Information Technology in Business - Essay Example

Cost saving as well. Interactive training classes Standardize all the training activities and flexible for all other employees no matter where they located. Employees review, update personal data Information in finger tips for review and update. B) “How can we compete effectively in this particular market? ” Instead of competing head-to-head with all the possible competitors, a digital firm can decide to: Focus on new markets entrants E-Marketing strategy to identify new markets entrants and required services and products. Substitute Products and Services Generate information on the current market needs and produce accordingly.

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now

Supplier Identify the best service provider with competitive price with good quality. Customer Attend to customer feedback and keep improve to meet the requirement in the fastest and effective way. Answer 2 A. List and explain four(4) major types of information system in organization Transaction Processing System More to production and services which is produce the end product and services. Software and hardware involves. The process will be monitored by Middle Management. Management Information System Middle Management will be creating the data and reporting system for Senior Management.

Decision Support System The data will be collective and review by respective Head of Departments (Finance, Procurement, Project and Engineering) Executive Information System Weekly or Monthly report will be submitted to the decision makers to review and advise. Answer 3 A. Briefly describe your Internet Service Provider’s e-mail usage policy. If you are on campus, your school should have a usage policy. Example: Prearrangement’s. Coma’s Services 1 . Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited.

This includes, without limitation, material protected y copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. 2. Sending Unsolicited Bulk Email (“BE”, “spam”). The sending of any form of Unsolicited Bulk Email through Prearrangement’s. Coma’s servers is prohibited. Likewise, the sending of BE from another service provider advertising a web site, email address or utilizing any resource hosted on Prearrangement’s. Mom’s servers, is prohibited. Prearrangement’s. Com accounts or services may not be used to solicit customers room, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider. The sending of unsolicited commercial email (SPAM) through our web servers promoting any web site, or via third party web servers promoting a web site hosted by us, can result in the suspension or termination of the client’s web hosting account, without refund. A $50 clean up fee may be charged for spam. If Prearrangement’s. Mom suspects a client is sending unsolicited commercial email (SPAM) through our web servers, Prearrangement’s. Mom has the right to suspend or terminate their account with or without notice 3. Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by Prearrangement’s. Com customers must be Closed-loop (“Confirmed Opt-in”). The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list.

Purchasing lists of email addresses from 3rd parties for mailing to from any Prearrangement’s. Com-hosted domain, or referencing any Prearrangement’s. Com account, is prohibited. 4. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AY-JP or the AY-JP of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send Unsolicited Bulk Email, initiation of pinging, flooding, mail-bombing, denial of service attacks. 5.

Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Chapeaus Register of Known Spam Operations (ROOKS) database at www. Panamas. Org. 6. Unauthorized attempts by a user to gain access to any account or computer resource not belonging to that user (e. G. , “cracking”). 7. Obtaining or attempting to obtain service by any means or device with intent to avoid payment. 8. Unauthorized access, alteration, destruction, or any attempt thereof, of any information of any Prearrangement’s. Mom customers or end-users by any means or device. 9. Knowingly engage in any activities designed to harass, or that will cause a denial-of-service (e. G. , synchronized number sequence attacks) to any other user whether on the Prearrangement’s. Mom network or on another provider’s network. 10. Using Prearrangement’s. Coma’s Services to interfere with the use of the Prearrangement’s. Com network by other customers or authorized users. 1 1 .

Offensive Content: You may not publish or transmit via Pro Host Management’s service any content that Pro Host Management reasonably believes: constitutes child pornography; constitutes pornography or adult related material; is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech; is unfair or deceptive under the consumer protection laws of NY Jurisdiction, including chain letters and pyramid schemes; is defamatory or violates a person’s privacy; creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with a investigation by law enforcement; improperly exposes trade secrets or other confidential or proprietary information of another person; is intended to assist others in defeating technical copyright protections; clearly infringes on another person’s trade or service mark, patent, or other property right; promotes illegal drugs, violates export control laws, relates to legal gambling, or illegal arms trafficking; is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to Pro Host Management; or is otherwise malicious, fraudulent, or may result in retaliation against Pro Host Management by offended viewers. Content “published or transmitted” via Pro Host Management’s service includes Web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on any Internet service provided by Pro Host Management. 12.

Internet Abuse: You may not engage in illegal, abusive, or irresponsible behavior, including: Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Pro Host Management and its customers) without express authorization of the owner of the system or network; monitoring data or traffic on any network or system without the authorization of the owner of the system or network; Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; Use of an Internet account or computer without the owner’s authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning; Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting; or Any conduct that is likely to result in retaliation against the Pro Host Management’s network. B. There are four main business benefits to edge computing, briefly explain. Storing and Protecting Information Information technology creates electronic storage systems to protect your company’s valuable records. Storage systems, such as virtual vaults, keep information safe by only allowing certain users within your company to access, withdraw, add or change the documents.

According to an article in Science Daily, IT security engineering systems protect your electronic information from being hacked, or wiped out during a technological disaster. Electronic security engineering means your valuable records will remain untouchable. Automated Processes In business, people look for ways to do more work in a shorter amount of time. Information technology improves your company’s efficiency by developing automated processes to take burden off your staff. In turn, your employees are free to work on other things while the computer runs their reports, creates queries, tracks projects and monitors financial. Work Remotely IT systems give you remote access to your company’s electronic network, so that you can work from home or on the road.

This accessibility allows you to increase your productivity because you can still get work done, even when you aren’t physically in the office. Communication Communication is essential to the business world, and information technology gives our company the resources it needs to communicate quickly and effectively. Your IT department can hook your employees up with email, video conferencing equipment and internal chat rooms, so that they always have an efficient way to conduct business and communicate. Question 4 A. There are several methods the digital firm can use to piece together is disparate systems. Explain three(3) of them 1. Enterprise Application I.

Enterprise Applications Services for Microsoft Enables you to achieve your critical customer-facing business outcomes by offering flexible CRM solutions, including deployment models (including cloud), customer- acing functions, user interfaces, project flexibility types and financing structures through HP Financial Services. Dynamics CRM services offer you tremendous flexibility to optimize your front office departments – Marketing, Sales, and Customer Service – and effectively integrate with your back office to enhance personalization and retention with customers and consumers, increase transparency and accountability with citizens and constituencies, and improve business relationships with vendors and suppliers. It.

Enterprise Applications Services for Oracle Remove complexity and inefficiencies from your system so you can take advantage of ewe and updated software from Oracle and provide full lifestyle services and support for Oracle applications. When your software package is properly aligned in your business environment, you gain the ability to respond to changing market conditions. Iii. Enterprise Application Services for SAP In a fast-paced business environment, your SAP solution is a mission-critical investment. It drives efficiencies, helps manage customer relations, supports analytics, and enables intelligent decisions-?unless years of add-ones and expansions have rendered it obsolete. Outdated software is not only inflexible; it can hinder your efforts to achieve flexibility and increase productivity. B.

Briefly Explain the below terms I. DB’S A database management system (DB’S) is a collection of programs that enables you to store, modify, and extract information from a database. There are many different types of Dobbs, ranging from small systems that run on personal computers to huge systems that run on mainframes. The following are examples of database applications: computerized library systems automated teller machines flight reservation systems computerized parts inventory systems I’. DAML A data manipulation language (DAML) is a family of syntax elements similar to a imputer programming language used for selecting, inserting, deleting and updating data in a database.

Performing read-only queries of data is sometimes also considered a component of DAML. Iii. ODL A data definition language or data description language (ODL) is syntax similar to a computer programming language for defining data structures, especially database schemas. ‘v. SQL (Structured Query Language) Many data description languages use a declarative syntax to define fields and data types. SQL, however, uses a collection of imperative verbs whose effect is to modify he schema of the database by adding, changing, or deleting definitions of tables or other objects. These statements can be freely mixed with other SQL statements, so the ODL is not truly a separate language. V.

Data Dictionary A data dictionary, as defined in the IBM Dictionary of Computing, is a “centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format. “[l] The term can have one of several closely related meanings pertaining to databases and database management systems (DB’S): A document describing a database or collection of databases An integral component of a DB’S that is required to determine its structure A piece of middleware that extends or supplants the native data dictionary of a DB’S Answer 5 AY . Discuss the various network topologies. Which would you use for a small business with 10 computers? I.

Star topology In the star network topology, there is a central computer or server to which all the workstations are directly connected. Every workstation is indirectly connected to every other through the central computer. I’. Ring topology In the ring network topology, the workstations are connected in a closed loop infuriation. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more intermediate nodes. Iii. Bus topology In the bus network topology, every workstation is connected to a main cable called the bus. Therefore, in effect, each workstation is directly connected to every other workstation in the network. AY.

Small business with 10 computers can be set up in local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. In Star topology every node (computer arrogation or any other peripheral) is connected to central node called hub or switch. The switch is the server and the peripherals are the clients. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement.