Holmes Institute: IT for Business Activities, T2 2019
VerifiedAdded on 2022/12/23
|6
|1964
|99
Homework Assignment
AI Summary
This document contains the solutions to five activities related to Information Technology for Business. The first activity discusses the concept of a first mover in the market and the role of information systems in business strategy, including the use of bleeding-edge technology. The second activity focuses on customer relationship management systems, the importance of PC features, and the purpose of supply chain management systems. The third activity explores network protocols, fiber optic cables, and data cleaning. The fourth activity covers the advantages and disadvantages of object-oriented databases, as well as phishing attacks and domain names. The fifth activity examines expert systems, the challenges of global information systems, and the concept of business intelligence. Each activity is supported by references to academic literature.

Running Head: IT FOR BUSINESS
[Type the company name]
IT for business
Answers
Student Name
[Pick the date]
[Type the company name]
IT for business
Answers
Student Name
[Pick the date]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IT FOR BUSINESS 1
Activity 1
First mover is considered as service or product that earns competitive advantage over others by
entering first in the market it may be product or service. First mover helps the company to create
a strong brand identity which helps them to develop customer loyalty (Lim, 2019). It helps in
creating perfect product which can set market price. First movers are followed by other rivals in
order to gain maximum market share with the help of capitalization. In most of the cases, first
mover able to form adequate market share.
Organization must use of Information system to develop their business product or service which
can withstand external forces of business environment. In addition, organization must adopt
innovative provision to align IS strategy with the strategy of their business in the form of cost
reduction, error proofing and so on (Chuang and Lin, 2017). Organization must make use of
information system to improve the performance of managers by offering them opportunity to
have direct control and monitor on all business activities by improving their business decision
abilities.
Bleeding edge is known as technology which has been unconfined but is not ready for common
public because this technology has not been tested on proper format to check its reliability.
Bleeding edge is often released in the form of beta in order to control smooth operation of
compatibility problem (Anderson, 2016). It also use interface issues along with other
fundamental design flaws and bugs which was not involved in the early testing. At present this
technology is moving further to become cutting edge technology.
References
Anderson, D. (2016) Nailing Smoke: Curation at the bleeding edge of
technology. Communications-ACM, 59(12), pp.37-39.
Chuang, S.H. and Lin, H.N. (2017) Performance implications of information-value offering in e-
service systems: Examining the resource-based perspective and innovation strategy. The Journal
of Strategic Information Systems, 26(1), pp.22-38.
Lim, S. (2019) First mover definition [Online].Available from:
https://www.investopedia.com/terms/f/firstmover.asp [Accessed 31/8/2019].
Activity 1
First mover is considered as service or product that earns competitive advantage over others by
entering first in the market it may be product or service. First mover helps the company to create
a strong brand identity which helps them to develop customer loyalty (Lim, 2019). It helps in
creating perfect product which can set market price. First movers are followed by other rivals in
order to gain maximum market share with the help of capitalization. In most of the cases, first
mover able to form adequate market share.
Organization must use of Information system to develop their business product or service which
can withstand external forces of business environment. In addition, organization must adopt
innovative provision to align IS strategy with the strategy of their business in the form of cost
reduction, error proofing and so on (Chuang and Lin, 2017). Organization must make use of
information system to improve the performance of managers by offering them opportunity to
have direct control and monitor on all business activities by improving their business decision
abilities.
Bleeding edge is known as technology which has been unconfined but is not ready for common
public because this technology has not been tested on proper format to check its reliability.
Bleeding edge is often released in the form of beta in order to control smooth operation of
compatibility problem (Anderson, 2016). It also use interface issues along with other
fundamental design flaws and bugs which was not involved in the early testing. At present this
technology is moving further to become cutting edge technology.
References
Anderson, D. (2016) Nailing Smoke: Curation at the bleeding edge of
technology. Communications-ACM, 59(12), pp.37-39.
Chuang, S.H. and Lin, H.N. (2017) Performance implications of information-value offering in e-
service systems: Examining the resource-based perspective and innovation strategy. The Journal
of Strategic Information Systems, 26(1), pp.22-38.
Lim, S. (2019) First mover definition [Online].Available from:
https://www.investopedia.com/terms/f/firstmover.asp [Accessed 31/8/2019].

IT FOR BUSINESS 2
Activity 2
Purpose of customer relationship management system is to improve the information structure
related to customers because having knowledge about the data of customer ensures the positive
experience with the customers (Navimipour and Soltani, 2016). This system helps in enhancing
the performance of the employee with the customers because employee is completely aware
about the behaviour of the potential customer with the help of data stored in customer
relationship management system. This system helps in saving lot of time by resolving customer
issue in less time which is directly linked with customer satisfaction.
Most important features before making a purchase for PC is processor because this feature
decides the speed and performance of the PC which is essential for present work. In addition,
RAM and ROM features must be considered in order to understand the storage capability of the
PC. Another important feature is graphic, this feature ensure continuous support to high
resolution in the PC which is the essential requirement in present business world. One of the
most important features from PC point of view is handy feature.
Supply chain is considered as important network between organization and its vendors in order
to manufacture and distribute particular product to the potential customer. It includes flow of
information, activities and other related resources (Wang et al., 2016). One of the most important
purposes of supply chain management system is to increase the performance and efficiency of
the process with the help of innovative approaches. Another important purpose of supply chain
management system is to bring optimization in the use of available resources within the
organization setting.
References
Navimipour, N.J. and Soltani, Z. (2016) The impact of cost, technology acceptance and
employees' satisfaction on the effectiveness of the electronic customer relationship management
systems. Computers in Human Behavior, 55, pp.1052-1066.
Wang, G., Gunasekaran, A., Ngai, E.W. and Papadopoulos, T. (2016) Big data analytics in
logistics and supply chain management: Certain investigations for research and
applications. International Journal of Production Economics, 176, pp.98-110.
Activity 2
Purpose of customer relationship management system is to improve the information structure
related to customers because having knowledge about the data of customer ensures the positive
experience with the customers (Navimipour and Soltani, 2016). This system helps in enhancing
the performance of the employee with the customers because employee is completely aware
about the behaviour of the potential customer with the help of data stored in customer
relationship management system. This system helps in saving lot of time by resolving customer
issue in less time which is directly linked with customer satisfaction.
Most important features before making a purchase for PC is processor because this feature
decides the speed and performance of the PC which is essential for present work. In addition,
RAM and ROM features must be considered in order to understand the storage capability of the
PC. Another important feature is graphic, this feature ensure continuous support to high
resolution in the PC which is the essential requirement in present business world. One of the
most important features from PC point of view is handy feature.
Supply chain is considered as important network between organization and its vendors in order
to manufacture and distribute particular product to the potential customer. It includes flow of
information, activities and other related resources (Wang et al., 2016). One of the most important
purposes of supply chain management system is to increase the performance and efficiency of
the process with the help of innovative approaches. Another important purpose of supply chain
management system is to bring optimization in the use of available resources within the
organization setting.
References
Navimipour, N.J. and Soltani, Z. (2016) The impact of cost, technology acceptance and
employees' satisfaction on the effectiveness of the electronic customer relationship management
systems. Computers in Human Behavior, 55, pp.1052-1066.
Wang, G., Gunasekaran, A., Ngai, E.W. and Papadopoulos, T. (2016) Big data analytics in
logistics and supply chain management: Certain investigations for research and
applications. International Journal of Production Economics, 176, pp.98-110.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IT FOR BUSINESS 3
Activity 3
Network protocols are actually set of recognized rules, approaches and patterns that describe the
communication among two or more devices related to set network. It also administers end to end
procedures of well-timed, protected and organized data or network interaction (Sha et al., 2017).
It also incorporates approaches and requirements of the primary and end communication with in
the network setting in the form of devices such as router, server and computer. It is essential that
network protocols must be installed by service provider in order to ensure effective
communication.
Fiber optic cables are considered as the fastest mode of data transfer medium in present
technology world. This kind of data transfer medium are pattern in twisted pair which instead of
carrying telecommunication signals from traditional electrical form make use of high-speed
streams of light pulse and LED which often carry information within hair-thin glass known as
optical fibers (Melton et al., 2016). It consists of mainly two coats one is the optical core and
other is metal coating which is known as cladding.
Cleaning data is considered as removing or changing elements which are linked with the data
with some pre-defined standards often recommended by inadequate transactional collect and
approaches. It is also known as approach which has clear intension from business end related to
set up rules. This process also includes authenticate, standardize, combination with external data
and so on. In this way data is being removed so that enough storage space can be offered in order
to generate trust and reliability in decision making.
References
Melton, S.R., Tran, H.V., Thompson, D.A., Wagman, R.S., Gimblet, M.J. and Liu, X., Corning
Optical Communications LLC (2016) Fiber optic drop cables and preconnectorized assemblies
having toning portions. U.S. Patent 9,239,441.
Sha, M., Gunatilaka, D., Wu, C. and Lu, C. (2017) Empirical study and enhancements of
industrial wireless sensor–actuator network protocols. IEEE Internet of Things Journal, 4(3),
pp.696-704.
Activity 3
Network protocols are actually set of recognized rules, approaches and patterns that describe the
communication among two or more devices related to set network. It also administers end to end
procedures of well-timed, protected and organized data or network interaction (Sha et al., 2017).
It also incorporates approaches and requirements of the primary and end communication with in
the network setting in the form of devices such as router, server and computer. It is essential that
network protocols must be installed by service provider in order to ensure effective
communication.
Fiber optic cables are considered as the fastest mode of data transfer medium in present
technology world. This kind of data transfer medium are pattern in twisted pair which instead of
carrying telecommunication signals from traditional electrical form make use of high-speed
streams of light pulse and LED which often carry information within hair-thin glass known as
optical fibers (Melton et al., 2016). It consists of mainly two coats one is the optical core and
other is metal coating which is known as cladding.
Cleaning data is considered as removing or changing elements which are linked with the data
with some pre-defined standards often recommended by inadequate transactional collect and
approaches. It is also known as approach which has clear intension from business end related to
set up rules. This process also includes authenticate, standardize, combination with external data
and so on. In this way data is being removed so that enough storage space can be offered in order
to generate trust and reliability in decision making.
References
Melton, S.R., Tran, H.V., Thompson, D.A., Wagman, R.S., Gimblet, M.J. and Liu, X., Corning
Optical Communications LLC (2016) Fiber optic drop cables and preconnectorized assemblies
having toning portions. U.S. Patent 9,239,441.
Sha, M., Gunatilaka, D., Wu, C. and Lu, C. (2017) Empirical study and enhancements of
industrial wireless sensor–actuator network protocols. IEEE Internet of Things Journal, 4(3),
pp.696-704.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IT FOR BUSINESS 4
Activity 4
Advantages of object oriented database are that it helps in enriching the modeling ability which
permits real world to be demonstrated very carefully. In addition, it also allows new data
formation from the existing data base (Zhou et al., 2017). This also helps in handling large
variety of data base types. Disadvantage of object oriented database are that there is no universal
model for this object oriented database. In addition, it lacks relative experience as compared to
traditional approaches along with no standard setup.
Phishing is known as cyber-attack which uses different email as a media of weapon. The purpose
of this process is to make recipient believe that particular message is their need and send request
for their bank related details in the form of attachment (Arachchilage et al., 2016). A phishing
website is used as a source and is installed in the server. Once it is installed, the attacker just
sends emails to the potential person in the form of dark web. This attack is being carried in the
form of host pattern.
A domain name is just like address services which are being typed by the user while using web
browser in the form of web sites. It then directs towards the exact address which is being used in
users’ website which is known as IP address (Joffe and King, D.L., 2018). It is basically series of
numbers just like 123.22.212 and so on. It then directs towards the location in which server is
being used for the web site. Key reason for using domain name is to just remember letters instead
of long chain of numbers.
References
Arachchilage, N.A.G., Love, S. and Beznosov, K. (2016) Phishing threat avoidance behaviour:
An empirical investigation. Computers in Human Behavior, 60, pp.185-197.
Joffe, R.L. and King, D.L., Neustar Inc (2018) Domain name system and method of operating
using restricted channels. U.S. Patent 9,871,794.
Zhou, Y., Zhang, Y., Ge, Y., Xue, Z., Fu, Y., Guo, D., Shao, J., Zhu, T., Wang, X. and Li, J.
(2017) An efficient data processing framework for mining the massive trajectory of moving
objects. Computers, Environment and Urban Systems, 61, pp.129-140.
Activity 4
Advantages of object oriented database are that it helps in enriching the modeling ability which
permits real world to be demonstrated very carefully. In addition, it also allows new data
formation from the existing data base (Zhou et al., 2017). This also helps in handling large
variety of data base types. Disadvantage of object oriented database are that there is no universal
model for this object oriented database. In addition, it lacks relative experience as compared to
traditional approaches along with no standard setup.
Phishing is known as cyber-attack which uses different email as a media of weapon. The purpose
of this process is to make recipient believe that particular message is their need and send request
for their bank related details in the form of attachment (Arachchilage et al., 2016). A phishing
website is used as a source and is installed in the server. Once it is installed, the attacker just
sends emails to the potential person in the form of dark web. This attack is being carried in the
form of host pattern.
A domain name is just like address services which are being typed by the user while using web
browser in the form of web sites. It then directs towards the exact address which is being used in
users’ website which is known as IP address (Joffe and King, D.L., 2018). It is basically series of
numbers just like 123.22.212 and so on. It then directs towards the location in which server is
being used for the web site. Key reason for using domain name is to just remember letters instead
of long chain of numbers.
References
Arachchilage, N.A.G., Love, S. and Beznosov, K. (2016) Phishing threat avoidance behaviour:
An empirical investigation. Computers in Human Behavior, 60, pp.185-197.
Joffe, R.L. and King, D.L., Neustar Inc (2018) Domain name system and method of operating
using restricted channels. U.S. Patent 9,871,794.
Zhou, Y., Zhang, Y., Ge, Y., Xue, Z., Fu, Y., Guo, D., Shao, J., Zhu, T., Wang, X. and Li, J.
(2017) An efficient data processing framework for mining the massive trajectory of moving
objects. Computers, Environment and Urban Systems, 61, pp.129-140.

IT FOR BUSINESS 5
Activity 5
Expert system is the applications which combine computer software with human reasoning to
generate specialized information in the form of data. It offers discipline oriented advices which
are also self-explanatory to the user (Foote and Halawi, 2018). It offers a platform to carry
specific activities which develops digitized data and models. It is mainly used in commercial as
well as in industrial setting such as medicine, production and so on. It also acts as searching and
sorting application along with knowledge database.
As per the study it has been found that every website is a form of global IS but also includes
some challenges linked with it. Business have to continuous face barriers related to their
operations in the form of technology, tariffs, regulations as well as electronic mode of payment.
In addition, it also includes problems like language, culture and other economic patterns. One
single website can be used by individual in different countries as per their requirement but in this
some adjustment is to be made.
Business intelligence is considered as set of procedures, architectures and technologies which
helps in converting raw information in to meaningful information in the form of business actions.
It is also considered as combination of software and services that convert data in to actionable
intellect and knowledge (Richards et al., 2018). It has directly impact on companies’ strategy,
operations and related business decision making. It always support evidences based decisions
instead of making use of assumptions. It also includes diagrams, charts and graphs to provide
enough support to the users.
References
Foote, A. and Halawi, L.A. (2018) Knowledge management models within information
technology projects. Journal of Computer Information Systems, 58(1), pp.89-97.
Richards, G., Yeoh, W., Chong, A.Y.L. and Popovič, A. (2019) Business intelligence
effectiveness and corporate performance management: an empirical analysis. Journal of
Computer Information Systems, 59(2), pp.188-196.
Activity 5
Expert system is the applications which combine computer software with human reasoning to
generate specialized information in the form of data. It offers discipline oriented advices which
are also self-explanatory to the user (Foote and Halawi, 2018). It offers a platform to carry
specific activities which develops digitized data and models. It is mainly used in commercial as
well as in industrial setting such as medicine, production and so on. It also acts as searching and
sorting application along with knowledge database.
As per the study it has been found that every website is a form of global IS but also includes
some challenges linked with it. Business have to continuous face barriers related to their
operations in the form of technology, tariffs, regulations as well as electronic mode of payment.
In addition, it also includes problems like language, culture and other economic patterns. One
single website can be used by individual in different countries as per their requirement but in this
some adjustment is to be made.
Business intelligence is considered as set of procedures, architectures and technologies which
helps in converting raw information in to meaningful information in the form of business actions.
It is also considered as combination of software and services that convert data in to actionable
intellect and knowledge (Richards et al., 2018). It has directly impact on companies’ strategy,
operations and related business decision making. It always support evidences based decisions
instead of making use of assumptions. It also includes diagrams, charts and graphs to provide
enough support to the users.
References
Foote, A. and Halawi, L.A. (2018) Knowledge management models within information
technology projects. Journal of Computer Information Systems, 58(1), pp.89-97.
Richards, G., Yeoh, W., Chong, A.Y.L. and Popovič, A. (2019) Business intelligence
effectiveness and corporate performance management: an empirical analysis. Journal of
Computer Information Systems, 59(2), pp.188-196.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




