Introduction
An IT system that is functional requires a collection of several technologies working together to achieve the intended purposed. Whenever one technology fails, the whole system becomes vulnerable to failure and breakdown. The most crucial technologies, commonly referred to as core technologies, include a computer programmer, a computer systems administrator, database administrator, information security analyst, and lastly, a web system administrator (Hill &Fox-Brewster, 2014) . Efficient working of these core technologies ensures that the system successfully achieves its purpose. This paper seeks to explain the roles of an IT system technologies specialists that includes a Computer Programmer, Computer Systems Administrator, Database Administrator, Information Security Analyst and Web Systems Administrator.
Computer Programmer
A computer program is a collection of executable instructions that perform a specified task. A computer programmer is the person who uses programming languages in writing computer programs. A computer programmer has a primary duty of developing computer programs that are related to games, personal use of computers, and business concepts. Another duty of a computer programmer is to monitor programs to ensure that they are working properly and make adjustments where necessary. Programmers are also included in maintaining databases to ensure they have enough storage space to accommodate big data and increasing data as the company grows (Pardy & Andrews, 2010). Computer programmers can also be responsible for preparing tables, analytical data, and graphs that indicate the progress of a computer program.
Delegate your assignment to our experts and they will do the rest.
C omputer Systems Administrator
System administrating involves operational functions and updating computer systems and computer networks. A computer systems administrator is responsible for installing, maintaining, and supporting the technology systems of an organization (Sommestad & Hunstad, 2013). System administrators work on network segments, local area networks, wide area networks, and internet systems. They are also responsible for testing system components and ensuring that software, network equipment, and computers function together. Constant monitoring of the system and the network to ensure they are running smoothly is also done by the systems administrator. There are some specialists in this sector who focus on roles that include IT audit, research on system upgrade, and network security. Many companies usually put systems administrators in charge of the WAN, internet systems, WAN, and LAN of the company (Sommestad & Hunstad, 2013).
Database Administrator
Databases are software programs that store data in tables that are highly organized and provide tools that manipulate the data efficiently to obtain desired information. The primary job of a database administrator (DBA) is to ensure availability of data that is protected from corruption and loss and is easily accessible. To achieve this objective, a DBA collaborates in the process of installing and configuring a new database. The system administrator is responsible for setting up the hardware and deploying the operating system for the server of the database, then the DBA installs and configures the database software (Laudon & Laudon, 2016). In case a new database server is required, transferring data from the existing server is done by the DBA. The DBA also ensures that large data volumes from multiple systems is efficiently imported into a data warehouse environment. Nowadays databases might have unstructured data types, like sound and video files and images. Managing specialized data is done by the DBA. Other functions of the DBA include creating backup and recovery plans based on specified policies, they know the potential weaknesses of the database and the company as a whole and work with other technologies to minimize the risks, and set up authentication procedures to control the people who have access to the database. The DBA is always aware of the size of the database and how fast it is growing to make future predictions on storage space that is needed and concurrency algorithms required. Monitoring performance, system tuning, and troubleshooting are also functions of the DBA (Laudon & Laudon, 2016).
Information Security Analyst
All sensitive information in the IT system of an organization is protected by the information security analyst. With the increased number of cyber attacks, it is crucial to keep sensitive information secured. Information security analysts assist in creating, implementing, and ensuring the company complies with policies that protect data from being accessed inappropriately. The three major areas of focus by information security analysts include vulnerability assessment, risk assessment, and defense planning (Caione, et. al ., 2016). Vulnerability assessment involves determining the weaknesses of the company. Risk assessment involves finding out problems that the organization faces. Lastly, defense planning includes all protection installations, such as data encryption programs and firewalls. Through improving the efficiency of the network and the server and the security of an organization’s computer data, information security analysts promote the company’s security awareness. They provide documentation for emergency and security policies and procedures and tests. Moreover, information security analysts are usually updated on reports of computer viruses, decide whether updated protection is required, and share the information with customers or the company. Subsequently, they train all other employees on the security and safeguarding information of the company (Caione, et. al ., 2016).
Web System Administrator
A web information system is the part of an IT system that uses internet web technologies to deliver services and information to its users. A web system administrator has the responsibility of maintaining the web environment by first identifying the web system requirements, installing upgrades, and monitoring the performance of the system (Shelby & Ukkola, 2017) . There are several roles of this technology personnel. A web administrator establishes specifications of the web system through analyzing information, security, and access requirements to design the system infrastructure. Secondly, the administrator plans the execution of the selection, configuration, testing, and installation of server software and hardware. Also, he executes management and operating systems through defining operational procedures and policies of system. Subsequently, a web system administrator maintains the performance of the system by monitoring and analyzing the system and performance tuning. Securing the web system through creating and testing disaster recovery procedures and policies. Securing the system also involves developing backup and maintaining documentation. By upgrading the system after some time the web administrator ensures that it is up to date, which involves installation of new software and enhancements. The financial requirements of the IT system are also met by this technology through submitting budget information and monitoring expenses. Lastly, the web administrator tracks emerging technologies in the internet to update job knowledge and accomplish the goals of the organization by exploring new opportunities and add value to accomplishments of the job (Shelby & Ukkola, 2017) .
References
Caione, A., Guido, A., Martella, A., Paiano, R., & Pandurino, A. (2016). Knowledge base support for dynamic information system management. Information Systems & E-Business Management , 14(3), 533-576. doi:10.1007/s10257-015-0294-3
Hill, K., & Fox-Brewster, T. (2014). Cashing in on the Spy Game. Forbes , 194(4), 44-47.
Laudon, K. C., & Laudon, J. P. (2016). Management information system . Pearson Education India.
Shelby, Z., & Ukkola, S. (2017). U.S. Patent No. 9,614,877 . Washington, DC: U.S. Patent and Trademark Office.
Pardy, W. G., & Andrews, T. (2010). Integrated Management Systems: Leading Strategies and Solutions . Lanham: Government Institutes.
Sommestad, T., & Hunstad, A. (2013). Intrusion detection and the role of the system administrator. Information Management & Computer Security , 21(1), 30-40. doi:10.1108/09685221311314400