Saturday, October 25, 2008

Chapter 10 - Week 12

Chapter 10 Questions

Section 10.1 - Before You Go On… 1. What are some problems associated with assessing the costs of IT?

Some of the problems include allocating fixed costs to different IT projects. Also once a system is complete, more costs are brought forward with the repair and maintenance, and upgrading of the systems and software.


2. What difficulties accompany the intangible benefits from IT?

The inability to put a dollar value on it. To be successful a company must implement the new technology successfully, yet this is rarely the case and it also but be cutting edge technology.

3. Define NPV and ROI, and business case approaches.

NPV is Net present value which convents the future value of benefits to their present-value equivalent by "discounting" them fat organisations cost of funds.
ROI is Return on investment which is managements effectiveness in generating profits with their available assets.
Business Case Approach, a written document which is used to justify funding one or more specific applications for projects.

Section 10.5 - Before You Go On… 1. What type of companies provide outsourcing service?

Outsourcing services are provided mainly by large software companies for developing, operating and maintaining IT applications.

2. Define ASPs and list their advantages to companies using them.

ASP is Application service provider which is an agent/vendor which assembles software needed by enterprise and packages the software with services such as development, operations and maintenance.
Advantages include:
Save Costs.
Reduce software maintenance and upgrades
Reduce user training
Increase competitiveness

3. List some disadvantages of ASPs.

Disadvantages include:

-ASP might not offer adequate security protection
-Software not perfect fit for all desired applications
-Must make sure existing software and communications can work well with new ASP.

Section 10.6 - Before You Go On… 1. List the major steps of selection of a vendor and a software package.

-Step 1 Identify possible vendors
-Step 2 Determine the evaluation criteria
-Step 3 Evaluate Vendors and Packages
-Step 4 Choose the Vendor and Package
-Step 5 Negotiate Contract
-Step 6 Establish a service level agreement.

2. Describe a request for proposal (RFP).

RFP is a document that is sent to potential vendors inviting them to submit a proposal that describes their software package and explains how it would meet their company needs.

3. Describe SLAs
SLAs are formal agreements that specify how work is to be divided between the company and its vendors. Based on a set of agreed upon milestones, quality checks and what is situations.

Friday, October 24, 2008

Chapter 9 - Week 11

Chapter 9

1. Describe the decision-making process proposed by Simon.

It is composed of 4 major phases. Intelligence, design, choice and implementation
Intelligence phase is comprised of:
-Organisational objectives
-Search and scanning procedures
-Data Collection
-Problem Identification, Classification and Statement

Design phase is comprised of:
-Formulate a Model(assumptions)
-Set criteria for choice
-Search for alternatives
-Predict and measure outcomes.

Choice phase is comprised of:
-Solution to the model
-Sensitivity Analysis
-Selection Analysis
-Selection of best alternative
-Plan for implementation(action)
-Design of a control system

Implementation is comprised of:
-Implementation of solution.

2. Why do managers need IT support?

Managers need IT support because it is very difficult to make decision without relevant or valid information. Decision making is becoming more difficult due to:
-Number of alternatives to consider
-Time pressure
-Increase in complex decisions

3. Describe the decision matrix.

The decision matrix is the 3 primary classes of problem structure and the 3 broad categories of the nature of decisions can be combined in a decision support matrix that consists of 9 cells(as seen on pg 266) of your textbook).

It states that lower management perform the structured and operational control orientated tasks where as middle managers have more responsibility and senior executives have the most and perform the highest responsibility tasks.


Section 9.2 - Before You Go On… 1. Describe the capabilities of data mining. Section

Data mining is the search for valuable business information in a large database or data warehouse.
Capabilities are to predict trends and identify unknown patterns.
Data mining address the issue of why something is happening and provides predictions of what will happen in the future.

9.3 - Before You Go On… 1. What are some of the capabilities of digital dashboards?

Digital dashboards are an evolved version of executive information systems which are information systems designed for the information needed for top executives.
But now it is widely used across whole businesses.
It provides rapid access to timely information and direct access to management reports.
Advantages include it is very easy to use as it displays information in graphic form.
Also allow the information to be drilled down into specific details.

Thursday, October 23, 2008

Chapter 8 - Week 10

Chapter 8 Questions

Section 8.1 - Before You Go On… 1. What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.

TPS is the transaction processing system. It collects, monitors, stores and processes data in a database. All this information is inputs to the businesses database.
TPS allows the owners of the business to get functional information from every purchase such as knowledge management, customer relationship management and e-commerce.
Key objectives include
  • Collect and store functional information,
  • Ability to handle high volume efficiently,
  • avoid errors,
  • maintain privacy and security.

Section 8.2 - Before You Go On… 1. What is a functional area information system? List its major characteristics.

A functional area information system provides information via reports to lower and middle level managers in their functional areas mainly used to help plan control and organise operations.

  • Major characteristics include
    -They provide routine reports at scheduled intervals
    -They provide Ad-hoc reports when needed and
    -Exception reports which are reports with information not related to the other two

2. How does an FAIS support management by exception? How does it support on-demand reports?

It supports management by exception as some managers prefer this. They prefer simpler reports with information only relevant to them.
It supports on-demand reports as exception reports are only needed when they are on demand(ad-hoc).

Section 8.3 - Before You Go On… 1. Define ERP and describe its functionalities.

ERP is Enterprise resource planning systems which integrate planning, management and use of all of an organisations resources. This allows information to flow seamlessly across all the functional areas.
This allows certain functional areas to be affected by others thus making all information accurate and up to date.
Also allows a business to control its business process(set of steps to reach specific outcome.

2. List some drawbacks of ERP software.

Some drawbacks of ERP include:

-It is extremely complex software
-It is very expensive software
-Time consuming to implement

Section 8.5 - Before You Go On… 1. Define a supply chain and supply chain management (SCM).

A supply chain is the flow of materials, information, services and money from raw materials through factories and warehouses eventually ending at the customers.
Supply chain management is the plan, organisation, information and service provided to customers.
Used to reduce friction along the supply chain by reducing costs, and time.


2. List the major components of supply chains.

Major components of supply chains include:

3. What is the bullwhip effect?

The bullwhip effect refers to erratics shifts in orders up(orders, info, payments, returns) and down(Products, services, info) the supply chain

4. What are some solutions to supply chain problems?

Solutions to supply chain problems include:

  • Using inventories-building up securities again supply chain uncertainties
  • Information sharing-along supply chain
  • Vertical integration-cutting away suppliers.

Section 8.6 - Before You Go On… 1. Define EDI and list its major benefits and limitations

EDI is Electronic Data Interchange which is a communication standard that enables business partners to exchange routine documents eg purchase orders electronically.Usually sent through the Internet.
Limitations include:
-Needs significant initial investment as costs are high
-High ongoing operation costs
-EDI systems are very inflexible.

Chapter 7 - Week 9

1. Identify common wireless devices and their application to business

Common wireless devices include:

  • Mobile phones-which are used to reach people when not in the office to discuss business matters
  • Wireless Internet- which allows you to be online at all times, able to both and a receive emails.
  • Bluetooth-which is used to sync calenders from PCs to mobile phones or to use hands free devices when driving.
  • GPS-which is used to help locate businesses or other places of interest.

2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.

Microwaves are used in conjuction with satellites for high volume, high bandwidth line. To work they need a clear line of sight with no obstacles. The signal can be distorted by environmental interference or other objects blocking the line of sight. Microwaves and satellites are used to transmit Television signals, GPS signals and Mobile Phone signals just to name a few.

Infrared transmission is the cheapest and easiest way to communicate wirelessly. An LED is used to send the signal(pulses of on and off) to another device. It is most commonly used in remote controls for electrical devices.

Radio waves are used in the transmission of signals by electromagnetic waves. Radio waves don't need a medium and can be reflected or refracted around objects. Radio waves are used to transmit Audio, Video, GPS and Radar.


3. What is bluetooth/how is it used?

Bluetooth is wireless radio communication that allows close range connectivity between devices eg mobile and bluetooth headset or send files from one computer to another wirelessly.

4. What are WLAN's, Wi-Fi, WWAN's, WiMax?

WLAN is a Wireless Local area Network-which uses radio waves to transmit data to and from computers on the same network

Wi-Fi is a wireless Ethernet technology that allows people with laptop computers to connect to the Internet while out and about at hot spots" where Wi-Fe is enabled.

WWAN is Wide Area Wireless Network which allows users to connect over a a very large geographical network.

WiMax is the successor to Wi-Fi it is a new wireless broadband technology with a range of up to 80km.

5. What are the drivers of mobile computing and m0bile commerce

Drivers include

  • Widespread availability of mobile devices
  • No need for a PC-can use mobile phone now eg blackberry or iPhone
  • declining prices of technology
  • Bandwidth Improvement eg 3G networks

6. Be able to explain how mobile technologies can be applied to business solutions

Mobile technologies can help business in many ways such as

  • Mobile banking which allows fast and easy payment for goods online
  • Mobile wallets allowing people to make purchases with a click of their phones.
  • Location based services and advertising which allows businesses to target a segmented market eg advertise car parts at a F1 Race.
  • Cellphone culture has allowed almost everyone to have a phone on them at all times making everyone always contactable.

7. Explain the nature of RFID

RFID is Radio Frequency Identification Technology. It was invented to replace barcodes but wasn't as successful as first conceived due to its high cost over a barcode and its larger size. It can be used in stores to speed up the transaction process and also be used in warehouses to faster count inventory coming and going out of the warehouse.

8. Identify the 4 main security threats that arise from the use of mobile technologies

4 Main security threats include :

  1. Rouge Access point which is an unauthorised access point into a wireless network
  2. Ware Driving is the locating of WLANs whilst walking or driving around a destination with wireless networks, allowing users to access free Internet
  3. Eavesdropping refers to unauthorised users access to data that is travelling over a wireless network
  4. Radio Frequency jamming is intentionally interfering with wireless network transmissions.

Thursday, September 25, 2008

Chapter 5 & 6 - Week 8

Chapter 5 & 6 Questions

1. Describe the three network applications that we discussed in this section and the tools and technologies that support each one.

  1. Portal is a Web-based, personalized gateway to information and knowledge that provides relevant information from different IT systems and the Internet using advanced search and indexing techniques.

  2. Communication

  3. Collaboration refers efforts by two or more entities who work together to accomplish certain tasks.

2. What are the business conditions that are leading to the increased importance of videoconferencing?

Video Conferencing allows users in one location to view and communicate with users in another location. Business are increasing the use of video conferencing as it allows users to continue to do business without traveling domestically or internationally. It reduces time, cost and allows the business to work to be completed fast and efficiently.

Section 5.21. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.

Web 2.o is a loose collection of information technologies and applications and of the websites that use them.
The technologies, applications and types of web sites thaqt comprise Web 2.0 include:Ajax: is a web development technique that allows web pages to quickly reload new dataTagging: using keywords to describe a piece of web‐related content such as an article, video, image or blogWikis: a website which anyone can post material, and even edit add or make changes to material.
Really Simple Syndication (RSS): a technology that allows users to receive the customised information when they want it.

2. Describe the function of Web services.

Web servers are applications that are delivered over the web that users can select and combine through any device e.g. Google.

3. Describe the function of service-oriented architectures.

Service-oriented architectures (SOA) is an IT architecture that makes it possible to construct business applications using web servers. SOA can be reused within the organization in other applications.

Section 6.1 1. Define e-commerce and distinguish it from e-business.

Electronic commerce (e-commerce) is the buying, selling, transferring orexchanging of products, services or information by means of computer networks, such as the Internet.E-business is a broader definition ofe-commerce, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.

2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

Business-to-consumer (B2C): the sellers are organizations and the buyers are individuals.Business-to-business (B2B): both the sellers and buyers are business organizations. B2B represents the vast majority of e-commerce.Consumer-to-consumer (C2C): an individual sells products or services to other individuals.Business-to-employee (B2E): An organization uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically; buy discounted insurance, travel packages, and event tickets.

3. List some benefits and limitations of e-commerce.

Allows producers to sell there products 24/7 in the national and international markets with lower costs. Therefore consumers also benefit as they have access to a wide range of goods and services 24/7 and are able to access the web sites easily at home in there own time.

Section 6.2 1. List the major issues relating to e-tailing. E-tailing aka e-retailing is the direct sale of products and services through store fronts or electronic malls.

The 2 main issues relating to e-tailing are channel conflict and order fulfillment.Channel conflict is the alienation of existing distributors when a company decides to sell to customers online. Therefore some people may not have access to computers, internet etc so are not able to view or purchase the good.Order fulfillment is quickly performing tasks so as the good is delivered to the customer quickly and so money can be collected. The issue here is unreliable suppliers or customers which may cause time and money delays.

2. What are spamming, permission marketing and viral marketing?

Spamming is indiscriminate distribution of e-mail with out the user’s permission.Permission marketing is a method of marketing that business use that asks consumers permission to voluntarily accept online advertising and promotional emails.Viral Marketing is online word of mouth marketing.

Section 6.4 1. List the various electronic payment mechanisms.

BPay and Paypal are the 2 most widely payment mechanisms online.
But you can also pay with EFTPOS(card)


2. What are micropayments?

Very small payments over the internet

Section 6.5 1. List some ethical issues in EC.

-Privacy Violations
-Transaction Security Breaches
-Illegal Activities

2. List the major legal issues of EC.

-Privacy Violations
-Transaction Security Breaches
-Illegal Activities

Tuesday, September 23, 2008

Tech Guide 4 - Week 7

Tech Guide 4 Questions

1. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)

There are three main types of cables including Twisted-pair wire which is the most common form of wire cable main because it is inexpensive, easy to work with and unobtrusive, but it is slow as it has a low bandwidth and is subject to interfenance. Coaxial Cable is just insulated copper wire that is used oposed to twiseted-pair wire as it has a higher bandwidth and is less susceptible to electreical interferance, but it is relatively expense and inflexible and also difficult to work with when compared to twiseted-pair wire. Fiber Optic Cables consist of thousands of small, thin glass filaments that send information via light pulses. It is prefered as it is smaller and lighter then traditional cables and has a very high bandwidth, but it needs amplifiers every few kilometers to increase the signal strength and it can be expensive when alot is used.

2. Describe the two technologies that enable users to send high-volume data over any network. (ISDN & ADSL)

Integrated Services Digital Network(ISDN) and Asymmetric Digital Subscriber Lines(ADSL) enable users to send high0volume data over any network. ISDN is an old and outdated technology that uses telephone lines whereas ADSL sends digitial signals though existing phonelines allowing the phone to be in use when someone is using the internet.

3. What are the main business reasons for using networks?

The main business reasons for using netoworks include:

  1. It connects all the computers in a business via commucations media allowing data to be transmitted to all the users in the business simultanoioulsy

  2. Allows all the users to access all the information that is stored on the network instead of cluttering up the users on PC.

  3. It also alows flexibility as the business can adapt to rapidly changing business conditions.

  4. Networks are a critical link between the business and its customers.

4. What is the difference between LANs and WANs?

A LAN is a local area network that conects devices in a limited geographical location.

A WAN is a wide are network which allows users to transmit and receive data over large geographic locations.

5. What is a network protocol?

Network protocol is a set of procedure and rules that govern the transmission of information across a network.

6. Describe TCP/IP protocol.

TCP/IP protocol is the transmission control protocol/Internet protocol which is the protocol of the internet. It managers the movement, sequence and aknowledges the receivement of packages sent across the net.

7. Describe the various ways that you can connect to the Internet?

You can connect to the internet via LANs, WANs, ADSL, Dialup, and broadband

8. Describe the parts of an Internet address.

Protocal - Domain Name - Webpage

9.What are the roles of browsers?

Browsers are software applications through which users primarily access the web and allows users to search the entire web for data and information relevant to their search.

10.Describe the difference between the Internet and the World Wide Web?

The internet is a massive network that globally connects computer networks quickly, inexpensively and effortlessly. Where as the World Wide Web (WWW) is a system of universal acceptance standards for storing, receiving, formatting and displaying information using various functions on the internet.

Chapter 4 - Week 6

Chapter 4 Questions

1. What are some of the difficulties in managing data?

Data is very hard to manage is it is processed in many different stages. Some of the difficulties in manging data include:

  • With an increase of time comes an increase in data and since a lot of historical data is kept, over time the amount just builds up making it harder to manage and sort through.
  • Data is constantly being developed and updated and every time this occurs you need to upgrade what you have.
  • Data security is hard to set up especially for large companies, but can be broken into by hackers and new data security needs to be updated every year,
  • Data comes from all over the place, be it both externally ( WWW or Reports) or internally (business data bases) and all this data needs to be sorted as to allow it to be easily accessed for other to use.

2. What are the various sources for data?

The main 3 sources of data include

  1. Internal Data be in corporate databases accessed via the intranet
  2. Personal Sources such as opinions and experiences
  3. External Data such as data from the WWW
3. What is a primary key and a secondary key?

A Primary key is the identifier field or attribute that uniquely identifies a record.

A Secondary key is an identifier or attribute that has some but not all of the identifying information.

4. What is an entity and a relationship?

An Entity is a person, place, thing or event about which information is maintained in a record or file

A Relationship is the linking of tables in order to conduct searches of linking columns and rows of data

5. What are the advantages and disadvantages of relational databases?

A Relational database is a database which contains all the records and attributes of entities allowing the user to perform searches via the links between all the tables' rows and columns in the data base.

Advantages include:
-Allows the user to access large amounts of information very quickly and accurately
-Easy to operate and use a database such as ACCESS
-The use of the primary key gives the user great flexibility in the variety of queries made in the database.

Disadvantages include:
-Hard to setup and manage
-If one word is spelt incorrectly the whole database can be out of tune
-If you are new to using the database you may struggle with locating data that you need without the knowledge of using the primary or secondary key.

6. What is knowledge management?

Knowledge management helps with the organisation and manipulation of important knowledge that is part of the organisations memory. This helps the knowledge to be easily exchanged and have the ability to grow.

7. What is the difference between tacit knowledge and explicit knowledge?

Tacit Knowledge is based on experience , know how, trade secrets and understanding of certain tasks or subjects It is generally slow, imprecise and costly to transfer and highly personnel. How a certain customer reacts to certain sales people is something that is not typically recorded and is an example of Tacit knowledge that is passed on to others verbally.

Explicit Knowledge is more rational, technical and objective thinking, it is mealy knowledge that has been documented. Inn organisations this can be reports, products, strategies and goals. A description on how to do a tax return is an example of Explicit knowledge as it is a documented form of information.

Tuesday, September 2, 2008

Chapter 3 - Week 5

Chapter 3 Questions

1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.

-Privacy issues such as collecting, storing and disseminating information about otherds.
-Accuracy issues which involves the authenticity and accuracy of info that is being collated
-Property issues involving ownershhip of information
-Accessibility issues which involoves the of who should have access to certain information and if they need to pay to use it.

2. What are the 5 general types of IT threats? Provide an example for each one
-Unintentional acts such as human error or carelessness, eg not saving a document in the correct location and getting it lost

-Natural Disasters- Acts of God which are unavoidable such as floods and earthquakes, eg lighting storm blows up powergrid causing a city to lose power.
-Technical Failures- Problems with both software and hardware that could lead from corrupt software or malfunctioning hardware eg-crashing computer
-Management failures- Lack of interest in peoples efforts or lack of funding- eg low level and outdate software still being used.
-Deliberate Acts-Committed by insiders of an organisation who deliberakty try to destroy or vandalise a companys software or hardware.

3. Describe/discuss three types of software attack and a problem that may result from them
  • Virus-Computer code that performs malicious and hurtful actions to a computer.
  • Worm-Again it is computer code that is designed to perform viscious attacks to a computer like a virus but also replicate and spread itself to other computers
  • Trogan Horse-Software that hides in computer programs and reveal designed behavour only when activated.-eg spread spam

    4. Describe the four major types of security controls in relation to protecting information systems.

    Four controls include:
  • Physical controls which prevent unauthorised individuals from gaining access to a company such as walls and gates.
  • Access Contorls restrict unauthorised users from using any information resources in a company involving both authorisation(determines actionsm rights and prigalvages of person) and authentication(determines identity of person)
  • Communication controls wuch as firewalls and encryption to secure the movement of data transfer.
  • Application controls which are security counter measures that protect specific applications.

    5. What is information system auditing?

    It is an examination of the controls within an information technology infrastructure of a company.

    6. What is the difference between authentication and authorization and why are they important to e-Commerce/give an example of their relevance to e-Commerce.

    Authorisation- determines actions, rights and prigalvages of person and authenticationdetermines identity of person by passwords and thumb scans.
  • They are important as they help protect our computers and information from others who dont have access to use it.

Sunday, August 24, 2008

Tech Guide 2 - Week 4

Tech Guide 2 questions

1. What are main differences/distinction between system software and application software?

The main differences between system software and application software are;

System Software-are programs that control and support the operation of a computer system, including operating systems and database management systems.

Application software- is any program designed to perform a specific function directly for the user or for another application program.


2. What are the two main types of system software?

The two main types of system software are System Contol Programs which control the use of the software and hardware of a computer system and the System Support Program which support the operations, management of a computer system providing support services eg performance monitors.

3. What is the difference between proprietary and open source software? What considerations should be made when a business selects either software.

Proprietary Software- is software that is restricted to one party ie the holder of the liscence for the software which also has a lock on its codes making it unchangeable. The software also has a restiruction on its sale and redistribution.

If this software is chosen, it is guaranteed to have professional service ie call centres for help with the software and also its wide use around the world like Microsoft Word.

Open Source Software-Freeware software that is available in code form that is easily accessible for free from the internet. This software has the feature of allowing users to access its code allowing them to be changed.

When being selected for a business they need to check its compadibility with other programs and its ease of use and useability.

4. What are some of the legal issues involved in acquiring and using software in most businesses/organizations?

Software Licensing-A lot of software is being copied and distributed on the black market, to protect the manufactures of theses programs licenses are being used to stop illegal sale of software around the world. When a business acquries software they need enough licenses for each computer that will use it, so a lot of security is put inplace to make sure large companies like ANZ all have licenses and dont cheat the software manufactures.

5. What is meant by SaaS? Name some examples of this software.

SaaS stands for Software as a Service which is a method which allows users to access their information using a web browser using an application that is running remotely on a server somewhere. With web access, a client can get to their information almost instantanoulsy and only pay for what they use.

Sunday, August 17, 2008

Tech Guide 1 - Week 3

Tech Guide 1 questions

1. What is computer hardware and what are the major hardware components?

Computer hardware are devices that together accept datam and information, process and display them. An exmaple of these include:

  • Processor,
  • Monitor
  • mouse
  • Animations - mouse-mouse
  • Printer

2. What is Moore's Law/what does it mean in relation to computers.

Moore's Law states that the number of transisters per square inch on integrated circuits has doubled every year since the integrated circuit was invented and that this trend would contine for the foreseeable future. This means every 2 years computer will be faster, more powerful and smarter then ever before.

3. In basic terms, describe how a microprocessor functions.

A microprocessor is made up of :

  • A control unit which sequentially accesses program instructions, decodes them and controls the flow of data to and from ALU, registers, caches and various other output devices.
  • The Arithemtic-Logic Unit performs the mathematical calculations and makes logical comparisons
  • Registers are used as high speed storage areas that store small amouts of data for short periods of time.
  • The caches is external memory that data from registers is sent to.

4. What factors determine the speed of the microprocessor?

The speed of the microprocessor is determined by the clock speed(measured in MHz), word length, bus width and number of transisters in the chip.

5. What are the four main types of primary storage.

The four main types of primary storage are:

  • Register
  • RAM (Random Access Memory)
  • Cache Memory
  • ROM(read-only memory.

  • 6. What are the main types of secondary storage?

There are 2 main types of seconady storage, the first being Magentic and the second being optical storage devices.

  • Magnetic storage devices include Hard drives, NAS (network attached storage), Memory Cards and Tumb Drives(USB Sticks)
  • Optical Storage Devices include CD-ROM, DVD and Blueray Discs

7. How does primary storage differ from secondary storage in terms of speed, cost and capacity?

Primary storage is able to store 3 types information:

  • Date to be processed by the CPU
  • Instructions for the CPU as how to process the data
  • Operating systems programs that manage various aspects fo the computers operation.

The primary storage is there to be used immediatly to store very small amouts of information as close to the CPU as possible. The shorter the distance the shorter the data has to travel thus making the computer run faster

Secondary storage was designed to store large amounts of data for a very long period of time unlike primary storage which holds data for a very short amount of time. Even though secondary storage can hold data for longer periods of time, it is actually a lot cheaper when compared to any primary storage device.

8. What are enterprise storage systems?

Enterprise storage systems are independent, external systems that provide both back-up and storage of information for businesses. 3 types of enterprise stoerage systems include:

  • Independent Disks
  • storage network areas
  • network-attached systems

9. Distinguish between human data input devices and source data automation.

Human data input are human data entry devices such as a mouse, keyboard, joy-stick or touch recognition. Where as source data automation devices input data with very little if any human involvment, to reduce error, increase speed and increase data collection. Examples of this include monitors, printers and plotters.

10. What is one new technology that will change how we do things?

Radar Guided Cruise Control is brand new technology that will change the way we drive. It uses little sonar senses in the front of the car to detect if the car infront of you is slowing down. If it does and you dont react it will initially dab the brakes. If more time has passed the car will press on the brakes even harder to help you avoid the car ahead. This technology matched with Lane Assist which also uses senses to keep the car in its lane will change the way we drive. If a car and control our speed (Radar Guided Cruise Control) and keep us in our lane (Lane Assist) in about 10 years time there will be cars that drive themselves eliminating the need to drive and changing our lives for ever.

Tuesday, July 8, 2008

Chapter 2 - Week 2

Chapter 2
Q1. What is the difference between an 'application' and a computer-based information systems?

An Application is known as a program that was designed to perform a specific function directly for the user or for another application program eg, Microsoft word or Excel.

Where as a computer-based information system is an information system that uses specific computer technology to perform required tasks, these include hardware, software, database and network.

Q2. What are strategic information systems?

Strategic information systems are systems that help an organisation gain a competitive advantage and provide an other advantages to an organisation such as helping it organise and implement strategic goals and increase its performance and productivity.

Q3. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?

5 Major forces that could either enhance or endanger a company's position in a given industry include:

  • The threat of entry of new competitors

  • The Bargaining power of suppliers

  • The bargaining power of customers(buyers)

  • The threat of substitute good or services

  • The rivalry among existing firms in the industry

Q4. In relation to Porter's value chain model, what is meant by primary activities and support activities, and how does IT support these activities?

Primary activities involve the the purchasing of materials, the processing into products and delivering to the customers. Primary activities relate to both the production and distribution of the firms good and services creating value for which customers are willing to pay.
Primary activities are made up of:

1. Inbound Logistics 2. Operations 3. Outbound Logistics 4. Marketing and Sales 5. Services

Support Activities do not directly add value to the firms products or services, the contribute to the firms competitive advantage in the industry by supporting the primary industry.
Support activities are made up of:

1. The Firms Infrastructure 2. Human Resource Management 3. Product and Technology Development 4. Procurement

IT supports these activities by monitoring any changes or finding out and implementing faster and cheaper ways to achieve desired goals.

Q5. Discuss the logic of building information systems in accordance with the organizational hierarchical structure.

Each information system is built in accordance to it purpose or specific area. In this case of organisational hierarchical structure, systems are based on management level, where certain systems have certain information regarding to the rank or position in a company for example the information for Partners of a company are not in the same information system as the managers as they don't need to know that information.
When something is built or created for a specific purpose or area it is specialised in the way that those people work and over times is fixed so it is very efficient with no bugs.

Q6. How has the Internet affected each of the five forces in Porter’s competitive forces model.

The Internet has affected:

  • The threat of entry of new competitors- with the Internet almost all companies have the opportunity to have a global market place and compete with global companies for market share in an industry which led to an increase in new competitors.

  • The Bargaining power of suppliers-The increase in suppliers has allowed the the buyer to get a better deal as prices are reduced to attract more buyers

  • The bargaining power of customers(buyers)-As above the increase in the number of choices available the lower the prices they are sold for.

  • The threat of substitute good or services- The threat has increased as the Internet has allowed for an increase of substituted goods on the market

  • The rivalry among existing firms in the industry-With more company's competing for the same business they must become competitive and reduce prizes to attract more consumers to them rather then other firms in the same industry.

Chapter 1 - Week 2

Chapter 1

Q1. What are the characteristics of the modern business environment?

The modern business environment is more complex now then it has ever been. At one time we were sending letters and expecting a response in the next couple of days but now with such technologies like the Internet and email this gap has shortened from a couple of days to matters of minutes. Because we can send and receive information almost instantaneously we also expect a response just as fast.

Some of the characteristics include:

  • A fast paced environment,
  • The expectation of in depth knowledge of all technologies and software used in your business and in others,
  • Obsolescence of a lot of human jobs and an increase in computers and robots working with humans,
  • Larger target market for both buyers and sellers as the Internet has allowed us to become an international buyer/seller almost in minutes eg-with an EBay account.

Q2. What is meant by a web-based, global platform, what does it provide, and how has it affected business?

A web based global platform is a global platform which allows individuals to connect, compute, communicate, collaborate and compete everywhere, anytime with unlimited access to entertainment, knowledge and information. This is all thanks to the Internet and the World Wide Web (WWW), "this platform enables globalisation" (ch1 pg 8 Intro to Information Systems). Businesses have now drastically changed with the introduction of the Internet and the world wide web enabling them to act globally and nationally with just a click of a button opening them up to a whole new world of customers and suppliers.

Q3. What are the main pressures that characterize the modern global business environment?

The main pressures that characterise the modern business environment include:
  • Business pressures which include organisational performance, organisational response and IT Support.
  • Market pressures which include the global economy, global competition, the changing nature of the work force and powerful customers,
  • Technology pressures which include technological innovation, technological obsolescence and information overload,
  • Societal/political/legal pressures include social responsibility and ethical issues.
Q4. What are/discuss some of the common, IT oriented organizational responses to these pressures?

Some of the the IT orientated organisational responses include:
  • Global economy and Strong competition- the introduction of a global platform allowing fast and easy transfer of data and knowledge.
  • Powerful Customers the introduction of the Internet has allowed consumers to gain a lot more knowledge about products they are buying. This has made the sellers increase the promotion of the products to not only attract further customers but also to retain existing ones.
  • Information overload- to sort through all the junk and useless information on the Internet one must have the knowledge to navigate, retain and utilise the Internet in the best way they can.
  • Ethical Issues- The use of IT not only raises ethical issues but can also be the cause of them, so actions must be put into place block or disallow this sort of content eg,using Norton Security to block websites that may contain this.

Q5. How are IT architecture and IT infrastructure interrelated.

IT architecture is a high-level map or plan of the information assets in an organisation. It integrates not only the organisation but also all the individual users as well

IT Infrastructure is the physical facilities, IT components, IT services and IT personnel that support the entire organisation.

They are integrated in the way that they integrate all the IT components, IT personnel and IT services to the not only the organisation but also all the individual users.

Q6. Is the Internet an infrastructure, an architecture, or an application program? or something else. Why?

The Internet is all of these components, it is an application program as it has a purpose, it has IT components, IT personnel and IT services and it is a high level map/plan linking to world to one large and continuously growing network