logo

Information Systems and Big Data Analysis - Written Portfolio

   

Added on  2023-06-10

11 Pages2872 Words271 Views
Information System
and Big Data Analysis

Table of Contents
INTRODUCTION ..........................................................................................................................3
TASK...............................................................................................................................................3
Evaluate the theories, methods and techniques which connect to the design and development
................................................................................................................................................3
Explain the systems below with suitable examples:............................................................4
Globalization and the effects of IT on globalization...........................................................6
digital infrastructure; define it properly, list advantages and disadvantages of it. ..............7
Defines Risks connected with information systems outsourcing and why is IT infrastructure
critical in digital transformation?...........................................................................................8
CONCLUSION ...............................................................................................................................9
REFERENCES..............................................................................................................................11

INTRODUCTION
Information system is defined as bundle of elements that store, collect and process data to
provide an information regarding digital products and give knowledge. Organisations depends on
the information systems to manage their operations and to interact with customers and suppliers.
These systems are used to run inter organisational supply chains effectively and electronic
markets. Whereas big data analysis refers to the management of data sets by using analytic
techniques and make them structured. This report includes structured, semi-structured and
unstructured data from different sources and different sizes(Alfalah, 2018) . This aim of this
report is to describe the theories and techniques related to the design and development with the It
companies. It defines the globalisation with its effects and the advantage and disadvantage of
digital infrastructure. This report also contains risk that connected with the information
technology and why its harmful in digital transformation.
TASK
Evaluate the theories, methods and techniques which connect to the design and
development .
Design and development techniques are the elements, strategies and technical
information that incorporated in the software. These methods are used to developing more IT
solutions in the organisations. The methods used by companies are given below:
McAfee
Its an antivirus program software that scan viruses which used to protect computer
system by blocking the entry of viruses into the system with that it destroys the viruses in order
to make system run smooth and to perform its functions in a well effective manner that generates
good productive work. It performs real-time and on-demand scanning that allows user to
manually scan the systems for malware and security threats to keep data protected and private
(Beck, 2018) . It provides companies the online protection from different viruses and hackers. It

is one of the viruses which is used by many companies and that helps companies in order to
perform effectively. These antivirus program provides security to the organisations in developing
different techniques in the processes.
Techniques and methods of McAfee-
Behavioural detection- This software is mainly used to detect common viruses when its
scan virus in the system in respect to make work more effective. Virus detected by this
software are used to those by which computer system got hang or shut down anti virus.
Cloud Antivirus- Its an application that design and develop to detect the existing virus in
the system. Its a programmatic solution that minimizes antivirus workloads to a cloud
based server. It describes as detecting virus that occur in the system through internet.
Heuristic based detection- It is the most popular the techniques that is used by
companies in antivirus software which organisations implementation of an algorithm in
process to detect viruses in the computer system.
MS Office-
It is defined as the set of application in the computer which is used by companies in order to
work smoothly. It is used to create and edit documents that comprises text and images, work with
spreadsheets and database and creation of posters and presentations(Crouch, 2018). In the
context of companies it helps them in simplify their tasks and functions and helps in improving
their productivity. This application used mostly on a global scale in respect to operate their
functions effectively.
Methods and techniques of MS Office-
Attachments- It is a common software used by all the companies which make MS Office
more effective and operate in effective manner. It serves variety of purposes that includes
professional papers and presentations. By using this attachments helps in creating
documents with the easy access to different media which is suitable for the content.
Real time co-authoring- This techniques is used to make organisation run in effective
manner by make working environment friendly and effective. It helps an individual in
development of their objectives. It generates instant engagement within the application
and makes it in-person working sessions.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System and Analysis of Big Data
|10
|2986
|440

Information Systems and IT Solution: Theories, Methods, and Techniques for Design and Development
|9
|3098
|424

Information Systems and IT Solution: Design and Development, Globalization, Digital Infrastructure, and Risks of Outsourcing
|11
|3438
|435

Individual Written Portfolio on Information System and Big Data Analysis
|10
|2966
|249

Information Systems and IT Solution for Business Management
|10
|2784
|235

Information Systems and IT Solution: Design and Development Theories, Globalisation Effects, Digital Infrastructure, and Risks of Outsourcing
|12
|3343
|143