Information Systems and Big Data Analysis - BSC (Hons) Business Management with Foundation

Verified

Added on  2023/06/08

|6
|2216
|350
AI Summary
This article discusses Information Systems and Big Data Analysis in BSC (Hons) Business Management with Foundation. It covers the theories, methods, and techniques related to design and development, definitions and examples of DSS, ESS, TPS, MIS, and KMS, and the definition of globalization and its IT effect. Additionally, it provides examples of digital infrastructure and its advantages and disadvantages, such as mobile telecommunication and cloud computing.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
BSC (Hons) BUSINESS MANAGEMENT WITH
FOUNDATION
SEMESTER 1, EXAMINATION 2021/22
NFORMATION SYSTEM & BIG DATA ANALYSIS
MODULE NO: BMP4005
---------------------------------------------------------------------------------------------------------------
ANSWER BOOKLET
All the pages of the answer booklet should be submitted including blank ones.
Please type your answers in the spaces provided.
Insert additional pages where required.
Student Name
ID Number
[There are TWO sections in the exam paper. Section A has three compulsory questions,
answer all THREE questions. Section B has two optional questions, answer any ONE
question. For each sub-questions, use heading such as “Answer to the Question no. 1(i)”
or “Answer to the Question no. 1(ii)” etc. Start writing you answer from this page (page 2).]
Section A
1.0 Theories, methods and techniques related to design and development
McAfee

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
McAfee is digital security software which has antivirus created to protect computers from
malware in real time and also helps to keep device safe from online threats and viruses. This
software is available for androids, windows, IOS, etc. International standard model highlights the
theory of McAfee development in ISO 27000. This software enables companies to detect malware
in their devices. Availability of virtual private network and PC cleaner are the unique features of
McAfee software (Sakazi, Elovici and Shabtai, 2022). The software has focus on different areas for
security purpose. It focuses on assessment of security risk from third party software which is the
highest risk or threat to personal computers. This software also protects internet accounts and files
from intruders. In today’s world it is very important to protect computers from malpractices and
providing firewall protection to computers and files. All this unique features and functions in
McAfee have made it popular and mostly used security software. The software is developed by
continuous integration or delivery methodology. The software has benefits as it can be used in
windows, androids and IOS devices.
MS Office
MS office is a set of applications which were designed and developed to enable productivity
and completion of tasks in computers. This software is also known as office 365 as files can be
accessed from anywhere because all files can be stored in cloud. It has a totally secured
environment with robust security system. The inclusive design of MS office is the theory behind its
development. This methodology is build for digital environment where there are different range of
people with different perceptive. There is widespread concept of development and design thinking
as it is known to people associated with product area. The focus of designing MS office was to
resolve the problems of users (Yarmolenko, Putintseva and Pisetskaya, 2019). Development of MS
office was made after considering diversity in human and in accordance to the different perspectives
and needs of users. Over a period of time software has developed with many features that have
made work of users very easier and it also has a feature of automatic features up gradation.
2.0 Definition and examples
DSS (Decision support system)
Decision support system is a computer program which enables to improve company’s
decision making ability. This system collects data from different areas and compiles those collected
data and knowledge and provide users with information which is beyond their knowledge or
summaries (Yun Ma and Yang, 2021). DSS serves management, planning and operation level
managements with decision support which help them to solve problems and make decisions on
rapidly changing problems. It includes knowledge based system which enables decision makers to
compile useful information which are used to make appropriate decisions. The examples of DSS are
GPS route planning and ERP dashboards.
ESS (Executive support system)
ESS also known as executive information system is software which is used to transform
enterprise data into quickly accessible enterprise reports. It is a type of management support system
which supports and facilitates senior executives in decision making process (Wandanaya, Iskandar
and Ariansah). It is specialized form of decision support system which is used by top level
executives to analyse and compare important variables. This analysis and comparison enables them
to monitor performance and identify opportunities and problems. The examples of ESS are
Cambridge systematic and ESS developed by Meditech.
Transaction processing system (TPS)
TPS is information processing system which is used to keep track of business transactions
and completion of transactions. It collects, modifies and stores data transactions of enterprise.
Online transaction processing system is also available which is used by online merchants to record
2 of 6
Document Page
business transactions (Wang and Kogan, 2018). For example, TPS enables customer purchasing
through credit cards by collecting card information and communicating with banks for approval or
decline of purchase. Another example, of TPS is hotel reservation system which enables timely
completion of transactions.
Management information system (MIS)
MIS is software which collects data from different sources and compiles them in such a way
which makes it easier for users to understand. The top level management uses MIS to create a report
which provide information that is necessary for taking decisions (Kieser and Kubicek, 2018). The
main purpose of MIS is to take effective and productive decisions. It also facilitates communication
and collaboration. Examples of MIS are payroll processing and order processing.
Knowledge management system (KMS)
Knowledge management system is software which retrieves and stores knowledge which
enables to improve understanding, collaboration and process alignment. KIS is used to help users to
utilize knowledge to effectively and efficiently accomplish tasks (Oseledchik, Ivleva and Ivlev,
2018). It enables users to organize documentation and information in such manner which is easily
accessible to everyone. Community forums and self service portals which are utilized to deliver
intellectual capital are examples of KMS.
3.0 Definition of globalisation and IT effect on globalisation
Globalisation is process which describes the growing interdependency of world’s economy
and culture. It is worldwide interaction among people, business and government to fulfil needs of
each other. This has increased cross border trade and commerce related activities, exchange of
technologies, people, information and flow of investments and capital. The up gradation in
technology and IT has speedup interaction among people of different culture and has also increased
world trade (Flew, 2018). Globalisation has enabled organization to use advanced technology of
different countries which has reduced their production cost. Information technology and
communication are the backbone of globalisation. The effects of IT on globalisation are:
Advancement in technology and IT has enabled reduction in transportation and
communication cost which has facilitated sharing and exchange of information, investment
and trading of goods and services.
IT and its impact on globalisation have increased competition and have positively impacted
world economy and have also enabled people of diverse culture to come closer.
Digital technology has enabled decentralization of data and storage which has developed
assistance that supports tracking of supply chain.
Section B
Question 1 Examples of digital infrastructure and its advantages and disadvantages
Example 1 Mobile telecommunication
3 of 6
Document Page
Mobile telecommunication is a wireless communication service that employs numerous cell
towers that are spread all over the world. This uses radio communication that enables signals
from networks and mobile phoned which are in form of radio waves (Wellmann, 2019). This
communication is possible through range of cellular technologies. Mobile telecommunication
requires various protocols which are to be complied at certain times to connect devices and
receive information. Each protocol takes physical forms which are transmitted in specific
manner. These protocols take different forms in accordance to the technologies used.
Advantages
Mobile telecommunication is helpful during emergencies for contacting people and asking
for help.
It enables effective communication and helps in sharing information with each other.
It enables greater access to modern apps and services which makes life easier.
Improved network capabilities have also enabled to understand diverse culture and have
increased quality of life.
Disadvantages
These are costly and require ongoing maintenance and up keeping.
Mobile telecommunication is vulnerable to security risk especially when it contains
sensitive data.
This has made life easier but on the other hand it is one of the biggest things used for
wasting time.
Mobile telecommunication also has negative impact on environment and biodiversity; it is
also harmful for humans.
Example 2 Cloud computing
Cloud computing is delivery of computing services such as storage, database, software,
servers, etc. These services are provided over internet to provide faster and flexible resources and
innovation and economies of scale. It is on demand availability of services without direct active
management by users (Gupta and et.al., 2019). There are different types of cloud computing: public
cloud, private cloud and hybrid cloud. The different cloud services are infrastructure as a service
(IaaS), platform as a service (PaaS), server less computing and software as a service (SaaS). It relies
on sharing of resources and pay as you go model which enables to reduce capital expenses.
Advantages
It is cost effective digital infrastructure in comparison to other storage options.
It provides on demand services and is faster to access data stored on clouds.
It can be mould in accordance to the needs of users.
User is not required to maintain any hardware or any other device for storage of data.
Disadvantages
4 of 6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
There is risk of theft, hacking, etc on cloud which will be a risk for storing sensitive
information on clouds.
There may be technical issues like server downtime, up gradation problems while using
cloud computing.
The service provider of cloud computing manages cloud infrastructure due to which user
has less control over it.
Adoption of cloud computing on small scale and for short duration is expensive.
5 of 6
Document Page
REFERENCES
Books and Journals
Flew, T., 2018. Post-globalisation. Javnost-The Public. 25(1-2). pp.102-109.
Gupta, A. and et.al., 2019. Cloud computing security using blockchain. Journal of Emerging
Technologies and Innovative Research (JETIR). 6(6). pp.791-794.
Kieser, A. and Kubicek, H., 2018. An organizational concept for the design of Management
Information Systems. In Information Systems and Organizational Structure (pp. 163-185).
De Gruyter.
Oseledchik, M., Ivleva, M. and Ivlev, V., 2018, March. Using social networks in knowledge
management system. In 2nd International Conference on Culture, Education and
Economic Development of Modern Society (ICCESE 2018) (pp. 911-914). Atlantis Press.
Sakazi, S., Elovici, Y. and Shabtai, A., 2022. Prioritizing Antivirus Alerts on Internal Enterprise
Machines. In International Conference on Detection of Intrusions and Malware, and
Vulnerability Assessment (pp. 75-95). Springer, Cham
Wandanaya, A. B., Iskandar, D. and Ariansah, G., Executive Information System (Eis) Kinerja
Study Kasus: Cabin Base Maintenance PT. Gmf Aeroasia Tbk. Journal Cerita. 5(1). pp.14-
25.
Wang, Y. and Kogan, A., 2018. Designing confidentiality-preserving Blockchain-based transaction
processing systems. International Journal of Accounting Information Systems. 30. pp.1-18.
Wellmann, N., 2019. Are OTT messaging and mobile telecommunication an interrelated market?
An empirical analysis. Telecommunications Policy. 43(9). p.101831.
Yarmolenko, A. S., Putintseva, N. Y. and Pisetskaya, O. N., 2019. Modern geoinformation and
communication technologies of economic analysis in ms office 365. In The European
Proceedings of Social & Behavioural Sciences EpSBS (pp. 643-656).
Yun, Y., Ma, D. and Yang, M., 2021. Human–computer interaction-based decision support system
with applications in data mining. Future Generation Computer Systems. 114. pp.285-289.
6 of 6
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]