Tuesday, October 4, 2011

Weekly Questions Week 8

Weekly Questions (Week 8)
Chapter Seven: Networks, Telecommunications and Mobile Technology

Wireless Technologies(Image 1)
1.Explain the business benefits of using wireless technology.
Wireless technology has provided businesses with many benefits. Wireless technology allows the user to access the internet through satellites, allowing personnel access to information such as reports, and files whenever they are needed. This has also enabled employees to work in any location, not just in the office. As such, this allows employees and owners to balance work and private life. Another benefit of wireless technology is the ability to manage and ‘keep track’ of inventory. Through the use of RFID technology, businesses are able to maintain ‘up-to-date’ information.


2. Describe the business benefits associated with VoIP
VoIP (Image 2)
Benefits associated with Voice over IP include: 
  •  Cost saving – transmits national and international calls over internet and existing network, with little or no call charges
  • Productivity gains – conference and video calling allows for easy communication between business personnel. 
  • Able to transfer reports, pictures and other documents to personnel instantly whenever they are needed
3. Compare LANs and WANs
Example of LAN (Image 3)
Local area networks (LANs) are a connection of a group of computers or devices in a small proximity/limited geographical area. However, Wide area networks (WANs) are a connection of LANs, computers and other devices in a wider geographical area, whereby users are able to use computers in one location to communicate with other computers in another location.
Example of WAN (Image 4)




4. Describe RFID and how it can be used to help make a supply chain more effective.
 Radio frequency identification (RFID) technologies use tags which transmits data/information to an electronic reader in the form of radio waves. There are 2 forms of RFID, passive and active. Passive RFID have no internal power source and can ‘power up’ to send data with a faint signal from the RFID reader, however active RFID have internal power and are able to send stronger signals and more accurate data. 
RFID (Image 5)
Radio frequency identification technologies can make a supply chain more effective because it allows the business to reduce the time and costs associated with tracking assets such as inventory. Items equipped with these tags only need to be in the range of a RFID reader to receive and send data to the server. This reduces the time and costs of workers needing to physically scan barcodes.

For Further information, visit: 


Mobile Technology (Image 6)
5. Identify the advantages and disadvantage of deploying mobile technology
Advantages:
  • The ease of sharing information
  • Provides flexibility, user convenience
  • Ease of implementation 
  • Able to manage inventory, data is continuously up-to-date
  • Allow employees to communicate more efficiently  
 Efficient communication between employees(Image 7)
Disadvantages:
  • Radio wave interference may occur if there are multiple antennas. This may disrupt signals and cause the loss of data
  • Sending and receiving data is slower compared to fiber optics












Monday, October 3, 2011

Weekly Questions Week 7




Weekly Questions (Week 7)
Chapter 6: Databases And Data Warehouses

Database(Diagram 1)
1. List, describe, and provide an example of each of the five characteristics of high quality information.
Accuracy – are values input correct e.g. correct spelling of names, addresses and phone numbers
Completeness – missing or incomplete values e.g. missing first names, phone numbers, email address
Consistency – standard of data input is kept the same for particular values e.g. standard date format, capital letters for names
Uniqueness – no duplication in data, whereby data such as events and transactions are represented only once in information e.g. duplicate customers 
Timeliness – is the information current (up-to-date)? e.g. changes in customer phone numbers or addresses
2. Define the relationship between a database and a database management system.
A database is a system used to store and organise important information through the use of fields, records and 2 dimensional tables. Data stored could include sales data, inventory data, transactions and people. Database management systems are programs used in the creation and maintenance of databases, and allow multiple users to access, store and retrieve information from a database. 
Database Management System (Diagram 2)
  For further information, visit:
3. Describe the advantages an organisation can gain by using a database.
Advantages gained from the use of Databases include:
Database made up of many records and tables(Diagram 3)
  • Increased flexibility – Able to update and change data easily and quickly. An individual only needs to input data once in the database and this transfers to various areas. The user can search for specific information more easily.
  • Reduced information redundancy - Reduces duplication and storage of information in multiple areas which results in inconsistencies.
  • Increased information quality – As a result of ‘Relational integrity constrains’ and ‘business- critical integrity constraints’, data entered must meet specific requirements (e.g. 10 digits). As such, this will keep a high quality standard throughout the database. 
  • Increased information security – Makes data more secure because databases allow authorisation and authentication, limiting the information available to only approved individuals  
4. Define the fundamental concepts of the relational database model.
Relational Database Model (Diagram 4)
A relational database model contains many records and 2 dimensional tables. These 2 dimensional tables are then joined together, which enables an individual to find specific information, without having to alter table formats. In relational databases, primary and foreign keys must be established in order to form a relationship between data. Primary keys have great importance as they are used to identify entities (e.g. customer ID). "Primary keys in one table which appear as an attribute on another are called foreign keys"(Baltzan, Philips, Lynch & Blakey 2010).As such, this provides a link between data (tables), allowing a user to find information needed.   

For further information, visit:
5. Describe the benefits of a data-driven website.
  • Development – Changes and updates to a website can be made by the business owner with ease.
  • Future expandability – website is able to grow at a fast rate because of the ease of adding and modifying page layouts, features and functions on a website
  • Content management & Minimizing human error – Data is entered once, thereby reducing information redundancy
  • Cutting production and update costs – Altering and updating a data driven website is more cost effective and less time consuming then altering a static website. A data driven sites can be altered by a competent administrative person who could be trained within a day. However, a programmer’s training would take months, adding to the cost of the business.
  • More efficient- Site Layouts, features and structures would only need to be altered once and these changes will be implemented to the areas and pages necessary. A data driven infrastructure not only saves time when making alterations, but also improves the reliability and stability

Sunday, October 2, 2011

Weekly Questions 6









Week 6 Questions

What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information architecture identifies where and how important information, such as customer records is maintained and secured and is very useful for planning. Information infrastructure is the actual implementation that will provide for effective information systems, including the hardware, software, services and people involved. These differ because one is a plan and the other is the implementation of the plan. They relate to each other because there can not be one without the other.
Describe how an organisation can implement a solid information architecture
For an organisation to have a solid information architecture they need to have:
  • A backup and recovery system: A backup is an exact copy of a systems information and Recovery is the ability to get a system up and running in the event of a system crash or failure
  • A disaster recovery plan: A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.
  • Information security: Such as managing user accounts and keeping up to date antivirus software and patches.

List and describe the five requirement characteristics of infrastructure architecture.
The five requirement characteristics of infrastructure architecture are:
  1. Flexibility: The ability to meet all types of business changes
  2. Scalability: How well a system can adapt to increased demands and meet growth requirements.
  3. Reliability: Ensures all systems are functioning correctly and providing accurate information. High accuracy, low accuracy puts organisations at risk.
  4. Availability: Addresses when systems can be accessed by users. This ensures business continuity
  5. Performance: Measures how quickly a system performas a certain process or transaction.

Describe the business value in deploying a service oriented architecture
A service oriented architecture is a business driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services. By using a service orientated architecture businesses are able to innovate by ensuring that IT systems can adapt quickly, easily and economically to support rapidly changing business needs.

What is an event?
An event is the eyes and ears of the business expressed in technology- they detect threats and opportunities and alert those who can act on the information.

What is a service?
A service must appeal to a broad audience and need to be reusable if they are going to have an impact on productivity.

What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?

The emerging technologies that companies can use to increase performance and utilise their infrastructure more effectively are Virtualisation and Grid Computing. Virtualisation is a framework for dividing the resources of a computer into multiple execution environments. It is a way of increasing physical resources to maximise the investment in hardware. Grid Computing is an aggregation of geographically dispersed computing, storage and network resources, coordinated to deliver improved performance, higher quality of service, better utilisation and easier access to data


All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)
Accuracy – are values input correct e.g. correct spelling of names, addresses and phone numbers
Completeness – missing or incomplete values e.g. missing first names, phone numbers, email address
Consistency – standard of data input is kept the same for particular values e.g. standard date format, capital letters for names
Uniqueness – no duplication in data, whereby data such as events and transactions are represented only once in information e.g. duplicate customers 
Timeliness – is the information current (up-to-date)? e.g. changes in customer phone numbers or addresses
2. Define the relationship between a database and a database management system.
A database is a system used to store and organise important information through the use of fields, records and 2 dimensional tables. Data stored could include sales data, inventory data, transactions and people. Database management systems are programs used in the creation and maintenance of databases, and allow multiple users to access, store and retrieve information from a database. 
Database Management System (Diagram 2)
  For further information, visit:
3. Describe the advantages an organisation can gain by using a database.
Advantages gained from the use of Databases include:
Database made up of many records and tables(Diagram 3)
  • Increased flexibility – Able to update and change data easily and quickly. An individual only needs to input data once in the database and this transfers to various areas. The user can search for specific information more easily.
  • Reduced information redundancy - Reduces duplication and storage of information in multiple areas which results in inconsistencies.
  • Increased information quality – As a result of ‘Relational integrity constrains’ and ‘business- critical integrity constraints’, data entered must meet specific requirements (e.g. 10 digits). As such, this will keep a high quality standard throughout the database. 
  • Increased information security – Makes data more secure because databases allow authorisation and authentication, limiting the information available to only approved individuals  
4. Define the fundamental concepts of the relational database model.
Relational Database Model (Diagram 4)
A relational database model contains many records and 2 dimensional tables. These 2 dimensional tables are then joined together, which enables an individual to find specific information, without having to alter table formats. In relational databases, primary and foreign keys must be established in order to form a relationship between data. Primary keys have great importance as they are used to identify entities (e.g. customer ID). "Primary keys in one table which appear as an attribute on another are called foreign keys"(Baltzan, Philips, Lynch & Blakey 2010).As such, this provides a link between data (tables), allowing a user to find information needed.   

For further information, visit:
5. Describe the benefits of a data-driven website.
  • Development – Changes and updates to a website can be made by the business owner with ease.
  • Future expandability – website is able to grow at a fast rate because of the ease of adding and modifying page layouts, features and functions on a website
  • Content management & Minimizing human error – Data is entered once, thereby reducing information redundancy
  • Cutting production and update costs – Altering and updating a data driven website is more cost effective and less time consuming then altering a static website. A data driven sites can be altered by a competent administrative person who could be trained within a day. However, a programmer’s training would take months, adding to the cost of the business.
  • More efficient- Site Layouts, features and structures would only need to be altered once and these changes will be implemented to the areas and pages necessary. A data driven infrastructure not only saves time when making alterations, but also improves the reliability and stability

Weekly Questions week 5


Weekly Questions (Week Five)
Chapter Four:  Ethics and Security
1.Explain the ethical issues surrounding information technology.
Ethics (Image 1)
The development of information technology has raised many ethical issues including the protection of intellectual property, copyright, and the use, distribution and sales of pirated and counterfeit software. Security in relation to the protection of private Company and consumer information is also a major ethical issue that may arise.

For Further information, visit:

Textbook: Baltzan, Philips, Lynch & Blakey, Business Driven Information Systems (Australian/New Zealand edition) pg 169

2.      Describe a situation involving technology that is ethical but illegal.
When an individual purchases a program or software and makes a copy of it in the situation that the original is stolen or damaged. The act of copying the software is a violation of copyright and intellectual property laws and is deemed illegal. However, it can be considered ethical as the individual is making a copy incase the original is damaged, where it is for personal use, and  not intended to be sold or distributed.
Textbook: Baltzan, Philips, Lynch & Blakey, Business Driven Information Systems (Australian/New Zealand edition) pg 165

3.      Describe and explain one of the computer use policies that a company might employee
‘Email privacy policy’ is a computer use policy implemented by companies. This policy provides details on the use of company messaging systems (emailing). These policies need to be clear to employees and state the activities that are permissible and how the company system can be used for work or private purposes. The policy must also specify that when an email is sent, it will be in the providers computer (company), and under the Privacy Act 1988,companies can store emails sent by employees.     

 For further information, visit:

 Textbook: Baltzan, Philips, Lynch & Blakey, Business Driven Information Systems (Australian/New Zealand edition) pg 173
4.      What are the 5 main technology security risks?
Natural disasters (Image 2)
The Five main technology security risks include:
·         Human error: weak passwords, unaware of business procedures
·         Natural disasters: floods, fires, earthquakes, tsunamis
·         Management failure: lack-of or ineffective security systems, procedures and training
·         Deliberate acts: employees or cyber criminals stealing and corrupting data
·         Technical failures: system crashes and failures
5.      Outline one way to reduce each risk.
Human error (Image 3)
·         Human error can be reduced by implementing policies which require employees to regularly change passwords and have passwords with many letters, numbers and symbols. Auditors can also review employees who have misused information and companies can impose strong penalties.    
·         The Impact of natural disasters can be reduced by implementing ‘disaster recovery plans’ which are followed by the business after a disaster
·         Management failure can be reduced by implementing security systems and procedures which are understood by employees, and training employees on how to use the systems correctly
·         Deliberate acts can be reduced by having effective security systems. This includes firewalls, encryptions and authentication and authorisation procedures. 
·         Technical failures can be reduced by continuously reviewing and evaluating information systems and identify problems which need to be fixed before the failure occurs.

For further information, visit:
http://www.continuitycentral.com/feature0524.htm (Natural disaster plan)

Textbook: Baltzan, Philips, Lynch & Blakey, Business Driven Information Systems (Australian/New Zealand edition) pg 186,187, 216

6.      What is a disaster recovery plan, what strategies might a firm employee?
A disaster recovery plan details the procedures and processes a business must undertake to be able to recover information or access information systems due to natural disasters or ‘man-made’ situations in order to minimise the implications a business may experience. These implications may include the loss of consumer information, business records, and ‘downtime’ (business’ inability to continue operations leading to loss of consumers, revenue, and reputation). The disaster recovery plan should include the locations of where back-up data is kept and detail ‘hot and cold sites’ where employees can go to after a disaster and the a location the business can resume operations. 
Disaster Recovery Plan Timeline (Image 4)

For further information, visit: 

Textbook: Baltzan, Philips, Lynch & Blakey, Business Driven Information Systems (Australian/New Zealand edition) pg 216






 Image Reference:
Image 1 - http://blog.b92.net/text/15361/Business-Ethics-and-Us/ 
Image2 - http://www.armageddononline.org/natural-disasters.html 
Image3 - http://www.perfectserve.com/practice/overview.html