement and co-ordinate housekeeping procedures, including system back-ups, setting up user accounts, monitoring file access etc.  plan and implement maintenance and upgrades for system software and hardware  maintain peripheral devices connected to the printer such as printers and scanners CONTINUED………………. rmmakaha@gmail.com
  • 10. SYSTEMS ADMINISTRATORS  Are the information technology employees responsible for the efficient use of networks by organizations?  This employee is responsible for the operation and maintenance of the LAN and associated components such as mid-range or mainframe systems. Although small organizations might have only one systems administrator, larger organizations have many.  They ensure that the design of an organization’s computer site allows all of the components, including computers, the network, and software, to fit together and work properly.  Furthermore, they monitor and adjust the performance of existing networks and continually survey the current computer site to determine future network needs.  Administrators also troubleshoot problems reported by users and by automated network monitoring Systems and make recommendations for enhancements in the implementation of future servers and networks. rmmakaha@gmail.com
  • 11. SYSTEM ANALYST AND DESIGNERS Job Titles  Network Designer  Systems Analyst  Solutions Architect  Senior Systems Engineer  Senior Solutions Architect  Systems Architect  Principal Solutions Architect  Analyzing problems in software development and guiding the rectification of faults in programs  Analyzing software requirements and defining program parameters and specifications  Undertaking analysis of current software products and determining approaches which will improve their user interface, performance and integrity  Leading team members and third parties in client organizations in the integration of technological methodologies and components of projectsrmmakaha@gmail.com
  • 12.  Ensuring and being accountable for the technical integrity of the design in accordance with the client’s requirements  Ensuring that programs meet marketing/user requirements by testing and monitoring initial field use and problems  Guiding the preparation of software manuals and guides  Improving the interface between systems users, the operating system and applications software  Conducting user requirements analysis to match customer needs to company products and services  Assisting the sales force with pre-sales activity such as proposal preparation, systems demonstrations and presentations, particularly in relation to larger and more important clients.  These employees are involved in the system development lifecycle (SDLC) process. They are responsible for determining the needs of users and developing requirements and specifications for the design of needed software programs CONTINUED………………. rmmakaha@gmail.com
  • 13. COMPUTER SECURITY SPECIALISTS  May plan, coordinate, and implement the organization’s information security.  These workers may be called upon to educate users about computer security,  Install security software,  Monitor the network for security breaches,  Respond to cyber-attacks  Gather data and evidence to be used in prosecuting cybercrime.  The responsibilities of computer security specialists has increased in recent years as there has been a large increase in the number of cyber- attacks on data and networks.  This and other growing specialty occupations reflect an increasing emphasis on client-server applications, the expansion of Internet and intranet applications, and the demand for more end-user support.rmmakaha@gmail.com
  • 14. IT SECURITY  They’re in charge of keeping organizations safe from malicious digital attacks.  This includes implementing and running security software,  Scanning for abnormalities  Upgrading systems  Keeping their company informed of the risks involved in daily activities.  This job requires a lot of problem solving, crisis management, and effective communication between team members and higher-ups. rmmakaha@gmail.com
  • 15. COMPUTER PROGRAMMERS  Computer programmers write, test, and maintain the programs that computers follow when performing specific functions.  The main task of computer programmers is problem solving and development of systems solutions using the appropriate methodologies and techniques.  A programmer uses programming languages, such as C++, PHP, or Java to communicate with computer to perform a set of instructions.  In addition to writing new programs, computer programmers update and maintain existing programs.  They test programs to ensure efficiency, accuracy, and to identify programming errors  Write, test, and maintain the detailed instructions, called programs that computers must follow to perform their functions.  Programmers also conceive, design, and test logical structures for solving problems by computer.  Programmers write programs according to the specifications determined primarily by computer software engineers and systems analysts.  After the design process is complete, it is the job of the programmer to convert that design into rmmakaha@gmail.com
  • 16.  The programmer codes these instructions in a conventional programming language such as COBOL; an artificial intelligence language such as prolog; or one of the most advanced object-oriented languages, such as Java, C++, or actor. Different programming languages are used depending on the purpose of the program.  Work with field experts to create custom software  Analyze technical data, designs, and prototypes  Prepare and present reports on project specifications, activities, and status  Write computer software, programs, or code  Document reliability of technical specifications  Work with software providers to increase proficiencies while working within applications  Work cross-departmental on development and support  Prepare software documentation for end users CONTINUED………………. rmmakaha@gmail.com
  • 17. DATA PREPARATION STAFF  Are those people responsible for the translation of data into machine readable form? COMPUTER SCIENTISTS  Work as theorists, researchers, or inventors.  Their jobs are distinguished by the higher level of theoretical expertise and innovation they apply to complex problems and the creation or application of new technology.  Those employed by academic institutions work in areas ranging from complexity theory to hardware to programming-language design.  Some work on multidisciplinary projects, such as developing and advancing uses of virtual reality, extending human-computer interaction, or designing robots.  Their counterparts in private industry work in areas such as applying theory; developing specialized languages or information technologies; or designing programming tools, knowledge-based systems, or even computer games. rmmakaha@gmail.com
  • 18. DATA ENTRY AND INFORMATION PROCESSING WORKERS  Help ensure the smooth and efficient handling of information and entering all data.  By keying in text, entering data into a computer, operating a variety of office machines, and performing other clerical duties, these workers help organizations keep up with the rapid changes that are characteristic of today’s “Information Age.”  Although most data-entry activities are now outsourced, in the not-too-distant past, these activities were performed in-house at an information processing facility (IPF).  If this role is still used, key verification is one of the primary means of control.  In addition to the job titles discussed—such as word processors, typists, and data entry keyers—data entry and information processing workers are known by various other titles, including electronic data processors, keypunch technicians, and transcribers.  Bar codes, scanning, and web entry forms have also reduced the demand for these services. rmmakaha@gmail.com
  • 19. DATA ENTRY KEYERS  Usually input lists of items, numbers, or other data into computers or complete forms that appear on a computer screen.  They also may manipulate existing data, edit current information, or proofread new entries into a database for accuracy.  Some examples of data sources include customers’ personal information, medical records, and membership lists.  Usually, this information is used internally by a company and may be reformatted before other departments or customers utilize it. rmmakaha@gmail.com
  • 20. DATA CONTROL  This section receives and distributes all incoming data for appropriate processing; they set up batch reporting for all agencies and submit schedules for processing to Computer Operations.  After processing has occurred, they check and distribute reports to all customers.  This area interacts with agency customers and other Information Technology areas to resolve processing problems.  This area maintains all tape media including updating the tape inventory system and it also has responsibility for offsite tape storage.  Updating the Information Technology web page using HTML and other software tools is done by Data control.  Data control is also responsible for all data preparation prior to centralized processing.  Assisting the paper peripheral area and reception area are also functions of this section. rmmakaha@gmail.com
  • 21. COMPUTER OPERATOR  A computer operator is the person who keeps the large computers running.  This person’s job is to oversee the mainframe computers and data centers in organizations.  Responsible for the operation of all enterprise, operating systems and personal computers that are utilized to service the customer base.  This area receives all hardware service calls, assists in terminal and communication equipment installation and software/hardware trouble diagnosis.  Processing of all batch production work as well as all paper peripheral processing are also functions of Computer Operators  Some of their duties include keeping the operating systems up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer.  Since mainframe computers increasingly have been replaced with servers, storage management systems, and other platforms, computer operators’ jobs have grown broader and include working with these specialized systems. rmmakaha@gmail.com
  • 22. COMPUTER LIBRARIAN  Responsible for all types of media, including tapes, cartridges, CDs, DVDs, and so on.  Librarians must track, store, and recall media as needed.  They also must document when the data was stored and retrieved, and who accessed it.  If data moves off-site, librarians track when it was sent and when it arrived.  They may also be asked to assist in an audit to verify what type of media is still being held at a vendor's site. rmmakaha@gmail.com
  • 23. WEB DEVELOPER  They’re the ones who are responsible for building websites and the infrastructures behind them—  Web developers may also be known as “web producers,” “multimedia architects,” and “internet engineers”, making their titles as diverse as their work portfolios.  They create web pages, web applications and web content,  They also need proficiency in Web languages, like HTML and JavaScript. Writing well designed, testable, efficient code by using best software development practices  Write well designed, testable, efficient code by using best software development practices  Create website layout/user interface by using standard HTML/CSS practices  Integrate data from various back-end services and databases  Gather and refine specifications and requirements based on technical needs  Create and maintain software documentation  Be responsible for maintaining, expanding, and scaling our site  Stay plugged into emerging technologies/industry trends and apply them into operations and activities  Cooperate with web designers to match visual design intent rmmakaha@gmail.com