1. Since the times of the Information Age, information technology (IT) has continued to act as a backbone for all aspects of the human race. IT is used by individuals to perform their daily activities. Businesses, organizations, schools and governments also use IT to enable processes, achieve goals, automate processes, and serve customers- internal and external. Information technology encompasses a wide range of fields- programming, database, networking, and web design- and can be primarily divided into hardware and software. Companies have continued to perceive the usefulness of IT as they increase their focus and spending on IT. As a tool, IT is tweaked to align with several business processes to provide solutions well crafted to meet specific objectives and provide a competitive and sustainable advantage. IT is used to communicate, share data, offer services, reduce cost and advertise products. Companies incessantly develop frameworks that exploit information technology to produce businesses strategies and value. One of the halves of IT is software which can be computer programs, operating systems, websites, games, middleware and malwares. Operating system which includes Microsoft windows, Mac OS Solaris and Linux vary by the functions to be performed. A software can be open-source, custom or commercial off-the-shelf (COT). Hardware, the other half of IT, includes computers, routers, networking devices, printers, servers, scanners, removable storage devices and telephones. These devices serve as node for users as they apply information technology. The internet, which is amongst of the progeny of IT and perceived as one of the greatest achievements of humanity, has become an enormous tool that serves as a platform for the world to communicate. This platform with embedded hardware and software helps to send and receive information, file transfer and file sharing, store data and perform business transactions. The internet which is termed as the network of networks is used by individuals for their daily needs and companies to achieve organizational objectives. This medium uses the TCP/IP and other protocols as its underlying infrastructure to enable telephone calls, emails, transfer of data, financial transactions, instant messaging and video conferencing. Information technology can be used in crisis and logistics management. During a disaster, large calculations can be made to perform data triage to envisage the effect. Real-time data from GPS providers, EMS agencies, and satellites are evaluated and mashups are formed to support decision making. In schools, information technology is used in classes for presentations. With the use of Web 2.0 tools, students and lecturers can share information, students can submit assignments and class works, online forums and discussion can be conducted, videos can be shared and group assignments can be conducted. For an e-learning environment an interactive and dynamic web 2.0 tool can be used, this provides the online community with tools for uploading videos, instant messaging services, online chatting and knowledge management in one platform. In the financial industry, from the writing of algorithms to the creation of the software, IT is used for automated and online brokerage services, forecasting, and real-time banking. Also, Enterprise resource planning (ERP) are used in organizations to share information, manage processes and resources, utilize a common database and perform numerous business functions. This tool is continuously aligned to the needs of its users. Information Technology can also be used to implement a statewide/countrywide EMS Communications System that will provide a means to make the entire emergency medical services and trauma systems operate more efficiently. This system utilizes real-time communication between health facilities aids in monitoring hospitals, nursing homes, and ambulance resources during times of accidents. With the increase in network security, individuals and companies tend to perform more sensitive transactions. Network security, another subset of information technology, comprises of all activities that organizations, enterprises, and institutions takes to protect computers assets, data and instill integrity and continuity of operations. The wireless side of IT is used in companies to provide employees access to the office network to get the latest information, schedule meetings and contact their colleagues. With a virtual private network (VPN), typically on a public network such as the internet, companies can enable remote users have secured access to their intended network. With wireless internet access users of laptops, PDAs, and smart phones can connect to the internet easily. USB devices and portable storage devices are other innovations that provide users the ability to store, share, move, and transfer data- documents, video, audio and pictures. These devices which come in different shapes and sizes work more efficiently when they are safeguarded adequately. Files on storage devices can be encrypted before they are stored and transferred. For individuals, all ages from young to old have accepted information technology and its usefulness. IT is used while using mobile phones, communicating with friends via the internet, to view video and listen to audio. In addition, social media is now used by virtually everyone that uses a computer. In sum, information technology will continue to evolve, so the onus is on us to constantly equip ourselves with the latest technology and knowledge.