Question

In: Computer Science

Question 1 [20] An analysis of a basic Information Systems Architecture easily reveals that an information...

Question 1 [20]


An analysis of a basic Information Systems Architecture easily reveals that an information system is comprised of three main perspectives, which are [i] Technology [ii] People and [iii] Organizational. The organizational perspective has to do with operational procedures and how information strategic decisions are made. It also has to do with the structure, politics and culture of the organization.


a. Write analytically about the Technology and People perspectives of an information system and identify the components in each perspective.

Solutions

Expert Solution

Many of the students understand that the information system has something to do with databases or spreadsheets. Others mention computers and e-commerce. And they are all right, at least in part: information systems are made up of different components that work together to provide value to an organization.

They are made up of Five components: hardware, software, data, people, and process. The first three, fitting under the technology category, are generally what most students think of when asked to define information systems. But the last two, people and process, are really what separate the idea of information systems from more technical fields, such as computer science. In order to fully understand information systems, students must understand how all of these components work together to bring value to an organization.

When thinking about information systems, it is easy to get focused on the technology components and forget that we must look beyond these tools to fully understand how they integrate into an organization. The people involved with information systems are an essential element that must not be overlooked.

People are involved in information systems in just about every way you can think of: people imagine information systems, people develop information systems, people support information systems, and, perhaps most importantly, people use information systems.

Perspectives on Information Systems :-

An information system is a set of interrelated components that collect or retrieve, process, store, and distribute information to support decision making and control in an organization. Information systems can also be used to analyze problems, visualize complex subjects, and create new products.

Information is data, or raw facts, shaped into useful form for humans.

This includes "not only the users, but those who operate and service the computers, those who maintain the data, and those who support the network of computers. that are as follows :-

Systems Analyst :-  The role of the systems analyst is to straddle the divide between identifying business needs and imagining a new or redesigned computer-based system to fulfill those needs. This individual will work with a person, team, or department with business requirements and identify the specific details of a system that needs to be built. Generally, this will require the analyst to have a good understanding of the business itself , the business processes involved, and the ability to document them well. The analyst will identify the different stakeholders in the system and work to involve the appropriate individuals in the process. To become a systems analyst, you should have a background both in the business and in systems design. Many analysts first worked as programmers and/or had experience in the business before becoming systems analysts.

Programmer :-  Programmers spend their time writing computer code in a programming language. In the case of systems development, programmers generally attempt to fulfill the design specifications given to them by a systems analyst. Many different styles of programming exist: a programmer may work alone for long stretches of time or may work in a team with other programmers. A programmer needs to be able to understand complex processes and also the intricacies of one or more programming languages. Generally, a programmer is very proficient in mathematics, as mathematical concepts underlie most programming code.

Database Administrator :-  A database administrator (DBA) is the person who manages the databases for an organization. This person creates and maintains databases that are used as part of applications or the data warehouse. The DBA also consults with systems analysts and programmers on projects that require access to or the creation of databases.

___________________________________please LIKE the answer____________________________________


Related Solutions

Question 2 [20 Marks] You are provided with the following information. Conduct an ABC analysis, categorising...
Question 2 [20 Marks] You are provided with the following information. Conduct an ABC analysis, categorising each item of stock appropriately. (80% = A, 15% = B, 5%=C Item no. Unit cost (R) Annual Demand 101 5 48 000 102 11 2000 103 15 300 104 8 800 105 7 4800 106 16 1200 107 70 18000 108 4 300 109 9 5000 110 12 500
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
Fill in the first blank for each question. 1.  (________) Data not organized or easily interpreted by...
Fill in the first blank for each question. 1.  (________) Data not organized or easily interpreted by traditional databases or data models. 2.  (________) A database management system such as MongoDB that uses a document model made up of collections and documents to store data. 3.  (________) is a characteristic or property of an entity 4.  (________) a quality that allows you to change the structure of a database 5.  (________) A relational database concept that sets rules called integrity constraints on table relationships
QUESTION 3 (20 MARKS) QUESTION 3 (20 MARKS) An analysis of the Business School graduates found...
QUESTION 3 QUESTION 3 An analysis of the Business School graduates found that 210 out of 318 randomly selected graduates used An analysis of the Business School graduates found that 210 out of 318 randomly selected graduates used  a statistical inference technique during their first year of employment.a statistical inference technique during their first year of employment. (a) Calculate a 90% confidence interval for the proportion of graduates who used a statistical inference (a) Calculate a 90% confidence interval for the...
In a tabular format given below, name the three basic levels of financial information systems in...
In a tabular format given below, name the three basic levels of financial information systems in a typical business organization and state in each case the kind of support that each gives to management in decision making. Provide two sub-systems under each level. Basic Level Support to Management Sub-systems
Question 1 (20 Marks) 1.1 The responsibility for the management of information resources is advancing at...
Question 1 1.1 The responsibility for the management of information resources is advancing at a blinding pace. By use of some examples, list and explain the EIGHT (8) major management challenges in digital firms. 1.2 How can firms obtain value from their investments in Knowledge Management Systems? Discuss the SIX (6) management issues and challenges raised by Knowledge Systems?
QUESTION 1 Information Systems (ISs) allow for teamwork and collaboration regardless of place, time and venue...
QUESTION 1 Information Systems (ISs) allow for teamwork and collaboration regardless of place, time and venue (provided that one has internet connectivity). In view of the covid-19 outbreak, the social distancing as recommended by the World Health Organization / National Health Ministries of various countries and lock-downs declared nationally and internationally; many business including universities have resorted to working remotely and / or virtually to keep them operational. As students of Information System Strategy, DISCUSS four collaborative software/systems/platforms (learning management...
1. Enterprise Architecture analysis and design model 2. How to collect the pattern or significant feature...
1. Enterprise Architecture analysis and design model 2. How to collect the pattern or significant feature of security architecture? 3. How to setup the weighting and rating for security architecture parameters?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT