BMP4005: Information System & Big Data Analysis - Exam 2021/22
VerifiedAdded on 2023/06/07
|7
|2124
|190
Homework Assignment
AI Summary
This document provides solutions to an Information System & Big Data Analysis exam, covering topics such as IT solution development using McAfee and MS Office as examples, definitions and examples of Decision Support Systems (DSS), Executive Support Systems (ESS), Transaction Processing Systems (TPS), Management Information Systems (MIS), and Knowledge Management Systems (KSM). It also defines globalization and its effects on IT. Furthermore, the document discusses cloud computing, including its advantages like self-service provisioning, elasticity, and wide network access, and disadvantages such as security concerns and cost unpredictability. Finally, it explains data centers, their advantages, and disadvantages related to control and internet dependency.

BSC (Hons) BUSINESS MANAGEMENT WITH
FOUNDATION
SEMESTER 1, EXAMINATION 2021/22
NFORMATION SYSTEM & BIG DATA ANALYSIS
MODULE NO: BMP4005
---------------------------------------------------------------------------------------------------------------
ANSWER BOOKLET
All the pages of the answer booklet should be submitted including blank ones.
Please type your answers in the spaces provided.
Insert additional pages where required.
Student Name
ID Number
FOUNDATION
SEMESTER 1, EXAMINATION 2021/22
NFORMATION SYSTEM & BIG DATA ANALYSIS
MODULE NO: BMP4005
---------------------------------------------------------------------------------------------------------------
ANSWER BOOKLET
All the pages of the answer booklet should be submitted including blank ones.
Please type your answers in the spaces provided.
Insert additional pages where required.
Student Name
ID Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2 of 7

[There are TWO sections in the exam paper. Section A has three compulsory questions,
answer all THREE questions. Section B has two optional questions, answer any ONE
question. For each sub-questions, use heading such as “Answer to the Question no. 1(i)”
or “Answer to the Question no. 1(ii)” etc. Start writing you answer from this page (page 2).]
SECTION A
Answer to the question 1
1.0Explaining the methods,techniques and theories which is related to the development and design
for TWO of the IT solution:
McAfee- This is a very popular and famous international security brand in USA which deals in the
formulation of various equipments and tools of digital security for the appliances like computer
and other devices. The organisation was founded by John McAfee in the year 1987. The
business also pays attention on the mobile devices. This tool offers safety from various cyber
attacks, viruses and bots. This software provides protection for the data which is stored in the
system. This software is also helpful against spams, malicious websites and other phishing
attacks. There is a proper system which involves filtering, virus and standardization which
gives the expected results(Singh, 2022).
Ms Office- This is regularly used by the users all over the world. It is a software which involves
different things such as MS PowerPoint which is used for making visual presentations, Ms
word which is a text document processor and MS excel which contains spreadsheet. This is
basically a group of different software's such as client software, server software and other
essential services which are formed by the company Microsoft(Sifah, and, et. al., 2018) . The
owner of Microsoft is Bill Gates which developed this software in the year 1990 at Las Vegas
at COMDEX. The company has copyrighted this software which cannot be used without the
permission. MS office is available in various languages in the market along with the verified
software issued by MAC security. It is very simple to use and it is easily available in the
market.
2.0 Define and Provide examples for each software.
Decision Support System (DSS)- This is a general software which is used by the organisations in
the process of decision making in different management levels. The data is evaluated
effectively with assistance of various support systems and the best option is selected which will
make the company successful. There are mainly three elements which are present such as
software, knowledge and the databases. These factors are very essential in making strong and
effective decisions for the business(Kotenko, and, et. al., 2019). The policies, product
specification and Cagoules and many more are the different examples of this information
system.
Executive Support System (ESS)- This support system helps the top level management in making
good decisions in the company. This helps the management in providing information and data
related to the process of the decision-making. The decisions which are taken by the higher
authorities of the organisation makes an impact on the working of the company as a whole.
Transaction Processing System (TPS)- The transaction processing system assists the organisation
in performing various tasks and activities in a proper way. This support system is very much
dependent on the revenues, nature, supply and size of the goods and services. This makes the
entry of the information and data relatively easy(Grossi, and, et. al., 2018).
Management Information System (MIS)- The support system assists in making strong and
essential decisions which are very useful for the organisation. These decisions are taken from
the middle level management of the company. The main purpose of the MIS is to collect all the
3 of 7
answer all THREE questions. Section B has two optional questions, answer any ONE
question. For each sub-questions, use heading such as “Answer to the Question no. 1(i)”
or “Answer to the Question no. 1(ii)” etc. Start writing you answer from this page (page 2).]
SECTION A
Answer to the question 1
1.0Explaining the methods,techniques and theories which is related to the development and design
for TWO of the IT solution:
McAfee- This is a very popular and famous international security brand in USA which deals in the
formulation of various equipments and tools of digital security for the appliances like computer
and other devices. The organisation was founded by John McAfee in the year 1987. The
business also pays attention on the mobile devices. This tool offers safety from various cyber
attacks, viruses and bots. This software provides protection for the data which is stored in the
system. This software is also helpful against spams, malicious websites and other phishing
attacks. There is a proper system which involves filtering, virus and standardization which
gives the expected results(Singh, 2022).
Ms Office- This is regularly used by the users all over the world. It is a software which involves
different things such as MS PowerPoint which is used for making visual presentations, Ms
word which is a text document processor and MS excel which contains spreadsheet. This is
basically a group of different software's such as client software, server software and other
essential services which are formed by the company Microsoft(Sifah, and, et. al., 2018) . The
owner of Microsoft is Bill Gates which developed this software in the year 1990 at Las Vegas
at COMDEX. The company has copyrighted this software which cannot be used without the
permission. MS office is available in various languages in the market along with the verified
software issued by MAC security. It is very simple to use and it is easily available in the
market.
2.0 Define and Provide examples for each software.
Decision Support System (DSS)- This is a general software which is used by the organisations in
the process of decision making in different management levels. The data is evaluated
effectively with assistance of various support systems and the best option is selected which will
make the company successful. There are mainly three elements which are present such as
software, knowledge and the databases. These factors are very essential in making strong and
effective decisions for the business(Kotenko, and, et. al., 2019). The policies, product
specification and Cagoules and many more are the different examples of this information
system.
Executive Support System (ESS)- This support system helps the top level management in making
good decisions in the company. This helps the management in providing information and data
related to the process of the decision-making. The decisions which are taken by the higher
authorities of the organisation makes an impact on the working of the company as a whole.
Transaction Processing System (TPS)- The transaction processing system assists the organisation
in performing various tasks and activities in a proper way. This support system is very much
dependent on the revenues, nature, supply and size of the goods and services. This makes the
entry of the information and data relatively easy(Grossi, and, et. al., 2018).
Management Information System (MIS)- The support system assists in making strong and
essential decisions which are very useful for the organisation. These decisions are taken from
the middle level management of the company. The main purpose of the MIS is to collect all the
3 of 7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

relevant data and then formulate Transaction Processing System (TPS). This information is
given forward simultaneously in different forms such as reports, display and responses.
Knowledge Management System (KSM)- The first and most essential of KMS is that it improves
the reliability and relevance of the information which is collected in order to enhance the skill
and knowledge within the company. This makes the system very effective and efficient. The
different examples of KSM are design systems and virtual reality(Gibson, 2021).
3.0 Define the term globalization and what are the effects on IT of globalization.
Globalisation is the process in which involves independent and free flow of goods and
services across the borders(Ghorbanian, Dolatabadi, and Siano, 2019). The companies with the
help of globalisation are able to expand their business operations from the domestic market to
global market.
The effect of IT on the globalization can be discussed below:
The technology is considered a very essential factor which has drive globalisation in the world. The
trade barriers have reduced after the arrival of IT in the market. The competition in the industry has
also increased with the advancement in technology. It has helped in reduction of cost and
enhancement of quality. The foreign direct investment has experienced increase which have opened
various options of raising funds.
SECTION B
Answer to the question no. 1
Cloud computing- It is a general term for things involving the delivery of host
services over the internet. The services are segmented in 3 primary categories for
kinds of cloud computing, infrastructure as the service(laaS), (PaaS) platform as the
service and ( SaaS) software as the service. Cloud can be any public and private. Where
the public cloud sells the services to the any one on the internet meanwhile private cloud
refers to the proprietary network or the center of data which supplies the host services to
the limited peoples, with the certain permissions and access settings. Public or private the
ultimate goal of the cloud computing is giving scale able access, easy to the resources of
computing and services of IT(Asencio–Cortés, and, et. al., 2018).
It involves the software and hard ware elements needed for the implement ion of
the model of cloud computing. It can be used as a utility and on demand computing.
Name of the cloud computing was invented by the symbol of the cloud used for internet in
diagrams and flowcharts. It works by the enabling of the client devices for accessing the
data and applications of the cloud over internet from anywhere databases , computers
and physical servers.
ADVANTAGES
Self service provisioning- Ultimate users may spin the computer resources for
every type of the work on demand. The end user may provision capabilities of the
computing, like times of the server, network storage, removing conventional IT
administrator.
4 of 7
given forward simultaneously in different forms such as reports, display and responses.
Knowledge Management System (KSM)- The first and most essential of KMS is that it improves
the reliability and relevance of the information which is collected in order to enhance the skill
and knowledge within the company. This makes the system very effective and efficient. The
different examples of KSM are design systems and virtual reality(Gibson, 2021).
3.0 Define the term globalization and what are the effects on IT of globalization.
Globalisation is the process in which involves independent and free flow of goods and
services across the borders(Ghorbanian, Dolatabadi, and Siano, 2019). The companies with the
help of globalisation are able to expand their business operations from the domestic market to
global market.
The effect of IT on the globalization can be discussed below:
The technology is considered a very essential factor which has drive globalisation in the world. The
trade barriers have reduced after the arrival of IT in the market. The competition in the industry has
also increased with the advancement in technology. It has helped in reduction of cost and
enhancement of quality. The foreign direct investment has experienced increase which have opened
various options of raising funds.
SECTION B
Answer to the question no. 1
Cloud computing- It is a general term for things involving the delivery of host
services over the internet. The services are segmented in 3 primary categories for
kinds of cloud computing, infrastructure as the service(laaS), (PaaS) platform as the
service and ( SaaS) software as the service. Cloud can be any public and private. Where
the public cloud sells the services to the any one on the internet meanwhile private cloud
refers to the proprietary network or the center of data which supplies the host services to
the limited peoples, with the certain permissions and access settings. Public or private the
ultimate goal of the cloud computing is giving scale able access, easy to the resources of
computing and services of IT(Asencio–Cortés, and, et. al., 2018).
It involves the software and hard ware elements needed for the implement ion of
the model of cloud computing. It can be used as a utility and on demand computing.
Name of the cloud computing was invented by the symbol of the cloud used for internet in
diagrams and flowcharts. It works by the enabling of the client devices for accessing the
data and applications of the cloud over internet from anywhere databases , computers
and physical servers.
ADVANTAGES
Self service provisioning- Ultimate users may spin the computer resources for
every type of the work on demand. The end user may provision capabilities of the
computing, like times of the server, network storage, removing conventional IT
administrator.
4 of 7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Elasticity- Firms can freely increase the requirements of the computing and
decrease the demand . It eliminates needs for massive investments in the local
infrastructure, which may remain active or not.
Wide network access- End user can access the data of the cloud and upload the
data to cloud remotely from anywhere with the anywhere by the connection of
internet by using any device.
DISADVANTAGES
Cloud security- Security is considered greatest concern faced by cloud computing.
When depending on cloud, firms risk breaches of data, hacking of the interfaces
and APIs.
Cost unpredictability- Paid subscription plans for the cloud usage, with the scale
resources to accommodate the work fluctuations and make it hard for defining and
predict cost.
Lack of the capabilities- By the cloud support technologies fast and advancing
the firms are struggling for keeping the growth for tools demand and workers with
suitable skills set.
Data Center- It is the facility which centralizes the business organizations shared
operations of IT and equipment's for motive of storage, disseminating and processing
the applications and data due to the home of firms hard and assets of propriety , data
centers are significant to regular operations. Consequently security and data centers
reliability and information are between the firm top priorities. In past centers of data were
high controlled infrastructures but public cloud has since the changed the model. Except
the rules and regulations restrictions need the on demand data center with no internet and
many contemporary data center infrastructures have changed from the on demand
servers to the virtual infrastructures which supports the work load and applications
across the multi cloud environments.
ADVANTAGES
It provides the consumers services to consumers based on the reasonable rates in
the different plans according to the lease period and needs.
It provides the ecosystem of robust hardware and software.
It provides the great system performance by the distribution of load across the
nodes of cluster.
Users or consumers requirements do not need for worrying about recruitment for
maintaining the data centers.
DISADVANTAGES
Firms recruiting resources from data centers providers dont have the full control
locally due to the fact that human resources and hardware lies at the premises of
consumers.
Usage and data quality of services of data centers are different on basis of internet
connection.
5 of 7
decrease the demand . It eliminates needs for massive investments in the local
infrastructure, which may remain active or not.
Wide network access- End user can access the data of the cloud and upload the
data to cloud remotely from anywhere with the anywhere by the connection of
internet by using any device.
DISADVANTAGES
Cloud security- Security is considered greatest concern faced by cloud computing.
When depending on cloud, firms risk breaches of data, hacking of the interfaces
and APIs.
Cost unpredictability- Paid subscription plans for the cloud usage, with the scale
resources to accommodate the work fluctuations and make it hard for defining and
predict cost.
Lack of the capabilities- By the cloud support technologies fast and advancing
the firms are struggling for keeping the growth for tools demand and workers with
suitable skills set.
Data Center- It is the facility which centralizes the business organizations shared
operations of IT and equipment's for motive of storage, disseminating and processing
the applications and data due to the home of firms hard and assets of propriety , data
centers are significant to regular operations. Consequently security and data centers
reliability and information are between the firm top priorities. In past centers of data were
high controlled infrastructures but public cloud has since the changed the model. Except
the rules and regulations restrictions need the on demand data center with no internet and
many contemporary data center infrastructures have changed from the on demand
servers to the virtual infrastructures which supports the work load and applications
across the multi cloud environments.
ADVANTAGES
It provides the consumers services to consumers based on the reasonable rates in
the different plans according to the lease period and needs.
It provides the ecosystem of robust hardware and software.
It provides the great system performance by the distribution of load across the
nodes of cluster.
Users or consumers requirements do not need for worrying about recruitment for
maintaining the data centers.
DISADVANTAGES
Firms recruiting resources from data centers providers dont have the full control
locally due to the fact that human resources and hardware lies at the premises of
consumers.
Usage and data quality of services of data centers are different on basis of internet
connection.
5 of 7

In issues and trouble shooting the consumers have to be dependent on the support
staff from data centers service providers so resolution on the knowledge and skills
of the staff(Vats, and Sagar, 2020).
6 of 7
staff from data centers service providers so resolution on the knowledge and skills
of the staff(Vats, and Sagar, 2020).
6 of 7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Reference List (if Any)
Asencio–Cortés, G., and, et. al., 2018. Earthquake prediction in California using regression
algorithms and cloud-based big data infrastructure. Computers & Geosciences, 115,
pp.198-210.
Ghorbanian, M., Dolatabadi, S.H. and Siano, P., 2019. Big data issues in smart grids: A
survey. IEEE Systems Journal, 13(4), pp.4158-4168.
Gibson, P., 2021. Internet of Things sensing infrastructures and urban big data analytics in smart
sustainable city governance and management. Geopolitics, History, and International
Relations, 13(1), pp.42-52.
Grossi, V., and, et. al., 2018. Data science at SoBigData: the European research infrastructure for
social mining and big data analytics. International Journal of Data Science and
Analytics, 6(3), pp.205-216.
Kotenko, I., and, et. al., 2019, February. Attack detection in IoT critical infrastructures: a machine
learning and big data processing approach. In 2019 27th Euromicro International
Conference on Parallel, Distributed and Network-Based Processing (PDP) (pp. 340-347).
IEEE.
Sifah, E.B., and, et. al., 2018. Chain-based big data access control infrastructure. The Journal of
Supercomputing, 74(10), pp.4945-4964.
Singh, N., 2022. Developing business risk resilience through risk management infrastructure: The
moderating role of big data analytics. Information Systems Management, 39(1), pp.34-52.
Vats, S. and Sagar, B.B., 2020. An independent time optimized hybrid infrastructure for big data
analytics. Modern Physics Letters B, 34(28), p.2050311.
7 of 7
Asencio–Cortés, G., and, et. al., 2018. Earthquake prediction in California using regression
algorithms and cloud-based big data infrastructure. Computers & Geosciences, 115,
pp.198-210.
Ghorbanian, M., Dolatabadi, S.H. and Siano, P., 2019. Big data issues in smart grids: A
survey. IEEE Systems Journal, 13(4), pp.4158-4168.
Gibson, P., 2021. Internet of Things sensing infrastructures and urban big data analytics in smart
sustainable city governance and management. Geopolitics, History, and International
Relations, 13(1), pp.42-52.
Grossi, V., and, et. al., 2018. Data science at SoBigData: the European research infrastructure for
social mining and big data analytics. International Journal of Data Science and
Analytics, 6(3), pp.205-216.
Kotenko, I., and, et. al., 2019, February. Attack detection in IoT critical infrastructures: a machine
learning and big data processing approach. In 2019 27th Euromicro International
Conference on Parallel, Distributed and Network-Based Processing (PDP) (pp. 340-347).
IEEE.
Sifah, E.B., and, et. al., 2018. Chain-based big data access control infrastructure. The Journal of
Supercomputing, 74(10), pp.4945-4964.
Singh, N., 2022. Developing business risk resilience through risk management infrastructure: The
moderating role of big data analytics. Information Systems Management, 39(1), pp.34-52.
Vats, S. and Sagar, B.B., 2020. An independent time optimized hybrid infrastructure for big data
analytics. Modern Physics Letters B, 34(28), p.2050311.
7 of 7
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.