Friday, October 23, 2009

WEEK 11 QUESTIONS

SECTION 9.1
1. Describe the decision-making process proposed by Simon.
The decision-making process begins with the 'intelligence phase', which focusses on organisational objectives, data collection, problem identification etc. The manager then moves onto the 'design phase', which sets criteria for choice, searches for alternatives etc. Managers then proceed to the 'choice phase', which is a solution to the model, selection of the best alternative and a plan for implementation of a solution.
http://www.youtube.com/watch?v=Q3YMb4w-FvU

2. Why do managers need IT support?
Managers need IT support for four main reasons:
- The number of alternatives to be considered are increasing, so they need to be able to compare and explore all alternatives.
- Decisions must be made under time pressure. It is not possible to process all the relevant information manually.
- There is increased uncertainty in the decision environment, so the IT is able to conduct a sophisticated analysis in order to make a good decision.
- It is often necessary to access remote information rapidly, consult experts or conduct group decision-making sessions, all without incurring large expenses. As decision makers can all be in different locations, IT is able to bring them all together quickly.

3. Describe the decision matrix.
The decision matrix is a combination of nine cells, which consists of the three classes of problem structure and the three broad categories of the nature of decisions.

SECTION 9.2
1. Describe the capabilities of data mining.
Data mining can perform 2 basic capabilities. It can predict trends and behaviours and identify previously unknown patterns. Data mining addresses why it is happening and provides predictions of what will happen in the future

SECTION 9.3
1. What are some of the capabilities of digital dashboards?
Some of the capabilities of digital dashboards include:
- Drill down: ability to go to details, at several levels
- Status access: the latest data available on KPI or some other metric, ideally in real time
- Ad hoc analysis: analyses made any time, upon demands and with any desired factors and relationships
- Exception reporting: reports that highlight deviations larger than certain thresholds. Reports may include only deviations.

Tuesday, October 13, 2009

WEEK 10 QUESTIONS

Section 8.1

1. What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.

A transaction is any business event that generates data worthy of being captured and stored in a database. The role of Transactional Processing systems is to monitor, collect, store, and process data generated from all business transactions. The key objective of TP/TPSs is to handle high volume and large variations in volume (for example, during peak times) efficiently, avoid errors and downtime, record results accurately and securely, and maintain privacy and security.



Section 8.2

1. What is a functional area information system? List its major characteristics.

Functional area information systems provide information mainly to lower and middle level managers in the functional areas. They use this information to help them plan, organise and control operations

2. How does an FAIS support management by exception? How does it support on-demand reports?
FAIS support management by exception reports by collecting and analysing all data that is required for the report. For example in a sales example, management would establish sales quotas, the the company would implement FAIS that collects and analyses all sales data.
FAIS support ad hoc (on demand) reports by providing drill-down reports, which show a greater level of detail; key indicator reports, which summarise the performance of critical activities; and comparative reports, which compare ther performances of different business units or time periods.


Section 8.3

1. Define ERP and describe its functionalities.
Enterprise resource planning systems integrate the planning, management, and the use of all of an organisation's resources. The major functionalities of ERP systems are to tightly integrate the functional areas of the organisation and to enable information to flow seamlessly across the functional areas

2. List some drawbacks of ERP software.
Drawbacks of ERP software include that it can be extremely complex, expensive, and time consuming to implement. Also, companies may need to change existing business processes to fit the predefined business processes of the software.


Section 8.5

1. Define a supply chain and supply chain management (SCM).
A supply chain refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customers. It includes the organisations and processes that create and deliver products, information and services to end customers.
Supply chain management is to plan, organise, and optimise the supply chain's activities. The goal of SCM systems is to reduce friction along the supply chain.

2. List the major components of supply chains.
Supply chains have 3 segments:
-Upstream: where sourcing or procurement from external suppliers occurs
-Internal: where packaging, assembly, or manufacturing takes place
-Downstream: where distribution takes place, frequently by external distributors

3. What is the bullwhip effect?
The bullwhip effect refers to erratic shifts in orders up and down the supply chain. Basically, customer demand variables can become magnified when they are viewed through the eyes of managers at each link in the supply chain. If each distinct entity that makes ordering and inventory decisions places its own interests above those of the chain, then stockpiling can occur at as many as seven or eight locations among the supply chain.


Section 8.6

1. Define EDI and list its major benefits and limitations
EDI is a communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically. EDI formats these documents according to agreed-upon standards and then transmits messages using a converter, called a translator.
Benefits of EDI's include that it minimises data entry errors because each entry is checked by the computer. In addition, the length of the messages can be shorter, and the messages are secured. EDI also reduces cycle time, increases productivity, enhances customer service, and minimises paper usage and storage.
Limitations include it involves a significant initial investment. Also, ongoing operation costs are high, due to the use of expensive, private VAN's. Another limitation is that the traditional EDI system is inflexible. Furthermore, business processes must sometimes be restructured to fit EDI requirements.

Tuesday, October 6, 2009

WEEK 9 QUESTIONS

1. What are some of the difficulties in managing data?
Difficulties in managiing data include:
- the amount of data increases exponentially with time
- data is often scattered throughout the organisation and is handled by many individuals
- data comes from many different sources (internal, personal and external), therefore it is hard to keep a track of the data
- data decays over time

2. What are the various sources for data?
There are 3 main sources of data. These are internal sources (corporate databases), personal sources (personal thoughts, opinions and experiences) and external sources (commercial databases, government reports etc)

3. What is a primary key and a secondary key?
A primary key is the identifier field or attribute that uniquely identifies a record. A secondary key is an identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy

4. What is an entity and a relationship?
An entity is a person, place, thing, or event about which information is maintained in a record. There are 3 types of relationships:
- one to one: a single-entity instance of one type is related to a single-entity instance of another type
- one-to-many: for example, a professor can have many courses, but each course can only have one professor
- many-to-many: for example, a student can have many courses, and a course can have many students

5. What are the advantages and disadvantages of relational databases?
An advantage of relational databases is that it is usually designed with a number of related tables, which means there is not too much data redundancy. It also allows for flexibility in the variety of queries they can make.
A disadvantage is because large-scale databses can be composed of many interrelated tables, the overall design can be complex and therefore hace slow search and access times

6. What is knowledge management?
Knowledge Management is a process that helps organisations identify, select, organise, disseminate, transfer, and apply information and expertise that are part of the organisation's memory and that typically reside within the organisation in an instructured manner

7. What is the difference between tacit knowledge and explicit knowledge?
Explicit knowledge is the more objective, rational and technical types of knowledge. Tacit knowledge is the cumulative store of subjective or experiential learning; highly personal and hard to formalise knowledge

Friday, September 18, 2009

WEEK 8 QUESTIONS

1. Identify common wireless devices and their application to business


Common wireless devices are the blackberry; the Treo 750; the Motorola; Apple iPhone. These wireless devices are important to business because they can make productive use of time that was formerly wasted; people can take these devices with them wherever they go, resulting in 24/7 access. Also, these wireless devices allow businesses and business people to allocate their working time around personal and professional obligations.





2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.


The main types of wireless transmission media/technologies are microwave, satellite, infared and radio waves.


-Microwaves: widely used for high-volume, long-distance, line of sight communication


-Satellite: satellites, like microwave transmission, receive and transmit data via line of sight. However, satellites leave an enormous footprint


-Radio: uses radio-wave frequencies to send data directly between transmitters and receivers


-Infared: infared light is red light that is not commonly visible to human eyes. Common applications of infared light are in remote control units for televisions, VCRs, DVDs etc. Infared transceivers are used for short distance connections between computers and peripheral equipment and local area networks.





3. What is bluetooth/how is it used?


Bluetooth is an industry specification used to create small personal area networks. It is used for communication among computer devices close to one person. Bluetooth can link up to eight devices within a 10 metre area using low-power, radio based communication. It can transmit up to 2.3 Mbps.





4. What are WLAN's, Wi-Fi, WWAN's, 3G?


Wi-Fi is a wireless protocol used in medium range wireless LAN’s, called a WLAN.
It enables 1.Easy Access to the Web; 2.Enables Access to ‘live’ information; 3.Remove Cabling & Wiring; 4.Reduce the requirements for hubs/switches. 3G uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128Kbps when moving in a car, and up to 2 Mbps when the device is in a fixed location.





5. What are the drivers of mobile computing and mobile commerce
The drivers for Mobile Computing and Mobile Commerce include widespread availability of mobile devices; no need for a PC; the "cell phone" culture; declining prices and bandwidth improvement







6. Explain the nature of RFID


RFID is the term for technologies that use radio waves to automatically identify the location of individual items equipped with tags that contain embedded microchips.
http://www.ibiblio.org/Dave/Dr-Fun/df200601/df20060116.jpg

Wednesday, September 16, 2009

WEEK 7 QUESTIONS

CHAPTER 5:

1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.

There are many underlying technologies and applications that comprise Web 2.0. Some of these include AJAX; Tagging; Blogs and blogging; Wikis; Podcasts and videocasts. There are also many types of websited that comprise Web 2.0. Some of these websites inclyde Social Networking sites such as 'facebook'; Aggregators, which provide collections of content from the web; and Mashups, which takes content from a number of websites and mixes them together to create a new kind of content
http://hinchcliffe.org/img/web2tree.jpg

2. Describe the function of Web services.


Web services are applications, delivered over the internet, that users can select and combine through almost any device. By using a set of shared protocols and standards, these applications provide the function of permitting different systems to 'talk' with one another, without requiring human beings to translate the conversations.


3. Describe how you see Social Networking being used in Business.


I see social networking as a major issue for businesses. With increasing numbers of social networking sites, and increasing numbers of people joining these sites, it is almost impossible not to let these interfere with your everyday work. With people uploading information constantly, or even just constantly 'checking out' these sites, it means that they are taking time away from their work, whilst at work. Rather than promoting the business on these social networking sites, people are just socialising and not concentrating on the more important task at hand. For these reasons, many businesses have blocked these sites so that the workers will not get distracted by them, which I see as a good move.


CHAPTER 6

Section 6.1:

1. Define e-commerce and distinguish it from e-business.

E-Commerce describes the process of buying, selling, transferring or exchanging products, services or information via computer netoworks, including the internet. On the other hand, E-Business is a somewhat broader concept. As well as the functions of E-Commerce, it also refers to servicing customers, collaborating with business partners and performing electronic transactions within an organisation


2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

-B2C: the sellers are organisations, and the buyers are individuals

-B2B: both the sellers and buyers are business organisations

-C2C: an individual sells products or services to other individuals

-B2E: businesses use B2E internally to provide information and services to its employees


3. List some benefits and limitations of e-commerce.

Some benefits of E-Commerce for organisations include it makes national and international markets more accessible and lowers the cost of processing, retreiving and distributing information. Customers benefit by being able to access a vast number of products and services around the clock. The major benefit to society is the ability to easily and conveniently deliver information and services to people in cities, rural areas and developing countries.

Limitations include the lack of universally accepted security standards, insufficient telecommunications bandwidth and expensive accessibility. It is also non-secure and there are unresolved legal issues and at times, lacks a critical mass of sellers and buyers.


Section 6.2:

1. What are spamming, permission marketing and viral marketing?

These are all forms of advertising methods over the internet. Spamming is the indiscriminate distribution of electronic ads without the permission of the receiver. Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Viral marketing refers to online "word of mouth" marketing


Section 6.4:

1. What are micropayments?

Micropayments are small payments of a few dollars or less


2. What is Multichanneling?

Multichanneling is a process through which a company integrates its online and offline channels


Section 6.5:


1. List some ethical issues in EC.

Ethical issues in E-Commerce include how should the company handle the layoffs?; should companies be required to retrain employees for new positions?; should the company compensate or otherwise assist the displaced workers?


2. List the major legal issues of EC.

The major legal issues of EC include fraud; domain names; cybersquatting; taxes and other fees and copyright

Sunday, September 13, 2009

WEEK 6 QUESTIONS

1. Describe the basic telecommunications system?


A telecommunications system consists of hardware and software that transmit information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals, analog and digital. The main components of a telecommunications system includes devices, communications processors and communication channels and media.
http://www.nrc.gov/reading-rm/doc-collections/gen-comm/reg-issues/2000/ri00011/fig05.gif







2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)


The two main wired communications channels are ethernet and fibre optic channels. Ethernet is a local area network protocol. Many companies use ethernet, usually gigabit, which means the network provides data transmission speeds of 1 billion bits per second. Fibre Optic Cables also transmit information, however the information is transmitted via light pulses generated by lasers.






3. What are the main business reasons for using networks?


Businesses use networks for many reasons. Some of these reasons include networked computer systems enable organisations to be more flexible so that they can adapt to rapidly changing business conditions; networks enable companies to share hardware, computer applications and data across the organisation and among organisations; networks make it possible for geographically dispersed employees and workgroups to share documents, ideas and creative insights.






4. What is the difference between LANs and WANs?


A Local Area Network (LAN) connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device. On the other hand, Wide Area Networks (WANs) are networks that cover large geographic areas and typically connect multiple LANs. They are generally provided by common carriers such as telephone companies and the international networks of global communications service providers






5. What is a network protocol?


The network protocol is the set of rules and procedures governing transmission across a network






6. Describe TCP/IP protocol.


TCP/IP protocol is a file transfer protocol that can send large files of information across sometimes unreliable networks with the assurance that the data will arrive uncorrupted

Sunday, September 6, 2009

WEEK 5 QUESTIONS

1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.

Privacy Issues: what information about oneself should an individual be required to reveal to others?

Accuracy Issues: who is responsible for the authenticity, fidelity, and accuracy of the information collected?

Property Issues: Who owns the information?

Accessibility: Who is allowed to access information?



2. What are the 4 general types of IT threats? Provide an example for each one



There are 5 general types of IT threats. These threats include:



-Unintentional Acts- human error



-Natural Disaster- floods, earthquakes etc resulting in loss of system and data



-Technical Failures- problems with hardware and software



-Management Failures- lack of funding for information security efforts and a lack of interest in those efforts



Deliberate Acts- espionage, information extortion, identity thefts etc.








3. Describe/discuss three types of software attack and a problem that may result from them



Three types of software attacks include:



-Virus- performs malicious actions by attaching to another computer program



-Back Door- allows the hacker to access a computer system at will, without having to go through any security procedures



-Zero Day Attack- allows the perpetrator to attack the vulnerability of a software product before the software vendor can prepare a patch for the vulnerability








4. Describe the four major types of security controls in relation to protecting information systems.



The four major types of security controls in relation to protecting information systems are:



-Communication Controls- secure the movement of data across networks.



-Application Controls- security counter-measures that protect specific applications. The three major categories of these controls are input, processing and output controls



-Physical Controls- prevent unauthorised individuals form gaining access to a company's facilities



-Access Controls- restrict unauthorised individuals from using information resources








5. Name one recent software threat and briefly discuss it's effects and resolutions?
One type of software threat is a computer virus. This is where segment of computer code that performs malicious actions by attaching to another computer program. In order to stop viruses, people can use anit-malware systems. This is a software package that attempts to identify and emilinate viruses, worms and other malicious software. There are hundreds of these packages available, for example Norton Anti Virus, McAfee Virusscan and Trend Micro PC-cillin