Beruflich Dokumente
Kultur Dokumente
ASSIGNMENT A
Q.1 Information systems can add great value to businesses What are
the benefits
of information systems in business? Why are information systems
important?
Ans
(ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services
between businesses, groups and individuals and can be seen as one of the essential activities of any business.
Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business
with individuals, groups and other businesses.[1] The term "e-business" was coined by IBM's marketing and
Internet teams in 1996.[2][3]
Electronic business methods enable companies to link their internal and external data processing systems more
efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and
expectations of their customers. The internet is a public through way. Firms use more private and hence more
secure networks for more effective and efficient management of their internal functions. In practice, e-business is
more than just e-commerce. While e-business refers to more strategic focus with an emphasis on the functions
that occur using electronic capabilities, e-commerce is a subset of an overall e-business strategy. E-commerce
seeks to add revenue streams using the World Wide Web or the Internet to build and enhance relationships with
clients and partners and to improve efficiency using the Empty Vessel strategy. Often, e-commerce involves the
application of knowledge management systems.
E-business involves business processes spanning the entire value chain: electronic purchasing and supply chain
management, processing orders electronically, handling customer service, and cooperating with business
partners. Special technical standards for e-business facilitate the exchange of data between companies. Ebusiness software solutions allow the integration of intra and inter firm business processes. E-business can be
conducted using the Web, the Internet, intranets, extranets, or some combination of these.
Basically, electronic commerce (EC) is the process of buying, transferring, or exchanging products, services,
and/or information via computer networks, including the internet. EC can also be beneficial from many
perspectives including business process, service, learning, collaborative, community. EC is often confused with
e-business.
higher degree of accuracy. While its true employees still play an importance role in ensuring data is
entered correctly, once entered in the program, the management information system can effectively
increase efficiency and data integrity.
With proper planning a company can maximize profit while decreasing overhead costs. Implementing a
new system typically comes with a large price tag, but if business requirements and processes are
properly and accurately identified, the payoffs can be big.
Investing in information systems keeps a business competitive and helps an organization carry the
ability to maintain visible status in the global economy. Without IS, a business will more than likely fall
rapidly behind.
The benefits of integrating technology within an organization can truly be limitless depending on the
level of creativity, strategic planning and innovation in the decision making processes.
structured representation of the functions (activities, actions, processes, operations) within the
modeled system or subject area.[1]A function model, similar with the activity model or process model, is a
graphical representation of an enterprise's function within a defined scope. The purposes of the function model
are to describe the functions and processes, assist with discovery of information needs, help identify
opportunities, and establish a basis for determining product and service costs
Functional perspective[edit]
In systems engineering and software engineering a function model is created with a functional modeling
perspective. The functional perspective is one of the perspectives possible in business process modelling, other
perspecifives are for example behavioural, organisational or informational.[10]
A functional modeling perspective concentrates on describing the dynamic process. The main concept in this
modeling perspective is the process, this could be a function, transformation, activity, action, task etc. A wellknown example of a modeling language employing this perspective is data flow diagrams.
The perspective uses four symbols to describe a process, these being:
External Entity: External to the modeled system, but interacts with it.
Now, with these symbols, a process can be represented as a network of these symbols. This decomposed
process is a DFD, data flow diagram.
In Dynamic Enterprise Modeling a division is made in the Control model, Function Model, Process
model and Organizational model.
Functional decomposition[edit]
Functional decomposition refers broadly to the process of resolving a functional relationship into its constituent
parts in such a way that the original function can be reconstructed from those parts by function composition. In
general, this process of decomposition is undertaken either for the purpose of gaining insight into the identity of
the constituent components, or for the purpose of obtaining a compressed representation of the global function, a
task which is feasible only when the constituent processes possess a certain level of modularity.
Functional decomposition has a prominent role in computer programming, where a major goal is
to modularize processes to the greatest extent possible. For example, a library management system may be
broken up into an inventory module, a patron information module, and a fee assessment module. In the early
decades of computer programming, this was manifested as the "art of subroutining," as it was called by some
prominent practitioners.
Functional decomposition of engineering systems is a method for analyzing engineered systems. The basic idea
is to try to divide a system in such a way that each block of the block diagram can be described without an "and"
or "or" in the description.
This exercise forces each part of the system to have a pure function. When a system is composed of pure
functions, they can be reused, or replaced. A usual side effect is that the interfaces between blocks become
simple and generic. Since the interfaces usually become simple, it is easier to replace a pure function with a
related, similar function.
Porter five forces analysis is a framework for industry analysis and business strategy development. It
draws upon industrial organization (IO) economics to derive five forces that determine the competitive intensity
and therefore attractiveness of a market. Attractiveness in this context refers to the overall industry profitability.
An "unattractive" industry is one in which the combination of these five forces acts to drive down overall
profitability. A very unattractive industry would be one approaching "pure competition", in which available profits
for all firms are driven to normal profit.
Three of Porter's five forces refer to competition from external sources. The remainder are internal threats.
Porter referred to these forces as the micro environment, to contrast it with the more general term macro
environment. They consist of those forces close to a company that affect its ability to serve its customers and
make a profit. A change in any of the forces normally requires a business unit to re-assess the marketplace given
the overall change in industry information. The overall industry attractiveness does not imply that every firm in the
industry will return the same profitability. Firms are able to apply their core competencies, business model or
network to achieve a profit above the industry average. A clear example of this is the airline industry. As an
industry, profitability is low and yet individual companies, by applying unique business models, have been able to
make a return in excess of the industry average.
Porter's five forces include - three forces from 'horizontal' competition: the threat of substitute products or
services, the threat of established rivals, and the threat of new entrants; and two forces from 'vertical'
competition: the bargaining power of suppliers and the bargaining power of customers.
This five forces analysis, is just one part of the complete Porter strategic models. The other elements are
the value chain and the generic strategies.[citation needed]
Porter developed his Five Forces analysis in reaction to the then-popular SWOT analysis, which he found
unrigorous and ad hoc.[1] Porter's five forces is based on the Structure-Conduct-Performance paradigm in
industrial organizational economics. It has been applied to a diverse range of problems, from helping businesses
become more profitable to helping governments stabilize industries Functional perspective[edit]
In systems engineering and software engineering a function model is created with a functional modeling
perspective. The functional perspective is one of the perspectives possible in business process modelling, other
perspecifives are for example behavioural, organisational or informational.[10]
A functional modeling perspective concentrates on describing the dynamic process. The main concept in this
modeling perspective is the process, this could be a function, transformation, activity, action, task etc. A wellknown example of a modeling language employing this perspective is data flow diagrams.
The perspective uses four symbols to describe a process, these being:
External Entity: External to the modeled system, but interacts with it.
Now, with these symbols, a process can be represented as a network of these symbols. This decomposed
process is a DFD, data flow diagram.
In Dynamic Enterprise Modeling a division is made in the Control model, Function Model, Process
model and Organizational model.
Functional decomposition[edit]
Functional decomposition refers broadly to the process of resolving a functional relationship into its constituent
parts in such a way that the original function can be reconstructed from those parts by function composition. In
general, this process of decomposition is undertaken either for the purpose of gaining insight into the identity of
the constituent components, or for the purpose of obtaining a compressed representation of the global function, a
task which is feasible only when the constituent processes possess a certain level of modularity.
Functional decomposition has a prominent role in computer programming, where a major goal is
to modularize processes to the greatest extent possible. For example, a library management system may be
broken up into an inventory module, a patron information module, and a fee assessment module. In the early
decades of computer programming, this was manifested as the "art of subroutining," as it was called by some
prominent practitioners.
Functional decomposition of engineering systems is a method for analyzing engineered systems. The basic idea
is to try to divide a system in such a way that each block of the block diagram can be described without an "and"
or "or" in the description.
This exercise forces each part of the system to have a pure function. When a system is composed of pure
functions, they can be reused, or replaced. A usual side effect is that the interfaces between blocks become
simple and generic. Since the interfaces usually become simple, it is easier to replace a pure function with a
related, similar function.
The block diagram can use additional schematic symbols to show particular properties.
Specific function block diagram are the classic Functional Flow Block Diagram, and the Function Block
Diagram (FBD) used in the design of programmable logic controllers.
generally portable across different DBMS, but different DBMSs can by using standards such
as SQL and ODBC or JDBC to allow a single application to work with more than one database. A "database
management system" (DBMS) is a suite of computer software providing the interface between users and a
database or databases. Because they are so closely related, the term "database" when used casually often
refers to both a DBMS and the data it manipulates.
Outside the world of professional information technology, the term database is sometimes used casually to refer
to any collection of data (perhaps a spreadsheet, maybe even a card index). This article is concerned only with
databases where the size and usage requirements necessitate use of a database management system.[1]
The interactions catered for by most existing DBMS fall into four main groups:
Data definition. Defining new data structures for a database, removing data structures from the
database, modifying the structure of existing data.
Retrieval. Obtaining information either for end-user queries and reports or for processing by
applications.
Administration. Registering and monitoring users, enforcing data security, monitoring performance,
maintaining data integrity, dealing with concurrency control, and recovering information if the system fails.
A DBMS is responsible for maintaining the integrity and security of stored data, and for recovering information if
the system fails.
Both a database and its DBMS conform to the principles of a particular database model.[2] "Database system"
refers collectively to the database model, database management system, and database.[3]
Physically, database servers are dedicated computers that hold the actual databases and run only the DBMS and
related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk
arrays used for stable storage. RAID is used for recovery of data if any of the disks fails. Hardware database
accelerators, connected to one or more servers via a high-speed channel, are also used in large volume
transaction processing environments. DBMSs are found at the heart of most database applications. DBMSs may
be built around a custommultitasking kernel with built-in networking support, but modern DBMSs typically rely on
a standard operating system to provide these functions.[citation needed] Since DBMSs comprise a
significant economical market, computer and storage vendors often take into account DBMS requirements in
their own development plans.[citation needed]
Databases and DBMSs can be categorized according to the database model(s) that they support (such as
relational or XML), the type(s) of computer they run on (from a server cluster to a mobile phone), the query
language(s) used to access the database (such as SQL or XQuery), and their internal engineering, which affects
performance, scalability, resilience, and security.
ASSIGNMENT B
Q.1 What is Artificial Intelligence? What is the need for AI in todays world?
Ans
Artificial intelligence (AI) is technology and a branch of computer science that studies and develops
intelligent machines and software. Major AI researchers and textbooks define the field as "the study and design
of intelligent agents",[1] where an intelligent agent is a system that perceives its environment and takes actions
that maximize its chances of success.[2] John McCarthy, who coined the term in 1955,[3] defines it as "the science
and engineering of making intelligent machines".[4]
AI research is highly technical and specialised, and is deeply divided into subfields that often fail to communicate
with each other.[5] Some of the division is due to social and cultural factors: subfields have grown up around
particular institutions and the work of individual researchers. AI research is also divided by several technical
issues. Some subfields focus on the solution of specific problems. Others focus on one of several
possible approaches or on the use of a particular tool or towards the accomplishment of particular applications.
The central problems (or goals) of AI research include reasoning, knowledge, planning, learning,
communication, perception and the ability to move and manipulate objects.[6] General intelligence (or "strong AI")
is still among the field's long term goals.[7] Currently popular approaches include statistical
methods, computational intelligence and traditional symbolic AI. There are an enormous number of tools used in
AI, including versions of search and mathematical optimization, logic, methods based on probability and
economics, and many others.
The field was founded on the claim that a central ability of humans, intelligencethe sapience of Homo sapiens
can be so precisely described that it can be simulated by a machine.[8] This raises philosophical issues about
the nature of the mind and the ethics of creating artificial beings, issues which have been addressed
by myth, fiction and philosophy since antiquity.[9] Artificial intelligence has been the subject of tremendous
optimism[10] but has also suffered stunning setbacks.[11] Today it has become an essential part of the technology
industry and many of the most difficult problems in computer science
Case Study
MR Ltd. Manufactures industrial glues and solvents in a ingle large factory.
Approximately
400 different inputs are used to produce 35vspecialist outputs, which range from
ultrastrong
glue used in aircraft manufacture to high impact adhesives that are required on
construction sites.
Two years ago, with the company only just breaking even, the directors
recognized the need
for more information to control the business. To assist them with their strategic
control of
the business, they decided to establish an MIS. This is now operational but
provides only the
following limited range of information to the directors via their networked
computer
system.
1. A summary business plan for this and the next two years. The plan includes
details
of expected future incomes and expenditures on existing product lines. It was
produced by a new member of the accounting department without reference to
past production data.
2. Stock balances on individual items of raw materials, finished goods etc. This
report
is at a very detailed level and comprises 80% of the output from the MIS itself
3. A summary of changes in total demand for glues and solvents in the market
place
for the last five years. This information is presented as a numerical summary in
six
different sections. Each selection takes up one computer screen so only one
section can be viewed at a time.
Read the above case and answer the following questions:
1. (i) Comment on the weaknesses in the information currently being provided
to the
directors of the company
(ii) Suggest how the information may be improved, with particular
reference to other
outputs, which the MIS might usefully provide to the directors.
Ans 1) Communications Commission of Kenya (CCK) is a state owned corporation that is responsible for
ensuring fair play in the airwaves. It is the independent regulatory authority for the communications industry in
Kenya. Its role is to license and regulate telecommunications, radiocommunication and postal/courier services in
Kenya. It also issues licenses to ISP's Internet Service Providers as well as other communication devices that go
beyond unlicensed frequencies. It is responsible for developing and co-ordinating the policies and strategies with
respect to development and operation of telecommunications services in Kenya.
It was established in February 1999, when the Kenya Post & Telecommunication Corporation (KP&TC), was split
into CCK, the Postal Corporation of Kenya (CCK) and Telkom Kenya.[1]
The Kenya Communications Act No. 2 of 1998 unbundled the Kenya Postal and Telecommunications Corporation
(KPTC) into five separate entities: the Communications Commission of Kenya (CCK), which is the regulator; the
National Communications Secretariat (NCS), which serves as the policy advisory arm of the government on all
matters pertaining to the information and communications sector; the fixed-line operator, Telkom; the Postal
Corporation of Kenya (POSTA); and a Communications Appeals Tribunal.[2]
In recognition of the rapid changes and developments in technology which have blurred the traditional
distinctions between telecommunications, Information Technology (IT) and broadcasting, the Government in
January 2009 enacted the Kenya Communications (Amendment) Act 2009. This statute enhanced the regulatory
scope and jurisdiction of CCK, and effectively transformed it to a converged regulator.
2.
Ans
systems in 1982-83 by Dr. Charles Wiseman, President of a newly formed consultancy called "Competitive
Applications," (cf. NY State records for consultancies formed in 1982) who gave a series of public lectures on SIS
in NYC sponsored by the Datamation Institute, a subsidiary ofDatamation Magazine.
In 1985 Wiseman published an article on this subject (co-authored by Prof. Ian MacMillan) in the Journal of
Business Strategy (Journal of Business Strategy, fall, 1984)
In 1985 he published the first book on SIS called "Strategy and Computers: Information Systems as Competitive
Weapons" (Dow-Jones Irwin, 1985; translated into French by Bertrand Kaulek and into Italian by Professor Fabio
Corno of Bocconi University). In 1988 an expanded version of this book called "Strategic Information Systems"
was published by Richard D. Irwin. This book was translated into Japanese by Professor Shinroki Tsuji and
published by Diamond Publishing. Over 50,000 copies have been sold.
The following quotations from the preface of the first book ("Strategy and Computers: Information Systems as
Competitive Weapons") establishes the basic idea behind the notion of SIS:
"I began collecting instances of information systems used for strategic purposes five years ago, dubbing them
"strategic information systems" (Internal Memo, American Can Company(Headquarters), Greenwich, CT, 1980).
But from the start I was puzzled by their occurrence. At least theoretically I was unprepared to admit the
existence of a new variety of computer application. The conventional view at the time recognized
only management information systems, and management support systems, the former used to satisfy the
information needs and the latter to automate basic business processes of decision makers. (Cf. articles by
Richard Nolan, Jack Rockart, Michael Scott Morton, et al. at that time)...But as my file of cases grew, I realized
that the conventional perspective on information systems was incomplete, unable to account for SIS. The
examples belied the theory,and the theory in general blinded believers from seeing SIS. Indeed, some
conventional information systems planning methodologies, which act like theories in guiding the systematic
search for computer application opportunities, exclude certain SIS possibilities from what might be found. (ibid.)"
"This growing awareness of the inadequacy of the dominant dogma of the day led me to investigate the
conceptual foundations, so to speak, of information systems. At first, I believed that the conventional gospel could
be enlarged to accommodate SIS. But as my research progressed, I abandoned this position and concluded that
to explain SIS and facilitate their discovery, one needed to view uses of computer (information) technology from a
radically different perspective."
"I call this the strategic perspective on information systems (technology). The chapters to follow present my
conception of it. Written for top executives and line managers, they show how computers (information
technology) can be used to support or shape competitive strategy."
Most of the second book, Strategic Information Systems, was exposed from 1985 to 1988 to MBA students at
the Columbia University Graduate School of Business and to a large number of practitioners seeking to apply SIS
concepts to disparate industry settings. Since that time the concept has stimulated journals on the
subject, dissertations, and extensive critical research. (References: search Google Scholar, Clusty, et al. using
the terms: Strategic Information Systems, SIS, Charles Wiseman, et al.)
Assignment c
Q.1 The flow of information through MIS is
(a) structure dependent
(b) need dependent
(c) organization dependent
(d) market dependent
Q.2 The back bone of any organization is
(a) services
(b) employee
(c) information
(d) infrastructure
Q.3 MIS helps the organization in
(a) process of placement
(b) process of decision making
(c) process of production
(d) process of distribution
(a) snooping.
(b) social engineering.
(c) spoofing.
(d) spamming.
Q.21 Every record in a file should contain:
(a) more than one field.
(b) an entry in the key field.
(c) at least one numeric field.
(d) a denominating stabilizer.
Q. 22
The confusion created by data redundancy makes it difficult for companies to:
(a) create online processing capabilities.
(b) work in batch processing load.
(c) use a distributed database.
(d) integrate data from different sources.
Q.23 Data redundancy occurs when:
(a) multiple reports are accessed simultaneously.
(b) the programs that access the data are changed.
(c) different users enter information.
(d) fields in many different files contain the same information.
Q.24 A field is also called a(n):
(a) attribute.
(b) data element.
(c) Characteristic.
(d) entity-relationship.
Q.25 This database model uses a series of logically related two-dimensional tables or files to
store information:
(a) relational database
(b) hierarchical database
(c) network database
(d) object-oriented database
Q.26 The capacity for manipulating and analyzing large volumes of data from multiple
perspectives is called:
(a) OLAP.
(b) OODBMS.
(c) normalization.
(d) data cubing
Q. 27
In the early years, the information systems group was composed mostly of:
(a) where managers initiate activities, handle disturbances, allocate resources, and negotiate
conflict.
(b) where managers act as figureheads and leaders for the organization.
(c) where managers act as a liaison, disseminating and allocating resources.
(d) the expectations of the activities that managers should perform in an organization.
35 This individual is credited with the development of the five forces competitive model.