In: Computer Science
Identifying Key Organizational Resources
What comes to mind when you think of the term information systems? You might focus on the technological components that collect data and disseminate information. Or, you might focus on how people interact with information systems, such as how they use the information or how management information systems are implemented. Whichever aspect stands out, it’s important to know how information systems continue to grow and affect organizations around the world.
In this Assignment, you will respond to a set of questions on information technology, management information systems, and hardware and software.
To prepare for this Assignment:
Submit your responses to the following prompts:
Note: For each prompt, be sure to reference at least one scholarly source to support your answer.
PLEASE ANSWER TO THE QUESTIONS!!! THANK YOU
1.Inforamtion:
Information is a stimuli that has meaning in some context for its receiver. When information is entered into and stored in a computer, it is generally referred to as data. After processing (such as formatting and printing), output data can again be perceived as information.
Eg: Name,Identification,Address,Contact,Biographical etc..
Inforamtion Technology:
Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data or information. IT is typically used within the context of business operations as opposed to personal or entertainment technologies.
Eg:
2. The main role of Management Information Systems is to report on business operations with the purpose of supporting decision making. This is to ensure that the organization is managed in a better and more efficient way so that it can be able to achieve full potential thus gain competitive advantage.
3. Two main types of Information System are:
Transaction Processing System (TPS):
By recording the day to day business transactions, TPS system provides answers to the above questions in a timely manner.
For example, banks that give out loans require that the company that a person works for should have a memorandum of understanding (MoU) with the bank. If a person whose employer has a MoU with the bank applies for a loan, all that the operational staff has to do is verify the submitted documents. If they meet the requirements, then the loan application documents are processed. If they do not meet the requirements, then the client is advised to see tactical management staff to see the possibility of signing a MoU.
Examples of transaction processing systems include;
Management Information System (MIS)
Management Information Systems (MIS) are used by tactical managers to monitor the organization's current performance status. The output from a transaction processing system is used as input to a management information system.
The MIS system analyzes the input with routine algorithms i.e. aggregate, compare and summarizes the results to produced reports that tactical managers use to monitor, control and predict future performance.
For example, input from a point of sale system can be used to analyze trends of products that are performing well and those that are not performing well. This information can be used to make future inventory orders i.e. increasing orders for well-performing products and reduce the orders of products that are not performing well.
Examples of management information systems include;
Tactical managers are responsible for the semi-structured decision. MIS systems provide the information needed to make the structured decision and based on the experience of the tactical managers, they make judgement calls i.e. predict how much of goods or inventory should be ordered for the second quarter based on the sales of the first quarter.
4. Hardware: Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
Software: Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.
5. The three types of hardware required to support a company’s operations are
1. A Desktop or Laptop Computer
Whether you're using custom desktop computers, easy to move laptops, to multi-user workstations, make sure you're working with a reputable company for your computing needs. Weigh whether you want a desktop or laptop computer. You'll need products that will last for several years and hardware that will require minimal upkeep or maintenance. Luckily, there are plenty of quality computer and great laptop options available on the market.
2. External Hard Drive
Some computers in your network may need an external hard drive to store certain types of information and help you stay organized. An external hard drive can be a wise investment for startup businesses that don't want to store information in the Cloud or on their computers' hard drives.
External hard drives can protect valuable and sensitive business data in the event of an accident, such as a fire. You can use these as back-up devices for certain types of data and even invest in a system with built-in locks and extra layers of security to prevent theft.
3. Wireless Router
Keep your office or workspace connected to the Internet wirelessly with a wireless router. A strong wireless connection can ensure high-speed connectivity to all linked computers and mobile devices. If you have a small space, keep in mind that working wirelessly will reduce the need for extra cables running in and around your office.
6. The three types of software required to support a company’s operations are
Security Software:
The first thing you’ll need to know about security software is that you are in danger. Your data is being targeted by innumerable entities that are looking to steal it from you for their own gains. In fact, for every threat that is developed to breach network security, there has to be a solution created that mitigates it. This fact has led to a massive security market in which consumers, even the IT-savvy ones, are left overwhelmed and scratching their heads. Some threats include:
Some examples of security software include: Access control,Anti-virus etc..