BMP4005: Information System & Big Data Analysis Exam 2021/22

Verified

Added on  2023/06/08

|9
|2639
|95
Homework Assignment
AI Summary
This document provides a detailed solution to an exam on Information Systems & Big Data Analysis (BMP4005). It covers topics such as the development theories behind MS Office and McAfee, explaining the inclusive design methodology and ISO 27000 standards respectively. The solution also defines and gives examples of various systems like DSS, ESS, TPS, MIS, and KMS, highlighting their functions and applications in different organizational contexts. Furthermore, it discusses the impact of globalization on IT, including the roles of IoT, AI, and blockchain. The document also explores digital infrastructure, focusing on mobile applications and cloud computing, outlining their advantages and disadvantages. Desklib offers a wealth of similar solved assignments and study resources for students.
Document Page
2 -EXAM
BSC (Hons) BUSINESS MANAGEMENT WITH
FOUNDATION
SEMESTER 1, EXAMINATION 2021/22
NFORMATION SYSTEM & BIG DATA ANALYSIS
MODULE NO: BMP4005
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ANSWER BOOKLET
All the pages of the answer booklet should be submitted including blank ones.
Please type your answers in the spaces provided.
Insert additional pages where required.
Student Name
ID Number
Document Page
SECTION A
1.0
MS Office:
The theory behind the development of the MS office is the inclusive design
methodology. This inclusive design is a methodology that has been built for the digital
environments that enables and draws out the different ranges for the human diversity (Wattimena
and Koibur,, 2022). It has been considered to be very important for the inclusion of the learning
from people that has been able to influence the range of perspectives that affect the development
of the software. The concept of the design thinking is very widespread as it is known to many
people in the products area. The main design principles for the inclusive design of MS office was
to help the solve the problems that occurred to the users. This was also made for the neglecting
of the different types of issues and biasness that were there for the software developers. Hence,
the development of MS office was considering the human diversity and also the inclusion of the
people that are diverse in the range of perspectives and the needs.
As the developers and the designers there are often issues with the generation of ideas
that are based on the what has been known for the striving or making the experiences that would
be solving the needs of the users. The human body has been considered to be the responsible for
their ways of innovating the through their use of abilities as a baseline that is going to be able to
make their people use the difficult to everyone. Certain principles that were considered during
the preparation of MS office were,
Recognition of exclusion which takes place when there is problem solving abilities. This
was able to talk about the disabilities that are related to the limitation that are included
for the situational impairments and the activity that limit the restricted over the
participations.
Learning from the diversity has been found to be the factor that has helped the
manufacturers of MS office to be able to adapt with the human needs. This is essential
for the development of the success design.
Solving for one and implementing for other has been the main policy that MS office
utilized for making effective improvements for their users that allowed it to be at the
place which has made it beneficial for every user.
McAfee:
Document Page
McAfee is a digital security tool which has been created for the protection of the personal
computers. The theory that explains the development of the McAfee development was ISO
27000 which is an international standard model that is highlighting the best practices that are
needed for the information security management and systems. This is also considered to be very
popular for the organization to be able to influence the European Union (Khan and et.al., 2020).
This is also considered to be the focus that is essential for the maintaining the area of the a
mature cyber security management program. The focus of this model is has been broken down
into the following area for the security software’s.
It needs to be focusing on the security risk assessment which is related to the assessments
of the third party software’s that are increasing the threat to the personal computers. This
software has its own security policy that takes care of the guide that are needed to be followed by
the users. There are features such as the asset management that allows the users to be able to
protect their assets and data. This is the system that McAfee be the successful digital security
software that it has been over the years. The services of this software involve the protection of
computer’s internet account and files that are intrusion from the outside users. This is essential
for the users of the internet in the today’s world. It can be said that h providing secure firewalls
are very important for the helping the product to get protected from any kind of spyware.
2.0
DSS (Decision Support System)
It is the system that is used by a computer program application that allows the
improvements in the decision making of the company. Its considered to be the ones that allows
in the analysing in the large amount of data that is presented in an organization with the best
possible options available (Santos and et.al., 2019). This is the software that allows the decision
support system which is able to bring together the data and knowledge from different areas of the
consideration. Examples of the DSS include the GPS route planning as it uses the information
that is related to location for helping the users with better decision making. Another example of
DSS is ERP dashboards that visualize the changes in the production and business process for
monitoring of performance.
ESS (Executive Support System)
These are systems that support are intended towards being used for the senior managers
for the directly providing the support towards the non-programmed decisions (Primawanti and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Ali, 2022). These information that are provided by this system is often are external, unstructured
and even uncertain. The exact scope and content of this information are not often present
beforehand. Hence, the information used for this system is generally market intelligence,
investment intelligence and technology intelligence. Some examples of this system include
Cambridge Systematics has an ESS which is use for investment planning process and Executive
Support System developed by Meditech is also an ESS that provides useful health care
organizations.
TPS (Transaction Processing System)
Transaction processing system is considered to be the software the ensure the completion
of the business transaction and also is able to keep track of the transaction. It is also considered
to be the OTPS that is an equivalent system that are generally used by the online transactions.
Hence, the ecommerce companies are the ones that are the first users of this technology (Putra
and Rahman, 2022). Some example of this system is present in the customer purchasing with
credit card, in this the system takes the information and communicates with their bank and
approves or declines the purchase. Hotel reservation systems also work with the same kind of
technology and system.
MIS (Management Information System)
This software is known for making study on people, technology, organization and the
relation between them. MIS professionals are the ones that help the firm to be able to realize that
there are maximum benefits from the investment that is personnel, equipped or helps in the
business processes (Chen and Karahanna, 2018). It is also considered to be very people oriented
hence it used more in the emphasis on the service through the technology. Management
Example, Payroll processing software and E-commerce business utilize this system as it helps
them to make better communication between each other.
KSM (Knowledge Management System)
This knowledge management system includes the collection of the analysis,
dissemination and the general management of all the information that has been possessed by an
organization (Aziz and et.al., 2018). It is related to the KMS for carrying out the function that are
related to the functioning following of the best practices to be delivering the optimization of the
results that are desired by the organization. The example of this system includes the community
Document Page
forums and self-service portals that is utilized as the software for delivering the intellectual
capital.
3.0
Globalisation and effects of IT on Globalisation:
It is the means of integrating the different economies together through which free trade
can be possible. It allows the capital to be free among different countries and also help in the
accessing the resources of the world. Globalisation has been speeding up with the means of
exchange in the technology over the world. This has been the reason that has affected IT the
most as it increased the promotion and increased the interaction between the different regions
and population around the globe. As due to the globalization the companies started to explore
foreign technologies most of their found decrease in their manufacturing cost (Flew, 2018). This
has been the convergence of different culture and the economic system for the promotion of
digital world which on the other hand has made the globalisation even stronger.
IoT and AI Internet of things and Artificial intelligence are the one of the most latest
technology that has been started to come around. They are also in the development process
which is the reason why globalisation can be considered to be the key factor that has allowed
he development of this technology even faster. It has increase the competition in the world to
be able to gain the access to this technology at first.
Blockchain –This was the digital technology that has been able to help in the
decentralization of the data base and the storage for the development of the assistance that
supports the tracking of such supply chain. It has facilitation of the data that is essential for
the security that is required for the industries of health care.
Exchange of resources This is the process in which the IT an its ore is able to help gain
the access the internet microchip that has given significant contribution towards the exchange
of the resources.
SECTION – B
Question – 1
EXAMPLE 1 – MOBILE APPLICATIONS
Definition:
To build a foundation for digital operations of a company both physical as well as virtual
technologies are to be brought together and this is done through Digital Infrastructure. These
Document Page
physical and virtual technologies include computation, storage, network, apps and platforms such
as IaaS, SaaS and PaaS. It is now a most crucial source for the companies to gain competitive
advantage in the market and industry. One of the digital infrastructures is mobile applications. It
is a software app which is particularly developed for utilizing on computing devices which are
small and wireless for example, smartphones and tabloids instead of desktops and laptops
(Balapour, Nikkhah and Sabherwal, 2020). It shall be noted that these devices have certain
limitations and demands which are to be met for designing of these applications therefore, this
designing and development is done taking into consideration these, demands, limitations,
advantages and capabilities of the targeted smart phone and its configuration as to what all it can
hold and operate efficiently and smoothly.
Advantages:
It is easier for the user to use the app rather than accessing the website of a particular person
or entity.
Data can be accumulated regarding usage, activity and purchasing trends which is very
valuable to any vendor.
Communications becomes easier with the customers through apps via notifications.
Productivity can be enhanced many folds when paper based operations are ditched.
Disadvantages:
Lack of focus and wastage of resources if not handled efficiently.
Developing an app is a complicated task.
Regular updates are required to be done to make the apps running smoothly.
It involves a considerable cost to develop such applications.
EXAMPLE 2 – CLOUD COMPUTING
Definition:
Another digital infrastructure which can be discussed here is cloud computing. It simply
means offering a varied range of services to the users over internet or as it is called – the cloud.
This internet or clouds uses the servers that are remotely located at a specific locations for
storing and accessing of data rather than storing such data in the local hard drives or even data
centres that are privately run and managed (Gupta and et.al., 2019). The working of such cloud
computing depends upon the type of cloud that is being used. These types are private cloud,
public cloud and hybrid cloud.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantages:
Cloud computing is cost effective when compared to other options available.
It also offers a faster service and access to the data stored on such cloud.
It is easy to scale models of cloud computing according to the needs of the organisations.
There is no need to maintain different and complicated hardware.
Disadvantages:
Storage of business sensitive files on such clouds has risk of loss, theft, hacking, etc.
Organisation may face issues due to technical problems like reboots, downtime, etc.
The owner of the data has minimal control over the data.
Cloud computing for small scale projects may prove to be very expensive.
Document Page
REFERENCES
Books and Journals
Aziz, D. T., and et.al., 2018. Development and Validation of a Knowledge Management
Questionnaire. Journal of Information Studies & Technology (JIS&T). 2018(1). p.2.
Chen, A. and Karahanna, E., 2018. Life interrupted: The effects of technology-mediated work
interruptions on work and nonwork outcomes. MIS quarterly. 42(4). pp.1023-1042.
Flew, T., 2018. Post-globalisation. Javnost-The Public. 25(1-2). pp.102-109.
Khan, S., and et.al., 2020. Biometric systems utilising health data from wearable devices:
applications and future challenges in computer security. ACM Computing Surveys
(CSUR). 53(4). pp.1-29.
Primawanti, E. P. and Ali, H., 2022. Pengaruh Teknologi Informasi, Sistem Informasi Berbasis
Web Dan Knowledge Management Terhadap Kinerja Karyawan (Literature Review
Executive Support Sistem (Ess) for Business). Jurnal Ekonomi Manajemen Sistem
Informasi. 3(3). pp.267-285.
Putra, D. W. T. and Rahman, S., 2022. Pengolahan Data Penerima Kartu Indonesia Sehat
Menggunakan Transaction Processing System. Jurnal Teknologi Dan Sistem Informasi
Bisnis-JTEKSIS. 4(1). pp.64-69.
Santos, J. and et.al., 2019. SUP&R DSS: A sustainability-based decision support system for road
pavements. Journal of Cleaner Production. 206. pp.524-540.
Wattimena, F. Y. and Koibur, R., 2022. Office Aplication Training (Ms Office) For The
Community Of Holtekamp Village. International Journal Of Community Service
(IJCS). 2(1). pp.9-16.
Gupta, A. and et.al., 2019. Cloud computing security using blockchain. Journal of Emerging
Technologies and Innovative Research (JETIR). 6(6). pp.791-794.
Balapour, A., Nikkhah, H. R. and Sabherwal, R., 2020. Mobile application security: Role of
perceived privacy as the predictor of security perceptions. International Journal of
Information Management. 52. p.102063.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]