Wednesday, April 27, 2011

Tutorial Questions: Chapter Seven

1. Explain the business benefits of using wireless technology.
There are many benefits offered by wireless technology; these include ease of use, tidy work areas, greater efficiency and effective communication between networks and nodes. People now have the ability to access the internet without the need for Ethernet cables. Contemporary mobile phones allow many to stay in constant communication between colleagues and loved ones. It is because of advanced wireless technology people constantly connected and have the ability to interact between work colleagues and conduct business in between working hours.

2. Describe the business benefits associated with VoIP.
Voice over IP (VoIP) uses IP technology to transmit voice calls over internet protocol. VoIP enabled phone calls, faxes, voicemail and conferences over digital networks. It can be argued that VoIP saves money for businesses as VoIP communication is not as expensive as traditional methods of voice communication; VoIP does not attract telecommunication charges. An example of a VoIP benefit for businesses include, Windows installer/MSI package makes it easy to roll out the application to multiple machines and the Skype for Business Control Panel that allows administrators to manage all of a company’s Skype accounts from a centralised interface.

3. Compare LANs and WANs
There is a simple difference between a LAN network and a WAN network. A local area network (LAN) has the ability to connect nodes that reside within a single local area network; a LAN network only connects a network of computers within a small geographical area. A wide area network has the capacity to connect computers within a large geographical radius.



4. Describe RFID and how it can be used to help make a supply chain more effective.
Radio frequency identification are tags that use radio waves to transmit data, they are heavily used in inventory tracking they may eventually replace barcodes. RFID can be mass produced at a very low cost, therefore cheaper for the business in production. There are several ways for businesses can improve the effectiveness of their supply chain. Manufacturers can improve supply chain planning and execution by incorporating RFID. Retailers use RFID to control theft, increase efficiency in their supply chains and improve demand planning. Lastly, pharmaceutical manufacturers use REID systems to combat the counterfeit drug trade and reduce errors in filling prescriptions. (Baltzan et al, 2010)


5. Identify the advantages and disadvantage of deploying mobile technology
Several advantages for deploying mobile technology is the greater level of communication between colleagues and loved ones. There is a higher level of efficiency as there is constant contact. Mobile technology provides users with greater entertainment while on the move, for example the availability of social networking sites and mobile TV. GSP systems have been integrated into mobile phone technology providing people with handy details without the need for a separate GSP unit. A disadvantage in deploying mobile technology is the expense incurred by those using these mobile applications. For example mobile TV provided by Telstra costs 50 cents per clip and $5.00 for an episode, or monthly subscriptions at various rates.

Tutorial Questions: Chapter Six

1. List, describe, and provide an example of each of the five characteristics of high quality information.
High quality information can be characterised into five categories. These characteristics can be identified as accuracy, completeness, consistency, uniqueness and timeliness.
1.      Accuracy- the information must be checked to ensure that it is accurate and correct. For example, the spelling of the document is correct and the information is composed in a logical way. In a Spread sheet document, data must be accurate and avoid data redundancy.
2.      Completeness- Data and information must always be complete in order for it to make sense and assist an enterprise in its decision making processes. In a spread sheet document, all fields must contain valid data. For example, names and addresses must be included in each record which requires this information.
3.      Consistency- a characteristic involves information which is consistent as a whole. For example, an essay must contain an argument which is present throughout the whole document.
4.      Uniqueness- involves differences within each cell of a spread sheet. It is important that no cell is the same as another, as data redundancy can occur.
5.      Timeliness- Data and information within a business must be up-to-date with the changes of a growing and dynamic business. For example, customer information such as house addresses must be updated to ensure that the customer is informed with business updates and vice versa.
2. Define the relationship between a database and a database management system.
A database is it system which has the ability to store key business information and has a purpose to organise a collection of business data; whereas, a database management system (DBMS) is a group of programs that has the ability to manipulate and organise the data. A DBMS is the computer program used to manage and query that data located on the database, E.g. Oracle. The DBMS is a useful tool for businesses as it allows employees to identify trends and manipulate the data so it can be applied into the decision making process.

3. Describe the advantages an organisation can gain by using a database.
There are many advantages that an organisation can gain when the business is using a database system. For example, Business and customer information is easily organised and this particular data can be analysed into meaningful charts and graphs. Database application can also provide businesses with certain decision making skills such as, goal seeks and what-if analysis. These tools can offer enterprises with a competitive advantage as they assist in the decision making process. A database may also help organisations identify certain market trend through the data mining system; these trends include the number of sales expected by a business during a particular time in the year. Therefore, employees may act accordingly and respond to these generated trends, for example, increasing the number of items manufactured during this time to keep up with consumer demand.
4. Define the fundamental concepts of the relational database model.
The fundamental components of a relational database are entities and attributes. An entity is a person, transaction or event which has the ability to store and receive information. An attribute are characteristics or properties of an entity class. A relational database is a series of two dimensional tables that link to each other through primary and foreign keys. Once these relationships are formed the tables has the ability to “talk” and interactive with each other.
5. Describe the benefits of a data-driven website.
A data driven website has many advantages in the operation of an organisation. A data driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database. The customers have the ability to search particular criteria in the website and the database runs a query to reach the required information. The benefits of a data driven website are business development, content management, the ability to minimise human error, more efficient and improve business stability.
6. Describe the roles and purposes of data warehouses and data marts in an organisation.
Data warehouses are a logical collection of information, gathered from many different operational databases that support business analysis activities and decision making tasks. The primary purpose of a data ware house is to aggregate information throughout an organisation into a single repository for decision making purposes. A data mart contains a subset of data warehouse information. To distinguish between data warehouses and data marts, think of data warehouses as having more organisational focus and data marts having focused information subsets particular to the needs of a given business unit such as finance or production and operations. (Baltan, et al, 2010)  



Tuesday, April 26, 2011

Tutorial Questions: Chapter Five

1.     What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?
Information architecture can be identified as the operation which identifies how and where important information is maintained and secured. Infrastructure architecture includes the hardware and software and telecommunications and equipment, that when combines, provides the underlying foundation to support the organisation's goals.
2.     Describe how an organisation can implement a solid information architecture 
The three primary areas of information architecture include: backup and recovery, disaster recovery and information security. In order for a business to implement a solid information architecture system these three elements must be involved.
Backup and recovery is a significant procedure to implement into a business’s operations, this is because important business data is too significant to lose when a system failure occurs. Backup and recovery means the business’s ability to create copies of information and data and their ability to retrieve it in case of system failure. Grandfather, Father, Son is a common backup system used by many businesses to back up their important data.
Disaster recovery can be a plan or a cost curve designed to aid the business in the event of a disaster. Disaster recovery plan, disaster recovery cost curve and business continuity planning are all plans which can be implemented by a business to ensure the safety of their information and data during an event of a disaster.
Information security refers to the safety of a business information system. Implementing passwords, antivirus software, firewalls and biometric devices will ensure the safety and security of the system. 

3.     List and describe the five requirement characteristics of infrastructure architecture.
·         Flexibility- systems must have to ability to be flexible and adapt to the changes of the business. For example, the business may decide to implement a new TPS, as a result the software of the system must be updated quickly to suit the new TPS requirements.
·         Scalability- can be identified as the ability of the system to adapt to increased demands.
·         Reliability- the system and its components must always be operating efficiently with a limited amount of system failure.
·         Availability- The system should be available to access by all authorised users whenever desired.
·         Performance- Is the system’s ability to carry out transactions or other significant processes.

4.     Describe the business value in deploying service oriented architecture.
Service orientated architecture can be identified as a business IT approach which mainly focuses on repeated processes or services. Service orientated architecture assists businesses in carrying out these specific processes and has the ability to adapt quickly, easily and economically to support the dynamic nature of an enterprise. There are several benefits for businesses implementing a service orientated architecture. E.g. SOA allows businesses to plug in new services or upgrade existing services in a large fashion, therefore helping businesses to address new system requirements quickly and efficiently.  
5.     What is an event? 
An event can be expressed as the eyes and ears of a business and has the ability to alert those responsible about a significant change in data. An event has the ability to detect any threats or opportunities within the business and report to those who, in turn act on the information and act accordingly.   
6.     What is a service?
A service can be identified as software products. They must have a user friendly interface so they can be used by a broad audience; they must also have the infrastructure architecture characteristics because they have a large impact on a business’s productivity. A few examples of contemporary service forms are ‘credit checks’ and ‘customer information’. These services are essential to businesses as they are accountable for carrying out simple yet significant business operations and tasks.
7.     What emerging technologies can companies can use to increase performance and utilise their infrastructure more effectively?
Two emerging technologies that companies can use to increase performance and utilise their infrastructure more effectively are web services and open systems.
Web services are a medium used to share data and information between shared protocols and standards. With the use of web services, businesses have more interoperability as two or more systems can share data and resources within a network even if the hardware and software are made by different manufacturers. According to Baltzan (et al, 2010) web services encompass all the technologies that are used to transmit and process information on and across a network, most specifically the internet.
Open systems can be identified as a non-proprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate the (Baltzan et al, 2010). This emerging technology can increase performance as they allow for greater information sharing.


Sunday, April 3, 2011

Tutorial Questions: Chapter Four

1.       Explain the ethical issues sounding information technology.
There are many ethical issues surrounding information technology as many people have the ability to misuse the resources available to them. Privacy, data accuracy and property issues are just a few issues which are relevant to technology use. In relation to privacy issues it is important for companies to always keep data secure within their system; hackers and criminals are able to access private business information and data and use it illegally. In relation to data accuracy, it is important for data to be kept up to date in order to avoid data inaccuracy and data redundancy. It is significant for checks to be implemented to ensure that malicious activity is exposed. Property issues, in essence relate to the misuse or unauthorised access to information belonging to another person. It is important for data to be secure to ensure that only the appropriate people can see and access specific information.

(accessed 3/4/11)

2.       Explain a situation involving technology that is ethical but illegal.
A web designer may be commissioned by a business to design a web page for the enterprise. The web designer decides to research the company and its competitors. The designer finds a page of one of the rival companies. The designer copies the layout and structure of the page. The designer also copies the text of the rival company’s page but manages to turn it into his own words. This action may appear to be ethical however, his acts may be recognised as intellectual theft, which, in turn is against the law. This is an example of a situation which involves technology that is ethical but illegal.

3.       Describe and explain one of the computer use policies that a company might employ.
One computer use policy that a company might employ is information security. Information security is a must in all businesses as it is all too easy for a hacker or a criminal to access confidential business data and use it maliciously. A business must implement appropriate procedures such as downloading firewalls, antivirus software etc to stop people from gaining unauthorised access into company files. Data in an organisation may include the details of customers, therefore the company has a duty of care to the customers the ensure the security of their personal information.
4.       What are five main technology security risks?
·         Human Error
·         Natural disasters
·         Technical failures
·         Deliberate acts
·         Management failure

5.       Outline one way to reduce each risk.
Human error: offer training programs
Natural disasters: Store important information and data offsite to avoid natural disasters that may occur on company property, constantly back up the systems data and information
Technical failures: constantly upgrade systems and ensure the maintenance of these systems. Ensure that the company has a skilled IT department to manage any IT problems that may occur.
Deliberate acts: maintain computer systems, ensure password changes and monitor employee actions to make sure there is nothing suspicious occurring inside the organisation.
Management failure: Training programs; ensure that all employees are up to date with system changes. Hire only efficient and effective staff.


6.       What is a disaster recovery plan, what strategies might a firm employ?
A disaster recovery plan is a procedure developed by the firm to ensure the security and integrity of their data. Several appropriate strategies that a firm might employ are: Keep important business data off site, implement training programs for staff, ensure the maintenance of information and data, implement appropriate backup procedures, for example the ‘grandfather, father, son’ method.