Thursday, May 28, 2009

WEEK TEN QUESTIONS

Chapter 8 questions

Section 8.1 - Before You Go On…

1.What is a Transactional Processing and the role of TP systems. State the key objective of TP/TPSs.


Transactional processing is capturing and storing in a database any business event that is worthy of doing so. The role of transaction processing systems (TPSs) is to monitor, collect, store and process data generated from all business transactions. Their objective is to avoid problems such as errors, downtimes, inaccuracy and insecurity of data, and to maintain the privacy of data.

Section 8.2 - Before You Go On…

1. What is a functional area information system? List its major characteristics.


A FAIS is to provide information mainly to lower and middle lever managers in the functional areas. It is a system that supports particular functional areas of the business. Traditionally they were built independent of each other and were designed to increase effectiveness and efficiency.

A FAIS comprises of reports:
Routine reports: these are produced at scheduled interviews.
Drill-down reports: are far more specific, and show a greater level of detail
Key-indicator reports: make a summary of the performance of critical activities, such as finances.
Competitive reports: makes comparisons between the performance of different business units or time periods.
Exception reports: include only the information that falls outside certain threshold standards.

2. How does an FAIS support management by exception? How does it support on-demand reports?

Functional area and information systems supports management by exception, by providing reports that meet certain criteria. Reports that might exceed normal or be written as normal can be produced without any intervention.

Management in order to implement management by exception, needs to create performance standards. Then systems need to be set up to monitor performance, compare actual performance to the standards, and identify predefined exceptions.

Out of routine reports such as on demand (Ad hoc) reports include the following:
Drill-down reports: are far more specific, and show a greater level of detail
Key-indicator reports: make a summary of the performance of critical activities, such as finances.
Competitive reports: makes comparisons between the performance of different business units or time periods.

Section 8.3 - Before You Go On…

1. Define ERP and describe its functionalities.


Enterprise resource planning (ERP) systems integrate the planning, management and use of all of an organisation’s resources. ERP systems function in a way to tightly integrate the functional areas of the organisation and to enable information to flow seamlessly across the functional areas.

2. List some drawbacks of ERP software.
ERP can be very complex, expensive and quiet time consuming to implement.

A company may need to change existing business processes to fit the predefined business processes of the software, which can be a daunting task.

A company must purchase an entire software package of ERP even if they require only a few of the modules.

8.5 - Before You Go On…

1. Define a supply chain and supply chain management (SCM).


The supply chain refers to the chain of events that where materials, information, money and services flow from materials from production to retailer to end customers.
Supply chain management is the process of planning, organizing, and optimizing the supply chain’s activities.

2. List the major components of supply chains.

Upstream: where sourcing or procurement from external suppliers occurs.
Internal: where packaging, assembly, or manufacturing takes place.
Downstream: where distribution takes place, frequently by external distributors.

3. What is the bullwhip effect?

Refers to erratic shifts in orders up and down the supply chain. Management uses graphs from previous periods to analyse whether bullwhip effect has occurred.

Section 8.6 - Before You Go On…

1. Define EDI and list its major benefits and limitations


Electronic data interchange (EDI): is a communication standard that enables the electronic transfer of routine documents between business partners.

Benefits:
EDI enables different businesses to use agreed data formats
Minimises data error
Increases productivity by reducing time consumption
Increases customer satisfaction and service is enhanced because it is much faster

Limitations:
It requires massive start up.
Is expensive and takes long periods of ti

WEEK NINE QUESTIONS

Chapter 4 - Databases

1. What are some of the difficulties in managing data? –Firms have massive quantities of data which must be stored for long periods of time.
–In many business’s data is scattered into many different systems. By centralising the data we get better data, and better security.
–In order to make decisions strategically and politically, External data needs to be included, therefore it is important that data gathered must be secure and of high integrity.

2. What are the various sources for data?
Internal data: comes from entities within an organisation, such as corporate databases.
External data: comes from outside an organisation, can be gathered from commercial databases, government reports and corporate Web sites.
Personal data: such employee details, thoughts, opinions and experiences.

3. What is a primary key and a secondary key?
Primary key: an entity in a database that uniquely and accurately identifies a record.
Secondary key: identifies specific records, but is intended to index data rather than specifically identify. Such as product keys.

4. What is an entity and a relationship?
Entity: a person, place, thing or event such as a customer, which information is maintained about.
Relationship: a relationship is the way in which the entities relate to each other.

There are three types of entities: one to one, many to many and one to many.

5. What are the advantages and disadvantages of relational databases?
Advantages:
Provides a lot of flexibility in a variety of queries
Easy to tell which records are joined

Disadvantage:
If the overall design is too complex than it will have slow search and access times

6. What is knowledge management?
A process that helps organisations combine and manipulate all data sources and bring them to a central screen. This allows for data and knowledge to be organised and selected data on demand. Having such access to data is essential to an organisations success, because knowledge is a form of capital. A common knowledge management system is a portal.

7. What is the difference between tacit knowledge and explicit knowledge?
Tacit knowledge is highly personal and hard to formalize, it uses explicit knowledge to gain insight and expertise. It is basically under surface knowledge. Explicit knowledge is much more objective, detailed and rational. Explicit knowledge refers to the more technical type of knowledge.

WEEK EIGHT QUESTIONS

Chapter 5 Questions

1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.


Types of technologies and applications:
RSS: Really simple syndication, allows users to receive customized information on demand, without having to surf thousands of Web sites. RSS allows anyone to publish his or her blog, or any other content to anyone who is interested in subscribing.

Podcast and Vodcast: a podcast is a digital audio file of a soundwave that is distributed over the Web using RSS for playback on portable media players or personal computers. A videocast is similar, however it is a digital video file.

Tagging: a tag is a keyword or term that is meaningful to the person using it. It is used to describe a piece of information (e.g, blog, picture, article, video clip).

AJAX: a Web development technique that allows portions of Web pages to reload with fresh data, rather than refreshing the entire Web page.

Wikis: a wiki is a Web site on which anyone can post material for others to access. This material can be edited by anyone with access to the wiki. The most popular is Wikipedia.

Blogs and Blogging: a weblog or blog for short is a personal Web site, open to the public in which the site creator (blogger) can post any material they wish. Bloggers usually post stories, tell news, express their opinions or feelings and at times use it to submit university assessments., just as I am doing now.

Types of Web sites:
Social Networking: Web sites which allow users to upload their content to the Web in the form of text, voice, images, and videos. Other people can then access such content, usually with the posters’ permission. Social Networking Web sites allow people to interact with others from all over the world via the Web. The most popular social networking site is Facebook.



Image compliments of Facebook, accessed at www.facebook.com

Aggregators: Web sites that provide collections of content from other parts of the Web. A well known aggregator is Bloglines.

Mashups: this is when a Web site collects content from all over the web in order to “mix and match” the various taken material in order to create a new kind of content. Google Maps is credited for providing the beginning of mashups.

2. Describe the function of Web services.
Web services use different types of protocols and services which determines how data flows and communicates between technologies. Web services enable the use of data flow without human intervention necessary to translate the data.

3. Describe how you see Social Networking being used in Business.
Advertising! Businesses have grasped onto Social Networking sites such as Facebook and used them for advertising. Facebook is used by millions of people each day all over the world, advertising on Facebook is sure to promote any business.

Chapter 6 Questions


Section 6.1 - Before You Go On…

1. Define e-commerce and distinguish it from e-business.
E-commerce refers to the selling, purchasing and exchanging of goods, services and information via the internet. E-business is a broader term referring to the firms carrying out e-commerce and it’s supporting activities such as account clearing. E-business also refers to collaborating between business partners over the internet.

2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.
B2C is business to consumer. This is when the sellers are organizations and the buyers are individual consumers.
B2B: business to business. This occurs when businesses use the internet to buy and sell products off each other.
C2C: Consumer to Consumer. Refers to the online product transactions between consumers, Web sites such as eBay cater for this type of e-commerce..
B2E: Business to Employee. This is when a business uses e-commerce to provide information, services and benefits to its employees.

3. List some benefits and limitations of e-commerce.
Benefits
– Consumers and businesses regardless of their geographical positioning now have more buying power. They have ability to buy from anywhere in world, and at anytime.
– Being able to choose from various outlets to purchase products, means that the item could be purchased at a much cheaper price.
– Products that are difficult to purchase locally can be bought on the internet.

Limitations:
– Sadly because of the growing number of internet hackers, credit cards can be unsafe to use on internet.
– Insufficient bandwidth of the internet means that some goods are limited from being sold on the internet.
– Goods advertised on the internet cannot be physically inspected unless the purchaser is able to meet with the seller before any transaction is made.

Section 6.2 - Before You Go On…

1. What are spamming, permission marketing and viral marketing?

Spamming marketing: uses indiscriminate and unwanted emails that carry advertisements and promotions, spam emails are annoying and are always wanted to be blocked.

Permission marketing: is when a firm asks for permission to send advertisements and updates of their products, and/or the products of the partners. The permission is usually acquired when the person signs up for an account with the firm. For example creating an email account with MSN.

Viral marketing: refers to the concept of online “word-of-mouth” marketing. The idea is to have people forward electronic advertisements to their friends and peers.

Section 6.4 - Before You Go On…
1. What are micropayments?

Small payments made using an electronic device. Micropayments are usually done by SMS.

2. What is Multichanneling?
Multi channelling refers to when manufacturers use more than one channel to sell their products this is done by the company integrating its online and offline channels.

Section 6.5 - Before You Go On…

1. List some ethical issues in EC.
– Disintermediation: this refers to the removing of traditional intermediaries through the use of e-commerce.
– Privacy: people submit personal information on the internet, such as their home address. The people storing this information have the responsibility to ensure the information is used and stored in an appropriate and safe manner.
– Web tracking – Cookies: many businesses use internet cookies to track and advertise to any potential customers. Just like storing personal information, people that use cookies to track others need to be utterly responsible with the information they gather.

2. List the major legal issues of EC.
– Fraud: the misrepresenting of products and sales deals, in order to gather account details to steal money and/or other information. Fraud on the internet is a crime, however it is growing faster than ever as a result of EC.
– Domain names: competition over domain names has been common, however at times can be legal.
– Cybersquatting: is when a person or business registers or uses a domain name for the purpose of profiting from the goodwill or trademark belonging to someone else.
– Sales tax: buying from overseas avoids paying tax. When products are purchased from inter-state, the issue is which state government should receive the tax generated from the sale.
– Copyright: it is difficult to protect intellectual property in e-commerce. This is because of the large number of people and countries taking part in e-commerce, all with differing copyright laws.

Tuesday, May 26, 2009

WEEK 7 – TECHNOLOGY GUIDE 4

1. Describe the basic telecommunications system?
A telecommunications system makes use of hardware and software in order to transmit information from one location to another. Such a system can transmit text, data, graphics, voice, documents, or full-motion videos. A telecommunication system can use either analog or digital signals.
Analog signals are continuous waves which transmit information by altering their characteristics.
Digital signals are discrete pulses which makes use of the binary system. This is when bits are used to portray zeros and one, which represents a series of offs and ons. For example a fax machine uses these signals.


2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)
Ethernet is a computer networking technology used for Local Area Networks. It uses a number of wiring and signaling standards to connect computers. In contrast a Fibre optic cable is made of glass fibres which is surrounded and supported by a cladding. The cable uses light pulses to carry information, which therefore travels at light speed. It has a very high bandwidth. Fibre optics can be used to transmit information from one LAN to another, using a Fibre optic to Ethernet converter, like the one shown below.





3. What are the main business reasons for using networks?
– Networks enable instantaneous communication
– Networks enable the instantaneous transfer of data
o All with little ongoing costs


4. What is the difference between LANs and WANs?

The main difference between the two is the geographical region which they cover. A Local Area Network (LAN) connects two or more devices in a limited geographical region. For example in the same building. Conversely Wide Area Networks (WANs) cover large geographical areas, and usually connect multiple LANs.


5. What is a network protocol?

A network protocol is a system of computing devices, or “nodes” of the network that are connected to the same network access. They share this network to transmit and receive data.

6. Describe TCP/IP protocol
Transmission Control Protocol/Internet Protocol (TCP/IP) is a procedure which uses file-transfer, and packet switching to send large files on information with the assurance that the data will arrive in uncorrupted form. It is the communications protocol of the Internet, and is the reason why accurate information can be transferred on the Internet.