Sunday, October 31, 2010

Week 8 Questions

1.
http://www.youtube.com/watch?v=UjGfUZU_99g

Wireless enables more freedom on where organisations can operate.

2.
Allows the internet to carry voice in digital format, call costs have dramatically decreased as the international calls are now internet connections. This means that business's have a more cost effective way of making calls and also enables them to operate from different locations around the world at a cheaper price. For examples to call centers in India.

3.
Local area networks (LANs) connect computers that reside in a single geographic location on the premises of the company that operates the LAN. How ever WAN operate over a wider area. For example any company that have offices in different cities will use a WAN to connect data from the various offices.

4.
Passive RFID – no internal power, can pick up the very faint signal from an antenna, power up just enough to transmit data back to antenna. Can also store small amount of EPROM data. Active RFID – have power and transmit much stronger and accurate data.

Week 7 Questions

1.
Accuracy: Are all the values correct in the data correct and accurate.
Completeness: Are all the values complete in the data.
Consistency: Is the aggregate or summary information in agreement with detailed information.
Uniqueness: Is each transaction, entity, and event represented only once in the information.
Timeliness: Is the information Current with respect to the business requirements.

2.
A Database is a organised collection of data where a database management system (DBMS)is a group of programs that manipulate the database and provide an interface between the database and its users and other application programs.

3.
Databases can help prevent the following
Data redundancy: The same data are stored in many places.
Data isolation: Applications cannot access data associated with other applications.
Data inconsistency: Various copies of the data do not agree.
Datebases also ensure the following
Data security: Keeping the organization’s data safe from theft, modification, and/or destruction.
Data integrity: Data must meet constraints (e.g., student grade point averages cannot be negative).
Data independence: Applications and data are independent of one another. Applications and data are not linked to each other, meaning that applications are able to access the same data.

http://www.youtube.com/watch?v=KqvIGYjcLQ4&feature=related

4.
A relational database is a collection of tables from which data can be accessed in many different ways without having to reorganize the database tables.

5.
Data-driven websites are an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database. The advantages of a data-driven website are as follows:
Development
Content management
Future expandability
Minimising human error
Cutting production and update costs
More efficient
Improved stability
Real time info like stock levels & price changes

6.
The primary purpose of a data warehouse is to aggregate information throughout an organisation into a single repository for decision-making purposes

Monday, October 18, 2010

Week 6 Questions

1.

Information architecture is a general plan of how IT is to be used by/within an organisation – useful for planning

Information infrastructure is the actual implementation that will provide for effective Information Systems, including the hardware, software, services and people involved.

You use information architecture to plan and then use the information infrastructure to implement the planed information systems.

2.

To implement a solid information architecture a organisation should concentrate on 1. back up and recovery, 2. disaster recovery and 3. Information security.

3.

The 5 required characteristics of infrastructure architecture is.
Flexibility: systems must be flexible enough to meet all types of business changes.
Scalability: how well a system can adapt to increased demands.
Reliability: ensures all systems are functioning correctly and providing accurate information.
Availability: when systems can be accessed by users, preferably for long periods of time.
Performance: how quickly a system performs a certain process or transaction.

4.

A Service oriented architecture allows enterprises to plug in new services or upgrade existing services in a granular fashion. This means they will respond more quickly and more cost-effectively to changing market-conditions.

5.

Events are the eyes and ears of the business expressed in technology. They detect threats and opportunities and alert those who can act on the information. Uses IT systems to monitor a business process for events that matter.

6.

Services are more like software products than they are coding projects. They must appeal to a broad audience and they need to be reusable if they are going to have an impact on productivity.

Monday, October 11, 2010

Week 5 Questions

1.

There are 4 main technology related ethical issues. They are:
A. Intellectual property: Intangible creative work that is embodied in physical form
B. Copyright: The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
C. Fair use doctrine: In certain situations, it is legal to use copyrighted material
D. Pirated software: The unauthorized use, duplication, distribution, or sale of copy righted software.
E. Counterfeit software: Software that is manufactured to look like the real thing.

There is also the issue of privacy. Privacy is an issue as people have right to be left alone when they wish to be. Privacy is one of the prime barriers to the growth of e-business as many people can not accept the trust required in the privacy issues that needs to be accepted for e-business to grow.

2.

An example of a practice that would fall into the 2nd quadrant of the Acting ethically and legally are not always the same figure 4.4 (Essentials of Information systems, 134) is if you were to buy a copy of a software program and then make a copy of it (which is illegal) as a back up copy for yourself this would be considered ethical but is also illegal.

3.

An ethical computer use policy will contain general principles to guide computer user behaviour. An example of one of these policies is acceptable use policy which is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

4.

The 5 main technology security risks are as follows. Human error which is not intentional. Natural disasters unplanned natural occurring events. Technical failures like crashes and bugs. Deliberate acts like sabotage and hacking. Management failure which includes lack of procedures, documentation and training.

5.

To stop deliberate acts of security risks an organisation can implement strong passwords, password changes regularly, system audits, strong penalties for misuse of data and firewalls. This will also cut down human error.

To prevent disasters company's should have information stored off site and all information must be recoverable, with regular recovering testing. This is will help if a hard drive crashes or a bug destroys and computers information.

There is also corporate protection systems available to prevent external hackers entering the site and also will protect against intentional viruses.

6.

In the case that a disaster occurs a company should have a system in place to ensure that all data and information is easily recoverable. To prevent disasters company's should have information stored off site and all information must be recoverable, with regular recovering testing. This is will help if a hard drive crashes or a bug destroys and computers information.