BSc Business Management - Information System & Big Data Analysis

Verified

Added on  2023/06/08

|12
|3079
|141
Report
AI Summary
This report provides a detailed analysis of information systems and big data, covering various aspects such as decision support systems (DSS), executive support systems (ESS), transaction processing systems (TPS), management information systems (MIS), and knowledge management systems (KMS). It explores the application of McAfee ePO and MS Office within these systems, highlighting their functionalities and evolution. The report further discusses the impact of globalization on information technology and delves into cloud computing, outlining its advantages and disadvantages. Finally, it examines the Internet of Things (IoT), emphasizing its benefits in automating tasks and improving business efficiency. This document is available on Desklib, where students can find a wealth of resources including past papers and solved assignments.
Document Page
BSc (Hons) Business Management WITH FOUNDATION
SEMESTER 1, EXAMINATION 2021/22
NFORMATION SYSTEM & BIG DATA ANALYSIS
MODULE NO: BMP4005
Exam Paper Release Date & Time: Saturday 06 August 2022 at 10:00am
Submission Cut-off Date & Time: Monday 08 August 2022 at 10:00am
---------------------------------------------------------------------------------------------------------------
ANSWER BOOKLET
All the pages of the answer booklet should be submitted including blank ones.
Please type your answers in the spaces provided.
Insert additional pages where required.
Student Name
ID Number
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Table of Contents
SECTION A.....................................................................................................................................1
Answer to the Question no. 1(i).............................................................................................1
Answer to the Question no. 1(iv)...........................................................................................2
Answer to the question no. 2 (i).............................................................................................2
Answer to the question no. 2 (ii)............................................................................................2
Answer to the question no. 2 (iii)...........................................................................................2
Answer to the question no. 2 (iv)...........................................................................................2
Answer to the question no. 2 (v)............................................................................................2
Answer to the question no. 3..................................................................................................2
SECTION B.....................................................................................................................................3
Answer to the question no. 1 (i).............................................................................................3
Answer to the question no. 1 (ii)............................................................................................3
REFERENCES................................................................................................................................4
Document Page
SECTION A
Answer to the Question no. 1(i)
McAfee: With McAfee ePO programming, IT heads can bring together security the board
across endpoints, organizations, information, and consistence arrangements from McAfee and
outsider arrangements. McAfee ePO programming gives adaptable, mechanized administration
abilities so you recognize, make due, and answer security issues and dangers. McAfee ePO
programming helps drive down the expense and intricacy of overseeing security. For more data
about McAfee ePO highlights, read the item information sheet. McAfee's product is all evolved
utilizing the Agile or Continuous Integration/Continuous Delivery (CI/CD) technique (Sakazi
and et. al., 2022). These dexterous and CI/CD practices are alluded to as the Agile Software
Development Lifecycle (SDLC). The Waterfall philosophy is not generally utilized inside
McAfee. At McAfee, the SDLC is alluded to inside as the Product Lifecycle Framework (PLF)
v2. The McAfee ePO server is the focal programming storehouse for all McAfee item
establishments, refreshes, and other substance. The secluded plan of ePolicy Orchestrator permits
new items to be added as augmentations. This incorporates new or refreshed variants of McAfee
and McAfee-viable arrangements from the Security Innovation Alliance. ePolicy Orchestrator
likewise considers replication to dispersed archives at far off areas for transfer speed
improvement. The ePolicy Orchestrator System Tree sorts out oversaw frameworks in units for
observing, relegating approaches, booking errands, and making moves.
Answer to the Question no. 1(iv)
MS Office: Aside from Facebook, the main program that anybody has on his/her PC is
Microsoft Office. Microsoft Office is the world's most famous and strong efficiency suite for
learning, confidential utilizing, and office work. Microsoft Office before Office 2007 utilized
exclusive document designs in light of the OLE Compound File Binary Format. This constrained
clients who share information to embrace a similar programming stage. In 2008, Microsoft made
the whole documentation for the double Office designs uninhibitedly accessible for download
and allowed any potential licenses privileges for use or executions of that twofold configuration
for nothing under the Open Specification Promise. Beginning with Office 2007, the default
document design has been a form of Office Open XML, however not quite the same as the one
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
normalized and distributed by Ecma International and by ISO/IEC. Microsoft has allowed patent
privileges to the organizations innovation under the Open Specification Promise and has made
accessible free downloadable converters for past variants of Microsoft Office including Office
2003, Office XP, Office 2000 and Office 2004 for Mac OS X. Outsider executions of Office
Open XML exist on the Windows stage (LibreOffice, all stages), macOS stage (iWork '08,
NeoOffice, LibreOffice) and Linux (LibreOffice and OpenOffice.org 3.0). Also, Office 2010,
Service Pack 2 for Office 2007, and Office 2016 for Mac upholds the Open Document Format
(ODF) for opening and saving archives - just the old ODF 1.0 is upheld, not the 1.2 rendition.
Microsoft gives the capacity to eliminate metadata from Office archives. Metadata expulsion was
most readily accessible in 2004, when Microsoft delivered a device called Remove Hidden Data
Add-in for Office 2003/XP for this reason (Venter and Swart 2018). The income is split between
the engineer and Microsoft where the designer gets 80% of the cash. Engineers can impart
applications to all Office clients.
Answer to the question no. 2 (i)
A choice emotionally supportive network (DSS) is an electronic program used to help
conclusions, decisions, and game-plans in an association or a business. A DSS filters through and
breaks down enormous measures of information, gathering far reaching data that can be utilized
to take care of issues and in direction. In associations, a choice emotionally supportive network
(DSS) breaks down and combines immense measures of information to aid navigation.
Google GPS route planning. A DSS can be utilized to design the quickest and best route
plan between two focuses by examining the accessible choices (Jana and et. al., 2022).
Penn Medicine Clinical DSS. These frameworks assist clinicians with diagnosing their
patients. Penn Medicine has made a clinical DSS that assists it with getting ICU patients
off ventilators quicker.
Answer to the question no. 2 (ii)
An Executive Support System (ESS) is programming that permits clients to change venture
information into rapidly open and chief level reports, for example, those utilized by charging,
2
Document Page
bookkeeping and staffing divisions. An ESS improves decision making for chiefs. Instances of
the utilization of ESS are as per the following:
Cambridge Systematics, Inc. fabricated an ESS that is coordinated with the growth
strategy for the Ministry of Transportation in Canada.
ESS predominantly manages information connected with key offices like charging,
bookkeeping, planning, staffing and so on (Shadmanova and Azimdjonova, 2022).
Answer to the question no. 2 (iii)
An exchange transaction process system (TPS) is a data handling framework for deals
including the assortment, change and recovery of all exchange information. Qualities of a TPS
incorporate execution, dependability and consistency (Petrov and et. al., 2019). TPS is otherwise
called real-time processing or transaction process handling.
TPS gathers information about exchanges and furthermore starts handling that changes
stored information. Models incorporate request handling, representative records, and
lodging reservation frameworks.
Instances of continuous real-time transaction processes are the retail location terminals
(P.O.S) and microfinance advance frameworks.
Answer to the question no. 2 (iv)
An administration data framework (MIS) is a data framework utilized for navigation, and for
the coordination, control, examination, and representation of data in an association (Raadabadi
and et. al., 2018). The investigation of the administration data frameworks affects individuals,
cycles and innovation in an authoritative setting.
MIS addresses region where latest consideration is being engaged. Terms Human
Resource Information System (HRIS), and Human Resource Management System
(HRMS) are normal.
MIS depicts how the PC could be applied to the whole scope of data assortment.
3
Document Page
Answer to the question no. 2 (v)
KSM incorporate the assortment, investigation, scattering, and general administration of all
data that is moved within an association (Yaseen and et. al., 2020). A Knowledge Management
System does these capabilities and follows best practices to convey ideal outcomes for the
association involving it in a proficient and viable way.
Urge representatives to question the KMS for without a moment to spare learning.
Give replies to usually posed inquiries for client self-administration drives.
Answer to the question no. 3
Globalization alludes to the spread of the progression of monetary items, products,
innovation, data, and occupations across public boundaries and societies. In financial terms, it
depicts a reliance of countries all over the planet encouraged through streamlined commerce.
Globalization is the word used to portray the developing association of the world's economies,
societies, and populaces, achieved by cross-line exchange labour and products, innovation, and
streams of venture, individuals, and data (Zajda and Majhanovich eds., 2021). Nations have
constructed monetary organizations to work with these developments over numerous hundreds of
years.
The movement towards globalization has been around for quite a long time; however it truly
became observable in the mid 1900's with mechanical advances. The message and phone
permitted individuals to impart across borders whenever already it would require weeks or
months to transfer messages. The creation of the plane considered a lot of faster worldwide
travel, while specialized gadgets, for example, the radio permitted individuals all around the
globe to pay attention to news from everywhere the world in close to continuous. Data
innovation was the driver in making the overall combination of different worldwide business
sectors that make up globalization.
Ascent of the Personal Computer - The ascent of the Windows-based PC, which
advocated individualized computing, killed another significant obstruction that was
confining globalization: the breaking point on how much data that an individual could
get, creator, alter, and disseminate.
Development of the World Wide Web - Before the World Wide Web, we had the web
which associated the globe, yet with the World Wide Web people were currently like
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
never before ready to post their own computerized content so that anybody across the
globe might be able to see.
Computerized, Mobile, Personal and Virtual Movement - More as of late the world has
been amassed with computerized cameras, portable PDA's and cell phones alongside
private PCs and this is having a significant effect on the movement of globalization.
With the developing fame of these kinds of advancements people and organizations can
work together with each other all the more much of the time and in such countless more ways
than any other time.
5
Document Page
SECTION B
Answer to the question no. 1 (i)
Cloud computing is the on-request accessibility of PC framework assets, particularly
information capacity and figuring power, without direct dynamic administration by the client
(Sunyaev, 2020). Huge mists frequently have capabilities circulated over numerous areas, every
area being a server farm.
Advantages
Back-up and re-establish information: Once the information is put away in the cloud, it
is simpler to get back-up and re-establish that information utilizing the cloud. Cloud
computing further develops cooperation by permitting gatherings to rapidly and
effectively share data in the cloud by means of shared stockpiling.
Low upkeep cost: Cloud computing diminishes both equipment and programming
support costs for associations. Cloud registering permits us to effectively get to all cloud
information through versatile.
Limitless capacity limit: Cloud computing offers us a colossal measure of putting away
limit with regards to putting away our significant information like records, pictures,
sound, video, and so on in one spot.
Information security: Data security is one of the greatest benefits of distributed
computing. Cloud computing offers many high level elements connected with security
and guarantees that information is safely put away and taken care of.
Disadvantages
Requires Internet Connectivity: As in Cloud computing, each datum (picture, sound,
video, and so forth) is put away on the cloud, and we access this information through the
cloud by utilizing the web association.
Restricted Control: As cloud framework is totally claimed, made due, and checked by the
specialist organization, so the cloud clients have less command over the capability and
execution of administrations inside a cloud foundation.
Security: Although Cloud computing organizations carry out the best security norms to
store significant data. Yet, prior to taking on cloud innovation, you ought to know that
you will send all your association's delicate data to an outsider, i.e., a distributed
6
Document Page
computing specialist co-op. While sending the information on the cloud, there might be
an opportunity that your association's data is hacked by Hackers.
Answer to the question no. 1 (ii)
The IOT (Internet of things) portrays tangible objects with sensors, handling skill,
programming, and different advancements that associate and trade information with different
gadgets and frameworks over the Internet or different interchanges organizations (Koohang and
et. al., 2022). Through which the communication of information among the processes and
systems becomes easier
Advantages
Limit human exertion: As IoT gadgets collaborate and speak with one another, they can
computerize the errands assisting with working on the nature of a business'
administrations and decreasing the requirement for human mediation.
Save time: By lessening the human exertion, it saves a ton within recent memory. Saving
time is one of the essential benefits of utilizing the IoT stage.
Improved information assortment: Information is effectively open, regardless of whether
we are far away from our genuine area, and it is refreshed every now and again
progressively. Thus these gadgets can get to data from anyplace whenever on any gadget.
Further developed security: If we have an interconnected framework, it can aid the more
brilliant control of homes and urban communities through cell phones. It improves
security and offers individual assurance.
Decreased utilization of other electronic hardware: Electric gadgets are
straightforwardly associated and can speak with a regulator PC, like a cell phone,
bringing about proficient power use.
Disadvantages
Security issues: IoT frameworks are interconnected and convey over networks. In this
way, the framework offers little control notwithstanding any safety efforts, and it can
prompt different sorts of organization assaults. The IoT framework gives basic individual
information in full detail without the client's dynamic support.
The intricacy of the framework: The planning, creating, keeping up with, and
empowering the broad innovation to IoT framework is very convoluted.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Absence of worldwide normalizations: As there is no global norm of similarity for IoT, it
is hazardous for gadgets from various makers to speak with one another.
High reliance on the web and use of internet: They depend vigorously on the web and
can't work actually without it.
8
Document Page
REFERENCES
Books and Journals
Jana, S. and et. al., 2022, September. Decision support system (DSS) for hierarchical allocation
of resources and tasks for disaster management. In Operations Research Forum (Vol. 3,
No. 3, pp. 1-30). Springer International Publishing.
Koohang, A. and et. al., 2022. Internet of Things (IoT): From awareness to continued
use. International Journal of Information Management, 62, p.102442.
Petrov, I. and et. al., 2019. Hardware-assisted transaction processing: NVM. In Encyclopedia of
big data technologies (pp. 934-941). Springer International Publishing.
Raadabadi, M. and et. al., 2018. Barriers to the Use of Management Information System (MIS) in
the Health Insurance Organizations: A Case Study of Iran. Journal of Health
Management, 20(4), pp.427-438.
Sakazi, S. and et. al., 2022. Prioritizing Antivirus Alerts on Internal Enterprise Machines.
In International Conference on Detection of Intrusions and Malware, and Vulnerability
Assessment (pp. 75-95). Springer, Cham.
Shadmanova, U. and Azimdjonova, M., 2022, June. Factors affecting the information system in
the management of corporations. In AIP Conference Proceedings (Vol. 2432, No. 1, p.
060024). AIP Publishing LLC.
Sunyaev, A., 2020. Cloud computing. In Internet computing (pp. 195-236). Springer, Cham.
Venter, M. and Swart, A.J., 2018, April. An integrated model for the continuous use intention of
Microsoft Office simulation software. In 2018 IEEE Global Engineering Education
Conference (EDUCON) (pp. 320-329). IEEE.
Yaseen, M. and et. al., 2020. Knowledge Sharing Management (KSM) Model in the Context of
Global Software Development. i-Manager's Journal on Software Engineering, 14(3),
p.22.
Zajda, J.I. and Majhanovich, S. eds., 2021. Globalisation, cultural identity and nation-building:
The changing paradigms (Vol. 5). Dordrecht: Springer.
9
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]