In-Depth Analysis of Information Technology: A Weekly Project

Verified

Added on  2023/03/23

|7
|1714
|21
Homework Assignment
AI Summary
This document presents a comprehensive solution to an Information Technology weekly project, covering a range of topics including the components of information systems, business problem definitions, off-the-shelf computer programs, and the advantages and disadvantages of strategic information systems. It also delves into the agile method versus waterfall development, the implications of IT services outsourcing, the importance of end-user information systems, supply chain management, and the role of RFID. Furthermore, it outlines the minimum requirements for building a computer, key considerations before purchasing a PC, and explains various network types such as WAN, LAN, MAN, and PAN. The solution also discusses the advantages of optical fiber cables, the downsides of Wi-Fi, the use of spreadsheets for data analysis, data cleaning in data warehousing, the significance of data warehousing for decision-making, and the applications of blogging and intranet/extranet in business. Finally, it touches on global information systems, data protection laws, data modeling, sensitivity testing, and the use of GIS systems for scheduling. The document concludes with a bibliography referencing relevant literature.
Document Page
Running head: INFORMATION TECHNOLOGY WEEKLY PROJECT
Information Technology Weekly Project
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION TECHNOLOGY WEEKLY PROJECT
Activity 1
1. The components of information system includes just not the hardware and software
but also the other components of data bases, telecommunications, human resources,
procedures and data warehouses.
2. The definition of a business problem can be printed as a well-defined issue that
occurs within an organisation containing a solution in it. Occurrence of a problem is easy to
solve only if it is looked at the most obvious and straightforward way saving resources, time
and money. A business problem that can be e occurring within an organisation can be of the
management of human resource that is easily solved by Computer based information system.
3. An off-the-shelf computer program is defined as the software or hardware products
that is already made available for selling to the general public. An example of such an off the
shelf computer program used as a strategic information system can be the ERP software that
are generally available in the market to handle the business information.
4. It is always found that strategic information system of an is offering an organisation
with short lived advantages. This is because the strategic information system cannot accept
change as it works along several algorithms and programs that has been set as per the
business condition at a certain point of time. Changes in the business procedure conformer
threat to the strategic information system right at that point of time.
5. It is certainly seen that Adobe acrobat reader and flash player is readily available
free of charge for the users because this is a strategic plan that Adobe look forward to for
more acquisition of customers. The application is given away but not the entire packages
Adobe. Due to in app purchases, subscriptions, referral marketing and other strategic theories
Document Page
2INFORMATION TECHNOLOGY WEEKLY PROJECT
applied to this act, it can be clearly seen how Adobe makes its own money even after making
two of its applications available to the users free of charge.
Activity 2
1. One of the most important advantage of the agile method over the waterfall
development methods is that a waterfall development method cannot be retraced once it has
been executed, what the agile methods are much flexible. therefore, in case of a software
development life cycle if waterfall method is applied, the development phase cannot be rolled
back or it would have to begin write the initiation phase. On the other hand, agile method is
flexible enough to move back to any previous stage of development during the software
development life cycle and move forward again to begin from where it had been paused.
2. Business organizations often outsource IT services, but it might offer that it has the
most negative effect on the transaction and operation within the organisation affecting the
confidentiality of information, regulatory compliance, business continuity and understanding
of the business system.
3. Information system by end users should always be encouraged as it helps in
keeping track and information of all the transactions and confidential data that has been gone
through so far buy the products and services offered to end users from the organisations.
4. Supply chain can be defined as a Process or a sequence of a process that would be
involved within an organisation for distributing the proper organisation of the business
processes to let a smooth propagation of the production system. The supply chain
management system within an organisation is implemented to make sure that the processes
within an organisation for developing a certain manufacturing process or service is going
along the correct way of implementation.
Document Page
3INFORMATION TECHNOLOGY WEEKLY PROJECT
5. RFID, or Radio Frequency Identification is the utilisation of the radio waves for
reading and capturing information that is stored or attached to an object. it can play a good
role in the supply chain management as all the items that are pass through the end product
and services can follow the information gathered due to the tag attached to the product. With
this, it can ensure that the information regarding the production is formulated and the detail
about the outcome of the project is tracked properly.
Activity 3
1. the minimum amount of requirements that are required to build up a system that
can be termed as a computer is a proper working operating system, a processor with
minimum speed of Pentium 4 to a maximum of two gigahertzes, Random Access Memory, a
proper graphics card hard disc space and input output ports.
2. The most important things that a person need to clarify before purchasing a PC is
first and foremost needed to be set according to a realistic budget, a proper checking of the
processor, checking of all the memory devices, the hard drive, the graphics, the computer
software, the anti-virus software and the provision of internet connections.
3. Following are the notations:
WAN: Wide Area Network. this is a computer network that needs to establish the
connection between all the computers within a wide area network.
LAN: Local Area Network. This is a computer network which establish the
connection between the computers in a certain area within the range of the Internet service.
MAN: Metropolitan Area Network. this is a computer network that utilizes the
connection between the computers with the metropolitan area.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION TECHNOLOGY WEEKLY PROJECT
PAN: Personal Area Network. This is a computer network that is utilised for
interconnecting the devices within an individual workspace of a single user.
4. Optical fibre cable have a lot more advantage over the communications media by
having greater bandwidth, low cost, extensive flexibility, being light weighted and a lower
level of signal loss.
5. The downside of Wi-Fi is initiated due to the disadvantages which are not
apparently seen but are much less secure and greater in expenses. It does not what makes a
user properly use their phone data and it is extensively prone of getting attacked by viruses.
Activity 4
1. Spreadsheets are mostly used for applying the data analysis techniques and most
companies are found to be utilizing these techniques for the management of data. However,
there are not many data management systems that can be applied to the systems, like complex
search queries, handling multiple users, presenting data subsets and handling repetitive data
sequences.
2. For cleaning the data before it is stored into the data warehousing means that any
data element, which is not aligned with the quality features of the pre-defined data, should be
removes or modified before it is stored in the data warehouses. These may be coming from
the processing steps and even the limited transactions.
3. A huge lot of data that has been gathered from a huge range of sources within an
organization helps in guiding the making of management decisions. The data warehousing
concept is meant for storing huge data quantity for fast enabling and it is not volatile at all.
On the other hand, transactional database is highly volatile.
Document Page
5INFORMATION TECHNOLOGY WEEKLY PROJECT
4. Blogging is a shorter form of the word Weblogging, which is regarded as an online
journal for any informational website for displaying the representation of data in a reverse
chronological order. In business, blogging tactic is used to make sure that a business has
online visibility to set up a marketing channel helping in the growth of businesses.
5. Intranet is a communications network that is mostly restricted to a restricted
communication utilising the World Wide Web. Extranet on the other hand is the intranet
which is again accessed partially with the authorization provided to the outside users.
Extranet enables business organizations to go through the information exchange in the most
secure way possible with the customers.
Activity 5
1. Global Information System is a system specified in the hardware and software that
is used for the mapping, storage, retrieval and analysis of geographic data.
2. The conflict can be resolved with obtaining the globally standardized Data
Protection Laws.
3. Models in this case can be explained with the type of process in which data is
developed to be stored within the database. Examples of two of these can be the physical data
model and the logical data model.
4. Sensitivity testing or sensitivity analysis is the process by which the vulnerability of
a data set is tested to find out how is it capable of falling victimised to the security attacks.
5. The GIS systems can be used for the analysis of the presented data to map and store
them at such a level that it would be easier to prepare a feasible schedule using the timings of
the classes and the durations of them throughout the week.
Document Page
6INFORMATION TECHNOLOGY WEEKLY PROJECT
Bibliography
Dumas II, J.D., 2016. Computer architecture: fundamentals and principles of computer
design. CRC Press.
Kim, G.J., 2015. Human–Computer Interaction: Fundamentals and Practice. Auerbach
Publications.
Krumm, J., 2016. Ubiquitous computing fundamentals. Chapman and Hall/CRC.
Mano, M.M. and Kime, C.R., 2015. Logic and computer design fundamentals. Pearson
Higher Education.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security.
CRC press.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security.
CRC press.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]