Friday, October 23, 2009

WEEK 11 QUESTIONS

SECTION 9.1
1. Describe the decision-making process proposed by Simon.
The decision-making process begins with the 'intelligence phase', which focusses on organisational objectives, data collection, problem identification etc. The manager then moves onto the 'design phase', which sets criteria for choice, searches for alternatives etc. Managers then proceed to the 'choice phase', which is a solution to the model, selection of the best alternative and a plan for implementation of a solution.
http://www.youtube.com/watch?v=Q3YMb4w-FvU

2. Why do managers need IT support?
Managers need IT support for four main reasons:
- The number of alternatives to be considered are increasing, so they need to be able to compare and explore all alternatives.
- Decisions must be made under time pressure. It is not possible to process all the relevant information manually.
- There is increased uncertainty in the decision environment, so the IT is able to conduct a sophisticated analysis in order to make a good decision.
- It is often necessary to access remote information rapidly, consult experts or conduct group decision-making sessions, all without incurring large expenses. As decision makers can all be in different locations, IT is able to bring them all together quickly.

3. Describe the decision matrix.
The decision matrix is a combination of nine cells, which consists of the three classes of problem structure and the three broad categories of the nature of decisions.

SECTION 9.2
1. Describe the capabilities of data mining.
Data mining can perform 2 basic capabilities. It can predict trends and behaviours and identify previously unknown patterns. Data mining addresses why it is happening and provides predictions of what will happen in the future

SECTION 9.3
1. What are some of the capabilities of digital dashboards?
Some of the capabilities of digital dashboards include:
- Drill down: ability to go to details, at several levels
- Status access: the latest data available on KPI or some other metric, ideally in real time
- Ad hoc analysis: analyses made any time, upon demands and with any desired factors and relationships
- Exception reporting: reports that highlight deviations larger than certain thresholds. Reports may include only deviations.

Tuesday, October 13, 2009

WEEK 10 QUESTIONS

Section 8.1

1. What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.

A transaction is any business event that generates data worthy of being captured and stored in a database. The role of Transactional Processing systems is to monitor, collect, store, and process data generated from all business transactions. The key objective of TP/TPSs is to handle high volume and large variations in volume (for example, during peak times) efficiently, avoid errors and downtime, record results accurately and securely, and maintain privacy and security.



Section 8.2

1. What is a functional area information system? List its major characteristics.

Functional area information systems provide information mainly to lower and middle level managers in the functional areas. They use this information to help them plan, organise and control operations

2. How does an FAIS support management by exception? How does it support on-demand reports?
FAIS support management by exception reports by collecting and analysing all data that is required for the report. For example in a sales example, management would establish sales quotas, the the company would implement FAIS that collects and analyses all sales data.
FAIS support ad hoc (on demand) reports by providing drill-down reports, which show a greater level of detail; key indicator reports, which summarise the performance of critical activities; and comparative reports, which compare ther performances of different business units or time periods.


Section 8.3

1. Define ERP and describe its functionalities.
Enterprise resource planning systems integrate the planning, management, and the use of all of an organisation's resources. The major functionalities of ERP systems are to tightly integrate the functional areas of the organisation and to enable information to flow seamlessly across the functional areas

2. List some drawbacks of ERP software.
Drawbacks of ERP software include that it can be extremely complex, expensive, and time consuming to implement. Also, companies may need to change existing business processes to fit the predefined business processes of the software.


Section 8.5

1. Define a supply chain and supply chain management (SCM).
A supply chain refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customers. It includes the organisations and processes that create and deliver products, information and services to end customers.
Supply chain management is to plan, organise, and optimise the supply chain's activities. The goal of SCM systems is to reduce friction along the supply chain.

2. List the major components of supply chains.
Supply chains have 3 segments:
-Upstream: where sourcing or procurement from external suppliers occurs
-Internal: where packaging, assembly, or manufacturing takes place
-Downstream: where distribution takes place, frequently by external distributors

3. What is the bullwhip effect?
The bullwhip effect refers to erratic shifts in orders up and down the supply chain. Basically, customer demand variables can become magnified when they are viewed through the eyes of managers at each link in the supply chain. If each distinct entity that makes ordering and inventory decisions places its own interests above those of the chain, then stockpiling can occur at as many as seven or eight locations among the supply chain.


Section 8.6

1. Define EDI and list its major benefits and limitations
EDI is a communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically. EDI formats these documents according to agreed-upon standards and then transmits messages using a converter, called a translator.
Benefits of EDI's include that it minimises data entry errors because each entry is checked by the computer. In addition, the length of the messages can be shorter, and the messages are secured. EDI also reduces cycle time, increases productivity, enhances customer service, and minimises paper usage and storage.
Limitations include it involves a significant initial investment. Also, ongoing operation costs are high, due to the use of expensive, private VAN's. Another limitation is that the traditional EDI system is inflexible. Furthermore, business processes must sometimes be restructured to fit EDI requirements.

Tuesday, October 6, 2009

WEEK 9 QUESTIONS

1. What are some of the difficulties in managing data?
Difficulties in managiing data include:
- the amount of data increases exponentially with time
- data is often scattered throughout the organisation and is handled by many individuals
- data comes from many different sources (internal, personal and external), therefore it is hard to keep a track of the data
- data decays over time

2. What are the various sources for data?
There are 3 main sources of data. These are internal sources (corporate databases), personal sources (personal thoughts, opinions and experiences) and external sources (commercial databases, government reports etc)

3. What is a primary key and a secondary key?
A primary key is the identifier field or attribute that uniquely identifies a record. A secondary key is an identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy

4. What is an entity and a relationship?
An entity is a person, place, thing, or event about which information is maintained in a record. There are 3 types of relationships:
- one to one: a single-entity instance of one type is related to a single-entity instance of another type
- one-to-many: for example, a professor can have many courses, but each course can only have one professor
- many-to-many: for example, a student can have many courses, and a course can have many students

5. What are the advantages and disadvantages of relational databases?
An advantage of relational databases is that it is usually designed with a number of related tables, which means there is not too much data redundancy. It also allows for flexibility in the variety of queries they can make.
A disadvantage is because large-scale databses can be composed of many interrelated tables, the overall design can be complex and therefore hace slow search and access times

6. What is knowledge management?
Knowledge Management is a process that helps organisations identify, select, organise, disseminate, transfer, and apply information and expertise that are part of the organisation's memory and that typically reside within the organisation in an instructured manner

7. What is the difference between tacit knowledge and explicit knowledge?
Explicit knowledge is the more objective, rational and technical types of knowledge. Tacit knowledge is the cumulative store of subjective or experiential learning; highly personal and hard to formalise knowledge

Friday, September 18, 2009

WEEK 8 QUESTIONS

1. Identify common wireless devices and their application to business


Common wireless devices are the blackberry; the Treo 750; the Motorola; Apple iPhone. These wireless devices are important to business because they can make productive use of time that was formerly wasted; people can take these devices with them wherever they go, resulting in 24/7 access. Also, these wireless devices allow businesses and business people to allocate their working time around personal and professional obligations.





2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.


The main types of wireless transmission media/technologies are microwave, satellite, infared and radio waves.


-Microwaves: widely used for high-volume, long-distance, line of sight communication


-Satellite: satellites, like microwave transmission, receive and transmit data via line of sight. However, satellites leave an enormous footprint


-Radio: uses radio-wave frequencies to send data directly between transmitters and receivers


-Infared: infared light is red light that is not commonly visible to human eyes. Common applications of infared light are in remote control units for televisions, VCRs, DVDs etc. Infared transceivers are used for short distance connections between computers and peripheral equipment and local area networks.





3. What is bluetooth/how is it used?


Bluetooth is an industry specification used to create small personal area networks. It is used for communication among computer devices close to one person. Bluetooth can link up to eight devices within a 10 metre area using low-power, radio based communication. It can transmit up to 2.3 Mbps.





4. What are WLAN's, Wi-Fi, WWAN's, 3G?


Wi-Fi is a wireless protocol used in medium range wireless LAN’s, called a WLAN.
It enables 1.Easy Access to the Web; 2.Enables Access to ‘live’ information; 3.Remove Cabling & Wiring; 4.Reduce the requirements for hubs/switches. 3G uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128Kbps when moving in a car, and up to 2 Mbps when the device is in a fixed location.





5. What are the drivers of mobile computing and mobile commerce
The drivers for Mobile Computing and Mobile Commerce include widespread availability of mobile devices; no need for a PC; the "cell phone" culture; declining prices and bandwidth improvement







6. Explain the nature of RFID


RFID is the term for technologies that use radio waves to automatically identify the location of individual items equipped with tags that contain embedded microchips.
http://www.ibiblio.org/Dave/Dr-Fun/df200601/df20060116.jpg

Wednesday, September 16, 2009

WEEK 7 QUESTIONS

CHAPTER 5:

1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.

There are many underlying technologies and applications that comprise Web 2.0. Some of these include AJAX; Tagging; Blogs and blogging; Wikis; Podcasts and videocasts. There are also many types of websited that comprise Web 2.0. Some of these websites inclyde Social Networking sites such as 'facebook'; Aggregators, which provide collections of content from the web; and Mashups, which takes content from a number of websites and mixes them together to create a new kind of content
http://hinchcliffe.org/img/web2tree.jpg

2. Describe the function of Web services.


Web services are applications, delivered over the internet, that users can select and combine through almost any device. By using a set of shared protocols and standards, these applications provide the function of permitting different systems to 'talk' with one another, without requiring human beings to translate the conversations.


3. Describe how you see Social Networking being used in Business.


I see social networking as a major issue for businesses. With increasing numbers of social networking sites, and increasing numbers of people joining these sites, it is almost impossible not to let these interfere with your everyday work. With people uploading information constantly, or even just constantly 'checking out' these sites, it means that they are taking time away from their work, whilst at work. Rather than promoting the business on these social networking sites, people are just socialising and not concentrating on the more important task at hand. For these reasons, many businesses have blocked these sites so that the workers will not get distracted by them, which I see as a good move.


CHAPTER 6

Section 6.1:

1. Define e-commerce and distinguish it from e-business.

E-Commerce describes the process of buying, selling, transferring or exchanging products, services or information via computer netoworks, including the internet. On the other hand, E-Business is a somewhat broader concept. As well as the functions of E-Commerce, it also refers to servicing customers, collaborating with business partners and performing electronic transactions within an organisation


2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

-B2C: the sellers are organisations, and the buyers are individuals

-B2B: both the sellers and buyers are business organisations

-C2C: an individual sells products or services to other individuals

-B2E: businesses use B2E internally to provide information and services to its employees


3. List some benefits and limitations of e-commerce.

Some benefits of E-Commerce for organisations include it makes national and international markets more accessible and lowers the cost of processing, retreiving and distributing information. Customers benefit by being able to access a vast number of products and services around the clock. The major benefit to society is the ability to easily and conveniently deliver information and services to people in cities, rural areas and developing countries.

Limitations include the lack of universally accepted security standards, insufficient telecommunications bandwidth and expensive accessibility. It is also non-secure and there are unresolved legal issues and at times, lacks a critical mass of sellers and buyers.


Section 6.2:

1. What are spamming, permission marketing and viral marketing?

These are all forms of advertising methods over the internet. Spamming is the indiscriminate distribution of electronic ads without the permission of the receiver. Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Viral marketing refers to online "word of mouth" marketing


Section 6.4:

1. What are micropayments?

Micropayments are small payments of a few dollars or less


2. What is Multichanneling?

Multichanneling is a process through which a company integrates its online and offline channels


Section 6.5:


1. List some ethical issues in EC.

Ethical issues in E-Commerce include how should the company handle the layoffs?; should companies be required to retrain employees for new positions?; should the company compensate or otherwise assist the displaced workers?


2. List the major legal issues of EC.

The major legal issues of EC include fraud; domain names; cybersquatting; taxes and other fees and copyright

Sunday, September 13, 2009

WEEK 6 QUESTIONS

1. Describe the basic telecommunications system?


A telecommunications system consists of hardware and software that transmit information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals, analog and digital. The main components of a telecommunications system includes devices, communications processors and communication channels and media.
http://www.nrc.gov/reading-rm/doc-collections/gen-comm/reg-issues/2000/ri00011/fig05.gif







2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)


The two main wired communications channels are ethernet and fibre optic channels. Ethernet is a local area network protocol. Many companies use ethernet, usually gigabit, which means the network provides data transmission speeds of 1 billion bits per second. Fibre Optic Cables also transmit information, however the information is transmitted via light pulses generated by lasers.






3. What are the main business reasons for using networks?


Businesses use networks for many reasons. Some of these reasons include networked computer systems enable organisations to be more flexible so that they can adapt to rapidly changing business conditions; networks enable companies to share hardware, computer applications and data across the organisation and among organisations; networks make it possible for geographically dispersed employees and workgroups to share documents, ideas and creative insights.






4. What is the difference between LANs and WANs?


A Local Area Network (LAN) connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device. On the other hand, Wide Area Networks (WANs) are networks that cover large geographic areas and typically connect multiple LANs. They are generally provided by common carriers such as telephone companies and the international networks of global communications service providers






5. What is a network protocol?


The network protocol is the set of rules and procedures governing transmission across a network






6. Describe TCP/IP protocol.


TCP/IP protocol is a file transfer protocol that can send large files of information across sometimes unreliable networks with the assurance that the data will arrive uncorrupted

Sunday, September 6, 2009

WEEK 5 QUESTIONS

1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.

Privacy Issues: what information about oneself should an individual be required to reveal to others?

Accuracy Issues: who is responsible for the authenticity, fidelity, and accuracy of the information collected?

Property Issues: Who owns the information?

Accessibility: Who is allowed to access information?



2. What are the 4 general types of IT threats? Provide an example for each one



There are 5 general types of IT threats. These threats include:



-Unintentional Acts- human error



-Natural Disaster- floods, earthquakes etc resulting in loss of system and data



-Technical Failures- problems with hardware and software



-Management Failures- lack of funding for information security efforts and a lack of interest in those efforts



Deliberate Acts- espionage, information extortion, identity thefts etc.








3. Describe/discuss three types of software attack and a problem that may result from them



Three types of software attacks include:



-Virus- performs malicious actions by attaching to another computer program



-Back Door- allows the hacker to access a computer system at will, without having to go through any security procedures



-Zero Day Attack- allows the perpetrator to attack the vulnerability of a software product before the software vendor can prepare a patch for the vulnerability








4. Describe the four major types of security controls in relation to protecting information systems.



The four major types of security controls in relation to protecting information systems are:



-Communication Controls- secure the movement of data across networks.



-Application Controls- security counter-measures that protect specific applications. The three major categories of these controls are input, processing and output controls



-Physical Controls- prevent unauthorised individuals form gaining access to a company's facilities



-Access Controls- restrict unauthorised individuals from using information resources








5. Name one recent software threat and briefly discuss it's effects and resolutions?
One type of software threat is a computer virus. This is where segment of computer code that performs malicious actions by attaching to another computer program. In order to stop viruses, people can use anit-malware systems. This is a software package that attempts to identify and emilinate viruses, worms and other malicious software. There are hundreds of these packages available, for example Norton Anti Virus, McAfee Virusscan and Trend Micro PC-cillin

Monday, August 31, 2009

WEEK 4 QUESTIONS

1. What are main differences/distinction between system software and application software


System software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs. Systems software provides important self-regulatory functions for computer systems, such as loading itself when the computer is first turned on and providing commonly used sets of instructions for all applications.
Application software on the other hand is a set of computer instructions that provide more specific functionality to a user. Essentially, the application program applies a computer to a certain need.








2. What are the two main types of system software? Provide some examples of their functions.


The two main types of system software are system control programs and support programs. System control programs control the use of the hardware, software and data resources of a computer system. It also includes the operating system, and the operating system serves functions such as start up; time management; file management and file recovery. On the other hand, the system support programs supports the operations, management and users of a computer system by providing a variety of support services. These include handling user logins; shared directories and file permissions






3. What is the difference between proprietary and open source software? What considerations should be made when a business selects either software.


Propritary software is software that is generally controlled by a single company and it is usually protected by both copy right licenses and sold commercially for profit.


Open source software on the other hand is freely available to enable the further development of the software. Users can usually change, improve and re-distribute the software to others.


There are a number of factors and considerations in regards to selecting software. Some of these factors and considerations include:


- does the proposed software support a few users in a single location?


- can it accommodate large numbers of geographically dispersed users?


- does the software offer tools that monitor system usage?


- does it maintain a list of authorised users and provide the level of security needed






4. What are some of the legal issues involved in acquiring and using software in most businesses/organizations?


The main legal issue in regards to acquiring and using software in most businesses and organisations is software licensing. Businesses must understand, that although many people do it, copying software is illegal. A company can copyright its software so that it is granted exclusive legal rights to reproduce, publish and sell the software






5. Choose an Operating System, provide some details on it's developer, it license type and key benefits.

An operating system is Microsoft Windows. Microsoft Windows is a series of software operating systems and graphical user interfaces produced by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Microsoft Windows came to dominate the world's personal computer market, overtaking Mac OS, which had been introduced previously. As of July 2009, Windows had approximately 93% of the market share of the client operating systems for usage on the Internet. The most recent client version of Windows is Windows Vista; the most recent server version is Windows Server 2008. Vista's successor, Windows 7 (currently at release to manufacturing), is scheduled to be released on October 22, 2009. The key benefits of Windows are that it is fast, secure and is used world wide. Its licence type is MS-EULA.

Tuesday, August 18, 2009

WEEK 2 QUESTIONS

CHAPTER 1







1. What are the characteristics of the modern business environment?



The characteristics of the modern business environement include that it is global; interconnected; 24/7- you can access files, work etc 24 hours a day, 7 days a week due to the internet; e-commerce; it is always changing








2. What is meant by a web-based, global platform, what does it provide, and how has it affected business?



A web-based global platfrom enables individuals to connect, compute, communicate, collaborate and compete everywhere and anywhere. It allows for access to limitless amounts of information, services and entertainment








3. What are the main pressures that characterize the modern global business environment?



Some of the main pressures in the modern global business environement include:
-social responsibility



-ethical issues



-terrorist attacks



-information overload



-changing workforce








4. What are/discuss some of the common, IT oriented organizational responses to these pressures?



Organisational responses to these pressures include:



-strategic systems



-having a greater focus on the customer



-custom-make to order



-e-business and e-commerce








5. How are IT architecture and IT infrastructure are interrelated?



IT architecture is a general plan of how IT is to be used by/within an organisation. It is useful for planning as it shows how the IT will fit together.



IT infrastructure is the actual implementation that will provide for effective Information systems, including the hardware, software, services and people involved








6. Is the Internet an infrastructure, an architecture, or an application program? or something else. Why?

The internet is an infrastructure. The internet is part of the organisational infrastructure that supports an organisation. Without the internet, many businesses would not be able to run. It is a vital infrastructure of many organisations. It is an organisation's platform, and a platform is part of an IT infrastructure.


http://futuremetro.net/en/media/image/it-infrastructure.jpg







CHAPTER 2




1.What is the difference between an 'application' and a computer-based information systems?




An application program is a computer program that supports a specific task, a business or another application program.



A computer based information system is an information system that uses computer technology to perform some, or all of its intended tasks.








2. What are strategic information systems?



A strategic information system provides a competitive advantage by helping an organisation implement its strategic goals and increase its performance and productivity








3. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?



According to Porter, the 5 forces that could endanger a firm's position in its industry or in marketplaces are:



-the threat of new entry of competitors



-the bargaining power of supplies



-the bargaining power of employees



-the threat of substitute products or services



-the rivalry among existing firms in the industry








4. In relation to Porter's value chain model, what is meant by primary activities and support activities, and how does IT support these activities?



Primary activities are those business activities that relate to the production and distribution of the firm's products and services, thus creating value for which customers are willing to pay.
Support activities don't add value directly to the firm's products or services. Rather, they contribute to the firm's competitive advantage by supporting the primary activities.








5. Discuss the logic of building information systems in accordance with the organizational hierarchical structure.
It is both logical and important to build information systems in accordance with the organisational hierarchical structure as you will need different systems to run different parts of the business.













6. How has the Internet affected each of the five forces in Porter’s competitive forces model.

The internet has had a major effect on Porter's competitive forces model. The internet has increased the threat that new compeititors will enter the market. Buyer power has increased as consumers can access the internet 24/7, and find cheaper prices through websites such as eBay. However, it has also increased supplier power, as all people who have access to the internet can view your product. It globalises your product. The internet has not had a major effect on substitute products, as substitute products have always been available for purchase, with or without the internet.

http://www.ngecacit.com/smb/tutorial-business-strategies_files/image002.gif

Monday, August 17, 2009

WEEK 3 QUESTIONS

1. What is computer hardware and what are the major components?



Computer hardware refers to the physical equipment used for the input, processing, output and storage activities of a computer system. There are 6 major components:



-Central Processing Unit (CPU)



-Primary Storage



-Secondary Storage



-Input Technologies



-Output Technologies



-Communication Technologies








2. What is Moore's Law and what does it mean in relation to computers?
Moore's Law predicts that micro-processor complexity will approximately double every 2 years. This means that computers will become more advanced and become twice as fast every 2 years.

http://www.youtube.com/watch?v=orxCoh6yO50








3. In basic terms, describe how a micro-processor functions



The micro-processor aims to increase processing speed by minimising the physical distance that the data (as electrical impulses) must travel.








4. What functions determine the speed of a micro-processor?
The overall smaller CPU size as a result of being implemented on a single die means faster switching time because of physical factors like decreased gate parasitic capacitance. This has allowed synchronous microprocessors to have clock rates ranging from tens of megahertz to several gigahertz. Additionally, as the ability to construct exceedingly small transistors on an IC has increased, the complexity and number of transistors in a single CPU has increased dramatically. This widely observed trend is described by Moore's law, which has proven to be a fairly accurate predictor of the growth of CPU (and other IC) complexity to date.














5. What are the 4 main types of Primary Storage?



The 4 main types of primary storage are:



-Random Access Memory (RAM)



-Cache Memory



-Read-only Memory (ROM)



-Registers



All are direct acccess memory, only ROM is non-volatile












6. What are the 4 main types of Secondary Storage?



Secondary Storaage includes:



-Magnetic Media (tapes, hard-drives, thumb or flash drives)



-Optical Media (CD-ROM, DVD, optical jukebox)









7. How does Primary Storage differ from Secondary Storage in terms of speed, cost and capacity?



Primary storage has much less capacity than secondary storage, and it is faster and more expensive per byte stored. it is located much closer to the CPU than the secondary storage. Sequential-access secondary storage media such as magnetic tape are much slower and less expensive than direct access media (eg hard drives, optical media)








8. What are enterprise storage systems?



An enterprise storage system is an independent, external system with intelligence that includes 2 or more storage devices. There are 3 major types of enterprise storage sub-systems:



-redundant arrays of independent discs (RAIDs)



-storage area networks (SANs)



-network-attatched storage (NAS)








9. Distinguish between human data input devices and source data automation
An input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system (such as a computer). A human input device is a keyboard, mouse etc, whereas source data automoation is collecting data in a digital form.














10. What is one new technology that will change how we do things?


A new technology that would change how we do things could be a barcode/scanning system, by which all humans are connected to. When we walk into shops, it scans the person and activates their bank account. When you walk out of the shop, all item you walk out with are scanned, automatically taking the money out of your bank account. This would eliminate thefts from stores, as well as street muggings, as people will not be walking around with money.