Sunday, September 27, 2009

Week 9 (Chapter 4)

1. What are some of the difficulties in managing data?

In past data was mainly collected in hard paper copy and was filed in cabinets. In modern times data exists in various mediums and texts, such as emails, text, images and audio etc. Keeping a hard copy of these communication data can lead to an overload in terms of space. Even managing data on a system can still create problems
and must be managed carefully.

2. What are the various sources for data?

Data can either come from internal or or external sources. Internal data sources is stored internally within an organization. This contain data on the products, people, customers, services, processes, income and expenses. External data sources are made by an independent body which collects general information on a topic.

3. What is a primary key and a secondary key?

The primary key is a unique identifier or code that has no duplicates and can easily recognize an entity. A secondary key are all other fields other than the primary key. Secondary keys can have duplicates and provide information to identify the entity but not with full accuracy.

4. What is an entity and a relationship?

An entity is an individual body (includes person, place, event thing) and is conceived as something separate. A relationship is something that two or more entities have in common.
These relationships are normally displayed on a table showing information on each entity.

5. What are the advantages and disadvantages of relational databases?

Advantages:
-provides information on relationship between individuals
-places information on a single view table
-updates as data on entities change
-easy access to information
Disadvantages:
-only provides certain information
-usually data is not elaborate and simplistic

http://it.civil.aau.dk/it/education/images_slides/asp_www_db_intro.gif

6. What is knowledge management?

Knowledge refers to what is contextual, relevant and usable. Knowledge normally refers to humans intellects. Knowledge management is about sorting, storing and contextualizing relevant information.

7. What is the difference between tacit knowledge and explicit knowledge?

Tacit knowledge is the knowledge that is difficult to be communicated to another by means of writing it down or verbalized. Explicit knowledge is the exact opposite to tacit knowledge as it is easy to articulate, verbalise and transfer the knowledge using different mediums.

Week 8 (Chapter 7)

1. Identify common wireless devices and their application to business.

Some common wireless devices include internet connection, cashiers, barcode scanners and printers. Wireless internet connection enables the access to the internet and the business's database from anywere alowing for access to communicationa nd information from on site and out of office areas. Wireless cashiers enable a recording of outbound inventories and inbound sales revenue into the database. This produces efficiency within the business.

2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.

Microwave technology is used for mobile phone communication and is a cheap form of transmitting and conecting devices. Satellite is used for lager scale communication and can transfer larger data across areas, this includes must medias . Infrared is used to transfer data over a short distance, previously commonly used by phones but was replaced by bluetooth. Radio waves was used to only transfer audio over a relatively large distance. Currently radio waves can carry internet data using the 3G network and can carry video, text and audio,

3. What is bluetooth/how is it used?

Bluetooth is a wireless communication device typically used for mobile phones. It runs on low energy and connects to a small geographical area. Bluetooth is also used to connect devices such as keyboards, wireless mice and external hardrives to a computer. Bluetooth is typically used for small short ranged devices.

4. What are WLAN's, Wi-Fi, WWAN's, 3G?

WLAN stands for Wireless Local Ares network. Wi-Fi is similar to WLAN but has a diferent protocol, IEEE 802.11. WWAN is the abbreviation of Wireless wide area network, which is a laptop or computer that is connected wirelessly to the internet using mobile-like technology. 3G is the International Mobile Telecommunication. 3G works similar to WWAN except it is specifiacally made for mobile technology.

5. What are the drivers of mobile computing and mobile commerce.

The drivers of mobile computing and mobile commerce is the growing dependence on mobile phones and the ability of collecting information from any location at any time. This flexibility with gathering information has caused an increase in mobile commerce due to the wireless environment and the culture of portable internet.

6. Explain the nature of RFID

RFID is the abbreviation of Radio frequency identification. It refers to how objects can be bar-coded and tagged for purpose of tracking and identification. An example is a RFID sticker placed on a retail item in a retail store. This can enable the shop keeper to keep track on the item if it is stolen, in stock or on the shelf.

http://oracleebusinesssuite.files.wordpress.com/2007/12/rfid-enabled-receiving-and-dispatch.jpg

Week 7 (Chapter 5 and 6)

Chapter 5 Questions
1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.


Web 2.0 websites have the capability of a two way conservation. Web 2.0 strives to create: usability, economy, remixability, participation, economy, d
esign and standardization. Web 2.0 enables viewers to have a two way interaction with the website as oppose to its predecessor who only contained information. Below is a picture showing examples of websites that are Web 2.0


http://api.ning.com/files/BiM1Eksyb7S2qBCaLR-kDrfkvL3PrAmueHFI9cyvTDSPwQNlX15vzLHfreaMJg*9RCty2LD-JDAgwrp15A5CHGd4lV-0h80b/web20.jpg

2. Describe the function of Web services.

A Web service is an basically an online software or application that is made to fulfill a specific task. Web services have an embedded code within the webpage to enable it to fulfill its specific task.

3. Describe how you see Social Networking being used in Business.

Social networking can be used within business as a means of communicating with employees and customers. Social networking can enable a more open communication channel between employees of a business to enable them to collaborate and communicate as a team complete a task. It also can enable inputs from other employees from different divisions or locations to provide input, so strategies can have a fuller picture on completing the best outcome. Social networking can also enable customer feedback on products. For example , the Dell company website has online posts from customers expressing their opinions on the product.


Chapter 6 Questions


1. Define e-commerce and distinguish it from e-business


E-commerce is the online transfer of goods and services between producer and seller. E-business, however includes the whole business activity. E-business includes the selling of goods, service, customer help and support transactions and collaborating with business partners.

2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

B2C refers to business to consumer transactions, while B2B refers to business to business transactions. C2C refers to consumer to consumer transactions typically found with online trading trading websites such as eBay, trading post and carsales.com. B2E is the selling of goods or services from the business to the employees. These transaction are becoming more reliant on internet communications.

3. List some benefits and limitations of e-commerce.

Benefits:
-disintermediation (the removal of the middle retail sellers)
-can market product to a lager scale (national to international)
-lower cost of processing, distributing and retrieving information
-Customers can access and buy products and services at any convenient time
-can deliver a more coherent information on product which will drive product and services to meet the demands of society
Limitations:
-lack of uniformed payment systems
-incompetent telecommunication networks is some areas
-lower socioeconomic areas have less access
-IT problems can drive up running cost of the business
-supply channels have lower quantities creating higher postage prices
- larger markets
-difficulties in marketing to consumers
-higher misinterpreted between customer and business due to lack of dialogue
-perception that e-commerce is insecure and not reliable

1. What are spamming, permission marketing and viral marketing?

Spamming refers to continuous advertising that streams into the system, spamming normally is referred to emails . Permission mark
first requires the consent of the individual before regularly informing the individual of new changes to the products. Viral marketing uses social networking sites to create brand awareness or recognition to a general audience.

1. What are micropayments?


Micropayments are payment of small amounts of money . Paypal is an online service that specialize with transactions from the credit card to bank accounts. Micropayments is usually for purchases for online transactions.

2. What is Multichanneling?

Multichanneling is the retailing through more than one channel. This can be through a number of retail outlets and stores and a company website.

1. List some ethical issues in EC.

Some ethical issues surrounding e-commerce is:
-Placing cookies on customers systems
-releasing unauthorized details of a customer to other companies
-not providing secure transaction websites
-not disclosing full information on the product

2. List the major legal issues of EC.

Some major legal issues of e-commerce are:
-no Taxation on products brought overseas
-laws only apply to the country the business and international laws also apply
-The kinds of legal barriers cyberspace has delivered exist primarily in areas of intellectual property, security (including consumer protection), copyright, free speech, gambling, privacy and taxation (McGraw Hill, 2003).(as cited on http://wiki.media-culture.org.au/index.php/E-commerce_-_Overview_-_Legal_Issues)

Saturday, September 26, 2009

Week 6 (Tech Guide 4 and 5)

1. Describe the basic telecommunications system?

The telecommunication system is a vast network comprising of both the hardware and software that transmit information from a location to another.

2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)

Ethernet - The Ethernet cable is a series of wires twisted together to form a cable. The Ethernet protocol is IEEE 802.3. The Ethernet is the most commonly used medium for transporting information.
Fibre Optics - The fibre optics is a series of thin glass fibres that are twisted together to form the Fibre Optic cable. The fibre optic cable uses packets light instead of electic currents as the code of the information. This enables the information to travel faster as the speed of light travels faster then the speed of electric currents.
However, although Fibre Optics cables are much more efficient in speed, it is very expensive, which makes the ethernet the more excepted and most used medium to use.

3. What are the main business reasons for using networks?

The reason for businesses using networks is that it allows more communication channels to open up and allows for more quicker, efficient and precise flow of information and data across the business.

4. What is the difference between LANs and WANs?

The main difference between LANs and WANs is that geographical area they cover. LAN stands for (Local are Network) which encompasses a small geographical area. WAN is the abbreviation of Wide Area Network. WANs cover a much larger geographical area then LANs do and enables a global business to communicate with employees across the globe.

5. What is a network protocol?

The network protocol is a set of rules on how the information is transmitted across the internet using a type of hardware. The most common network protocol is the IEEE 802.3 or ethernet protocol. In this protocol the information travels via twisted wires. The protocol defines how the information travels in packets of electricity through the wires. The protocol demonstrates how the data on both ends of the communication intemperate the information given.

6. Describe TCP/IP protocol.

The TCP/ IP protocol is essentially how the internet works. TCP (Transmission Control Protocol) and the IP (internet protocol) are a set of rules on how devices communicate with one another. Hence creating on what we know as the internet.

Week 5 (Chapter 3)

1.Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.

-Privacy: disclosing, collecting and storing personal information that was not permitted by the individual.
-Accuracy: Collecting data that is not directly from the source
-Property: Claiming ownership of a source, information that does not belong to the individual and using an unlicensed software.
-Accessibility: Disclosing trusted information and data to an unauthorized group or entity.

2.What are the 4 general types of IT threats? Provide an example for each one.

1.Natural threats: Bushfire, infrastructure is destroyed.
2.Unintentional threats: Deleting an important file from database.
3.Technical threats: CPU overload and system crash.
4.Malicious threats: Viruses, spam, Trojans and phishing.

3.Describe/discuss three types of software attack and a problem that may result from them.

Viruses are softwares that that inhibit the functioning of the computer. This can be solved by installing an updated anti-virus software and routinely scanning computer for threats. Spam mailing and ad-ware are similar to viruses, that once installed onto the system the program causes continuous streaming of advertisements and pop-ups on the email or when connected to the internet. Trojan horse are a software that can infiltrate a system and can record information from the user and then relays them to another computer.

4.Describe the four major types of security controls in relation to protecting information systems.

1.Backing up data: This involves saving data and information on external sources either on-site or off-site.
2.Training personnel: Training the users about basic precautionary protection of the information system will reduce the amounts of security breaches.
3.Software protection: Installing anti-virus software and having strong password protections for the system can prevent malicious behavior and information theft.
4.Hardware protection: placing the information system in a secure and protected area can reduce theft to the information system.

5.Name one recent software threat and briefly discuss it's effects and resolutions ?

A recent trend in software threats is phishing. Phishing involves sending emails that resemble a bank requesting for personal bank details to be used to hank into an account to gain access to money. Thus phishing is basically a modern example of software theft. To combat phishing could involve installing anti-phishing software but the most effective method is having some basic principles when dealing with accounts on the internet. One way is recognizing the difference between a authentic bank email and a phishing email. Another is never giving bank details over the internet and lastly making sure the banking websites URL is genuine and security coded.


6.What is the difference between authentication and authorization and why are they important to e-Commerce/give an example of their relevance to e-Commerce

Authentication refers to the origin of the source and that it comes form the original person. Authorization refers to the ability of the beholder to change and modify the contents. This is important in e-commerce as verifying that it is the authentical individual that is making a purchase on the internet and that the business itself has the authorization to sell the product. An example of this is an Internet banking transaction. The website must identify the authenticity of the individual and the bank itself must be able to authorize the transfer of funds.

Friday, September 25, 2009

Week 4 (Tech 2)

1. What are main differences/distinction between system software and application software?

The difference between a system software and application software is that system software is designed for general use of the computer and contributes to the functioning of the computer, while application software is designed for specific tasks.

2. What are the two main types of system software? Provide some examples of their functions.

The two main types of system software are control programs (includes operating systems) and support programs. Control programs are specifically used to create a functioning relationship between the computer hardware and the virtual software. Control programs include operating systems like Windows XP, vista, Mac OS X and Linux and the programing software such as control, terminal and python. The support programs are softwares that assist in the support of the operating of the computer system. The support programs are separated into three categories: system utilities, system performance monitors and system security monitors. System utilities include programs such as file manager, disk defragmenter, disk scanner and boot camp, parallel systems etc. System performance examples include task manager, performance information and device manager. Examples of system security monitors include programs such as Norton Anti-virus software, AVG and windows fire wall.

3. What is the difference between proprietary and open source software? What considerations should be made when a business selects either software.

Proprietary software is a licensed software that must be bought for legal use. Open source software is software that is available on the internet and is free to use, modify and download. When businesses consider using either proprietary or open source they consider the cost of purchasing proprietary software, the level of support the software offers, easy of use and training of the software and the stability of the software.

4. What are some of the legal issues involved in acquiring and using software in most businesses/organizations?

The legal issues involved in using software in most businesses and organizations is that the software license only applies to one computer and can not be modified and owned. The copyright and licensing laws surrounding proprietary softwares in businesses is that the business does not own the software but is only allowed to use it. The software can only be used with a specific computer meaning that the company must buy licenses for each computer causing a large cost.

5. Choose an Operating System, provide some details on it's developer, it license type and key benefits.

The Linux kernel operating system found its roots in the GNU project in 1984 founded by Richard Stallman, which aimed for a general public license softwares. Linus Torvalds was the creator of the operating system Linux kernel. Linux is very beneficial as it is a free open source software and its basic design and simplicity enables easy of use. As it is an open source software it alllows independent modifications and programing from users.

Thursday, September 24, 2009

Week 3 (Tech Guide)

1. What is computer hardware and what are the major hardware components?

Computer hardware refers to the general physical im
plements used to assist the functioning of a computer process. The hardware categories are separated into three categories: inputs and outputs and storage. Inputs refer to hardware that provides data that go into the computer system and outputs are data that goes out of the computer and storage refers to the hardware that contains and stores data information.

2.What is Moore's Law/what does it mean in relation to computers.

Moore's law states that the number of transistors on an integrated circuit, doubles every two or so years, causing a exponential increase in the performance of computers over a period of time. However this law is applied generally and other variables can cause an increase in performace of computers. The graph below show the relation between time and number of transistors causing the increase in computer technology.

http://web.sfc.keio.ac.jp/~rdv/keio/sfc/teaching/architecture/architecture-2007/mooreslaw_graph2-intel.gif

3. In basic terms, describe how a microprocessor functions.

The microprocessor is basically the brains of the computer. the microprocessor is also refered to as the CPU and the processor. It is composed of series of transistors or semiconductors, (usually silicon) that are arranged on an integrated chip. Currently computers use solid state transistors and earlier computers used diodes or valve transistors. The CPU receives data and instructions and the processes it to the correct function.
http://www.3dnews.ru/_imgdata/img/2008/11/21/intel/cpu-2.jpg

4.What factors determine the speed of the microprocessor?

The main factors that determine the speed if a computers microprocessor is the number of instructions per second the processor can execute. It is measured either in megahertz (MHz) or gigahertz (GHz) per second.

5.What are the four main types of primary storage?

The four main types of primary storage include the RAM (Random access memory), the register (or CPU), Cache memory and the non-volatile read-only memory (ROM). Primary storage normally deals with the functioning of the processing of the computer.

4.What are the main types of secondary storage?

The main types of secondary storage are the Hard drive, flash drives, CD and DVD, Blu-ray discs and SD cards and now recently online storage. Secondary storage refers to permanent long-term storage.

5.How does primary storage differ from secondary storage in terms of speed cost and capacity?

Primary storage differs to secondary storage that it has faster speeds but lower capacity, and vice versa in terms of secondary storage. However is primary storage reaches high capacity in storage the computer speed is slowed down.

6.What are enterprise storage systems?

An enterprise storage system is an online storage system that caters for large scale businesses. Enterprise storage systems stores the data on an off-site location form the business. This insures the business protects its data from natural disasters and from data loss.

7.Distinguish between human data input devices and source data automation.

Human data input devices are data that has been transcribed by humans and placed into the computer. This is done through input devices, such as: keyboard, mouse, microphone etc. Source data are digital data that is placed onto the computer. Source data reduces human error and is particularly used for repetitious data logging.

8.What is one new technology that will change how we do things? You need to do some research.
A new technology that is currently being implemented is the interactive table/ keyboard. This will enable programmers to specifically tailor make the keyboard with specific buttons with their associated program. This tabletop can have potential to increase efficiency with the business context as the customer can interact more efficiently with the computer than an operator.

http://www.youtube.com/watch?v=LtKQNwqNLLk

Wednesday, September 23, 2009

Week 2 (chapter 2)


Q1. What is the difference between an 'appli
cation' and a computer-based information systems?

An application is a software that is specified for a sp
ecific task. For example Adobe Photoshop is an application specified for editing photographs. A computer-based information system is a broader term that encompasses the hardware of the computer, the software, the databases, the internet the system is connected to, the network, the people involved with the network and the procedures.

Q2. What are strategic information systems?


A strategic information system (or SIS) is a system that deals with problems and problems and helps with decision making. A SIS creates a faster more efficient response to changes in the environment.

Q3. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?

the five forces that endanger a firm's position in the market place, according to Porter, are:
1-the entry of new competitors
2-the threat of substitutes for the product/service
3-the bargaining influence/ power of buyers (usually is influenced by number of buyers)
4-the bargaining influence/power of sellers (again is usually influenced by the number of sellers)
5-rivalry among the existing competitors. (ie. driving the prices down, or price wars)
http://www.valuebasedmanagement.net/methods_porter_five_forces.html

Q4. In relation to Porter's value chain model, what is meant by primary activities and support activities, and how does IT support these activities?

The main concept of Primary activities is that they are the main phases that are used to create the product and distribute it to customers. The support activities refers to the resources used to assist the functioning of the primary activities. IT supports this by keeping measure of statistics, communication with subsidiaries and recording and transacting in the procedures.


http://upload.wikimedia.org/wikipedia/commons/7/70/Porter_Value_Chain.png

Q5. Discuss the logic of building information systems in accordance with the organizational hierarchical structure.

The logic of building a information system in accordance with the organizational hierarchical structure is that members of higher management have access and authority to certain sections and parts of the IT system. This can be created using passwords and security key codes.

Q6. How has the Internet affected each of the five forces in Porter’s competitive forces model.

1-the entry of new competitors - the internet has enabled new competitors to broadcast and advertise to make their entrance into the market more easier, it also enables them to sell their products without the need of retail.
2-the threat of substitutes for the product/service - the internet has allowed communication of information more viable and accessible, thus allowing more consumer knowledge of alternate substitutes.
3-the bargaining influence/ power of buyers - Internet marketing has enabled a globalized market allowing consumers from different nations buying resources from other nations which can cause shortages of resources.
4-the bargaining influence/power of sellers - the internet allows easier access of more aggressive competitors that can lead to price wars and the removal of less competitive sellers from the market.
5-rivalry among the existing competitors - the internet has lead to a more efficient, faster knowledge of competitors pricing, thus, causing a more immediate response to competition and thus more aggressive price wars and rivalry.

Thursday, September 17, 2009

Week 2 (chapter 1)

Q1. What are the characteristics of the modern business environment?

The characteristics of modern business environments is that it involves many entities and subsidiaries that have daily interconnected exchanges between customers, businesses and governments. For this to exchange to function as it does today, many sources, equipment and materials of communications are used to connect businesses, customers and entities. A key part of this is the Information Technology systems that companies use to communicate with one another. For example, computers, the internet, mobile phones etc. are examples of communication devices that a modern company would see as a necessity. As seen in the picture below, computers and IT systems are the modern day work horse of the business world.


http://www.florisbank.co.uk/images/London_Stock_Exchange.jpg

Q2. What is meant by a web-based, global platform, what does it provide, and how has it affected business?

A web-based, global platform refers to the Internet and world wide web that connects a vast global community. The web-b
ased, global platform enables businesses and customers to interact and communicate at a comparatively in-expensive and convenient way. It has enabled efficiency, within businesses, in terms of communication and has reduced barriers between countries and continents.

Q3. What are the main pressures that characterize the modern global business environment?

The main pressures that characterize the business environment of today are governmental bodies, resources, production costs and social pressures. Currently as the world becomes more globalize and businesses begin to move marketing and production to new frontiers and countries, global governing bodies pressure clarity and disclosure of businesses. As companies sometime breach ethical boundaries it is important that global businesses communicate certain amounts of its operating procedures so the global community can judge if the practices of the business meets ethical standards. Resources are also another pressure mounting upon businesses. The more cost efficient the resources are cheaper the final product is, and thus the more competitive your product is. Efficient resources are complied from connections between various businesses across the globe. Therefore a good communication channels between businesses are essential.
Q4. What are/discuss some of the common, IT oriented organizational responses to these pressures?

Pressure for clarity in the business's operations is an external pressure from government agencies and shareholders that the company interacts with. A response to this pressure of disclosure, companies display income statemen
ts on the company websites to provide assistance for shareholders of the company and for investment agencies.
Intercommunication between business and business-to-business marketing still relies mainly on a face-to-face contact, however as marketing becomes more and more depended on IT, organizations are starting to interact and market with more technological and web-based solutions. Online markets make it easier for businesses to find the best deals on resources and improve efficiency in time management.

Q5. How are IT architecture and IT infrastructure are interrelated.

Just as a building is first planned and designed then built, so must the IT systems in a large business be planned and built. The architecture of a building is the design and the plan of the building and the infrastructure of the building is the physical structure of the building. Similarly the architecture is the general plan on the purpose of the IT system in particular how it will be used by the company. The IT infrastructure is the implements of the IT system. The physical components of the IT like hardware, monitors, projectors, desktops, notebooks, internet connection etc. are selected to meet the IT architecture or original plan of the business. More importantly the software on the computer systems are a key component that generally reflects the architecture of the system. For example, a design firm will require a computer with high power graphics, high RAM and large memory and would include software packages such as Adobe creative suite and vector works. An accounting firm on the other hand would require the basic computer functions but will need applications such as MYOB and windows excel.

Q6. Is the Internet an infrastructure, an architecture, or an application program? or something else. Why?

The internet is not a infrastructur
e, architecture or an application but something else. It is a global network of computers connected to form a community. It does not belong to a single entity and is seen as a public good. The internet exist outside telecommunication companies and is not controlled by a single individual. The internet is not a physical equipment but needs physical machines to run. The internet is also not planned and is not really catered for a specific purpose. That is why the internet is not categorized as an infrastructure, architecture or application. The picture below shows various routes a computer can go in a portion of the internet.

http://upload.wikimedia.org/wikipedia/commons/thumb/d/d2/Internet_map_1024.jpg/300px-Internet_map_1024.jpg