StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Information System Brief - Essay Example

Cite this document
Summary
Computer Information System Brief Name of Author Author’s Affiliation Author Note Author note with more information about affiliation, research grants, conflict of interest and how to contact Computer Information System Brief Identify Kudler's key business and accounting information needs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Computer Information System Brief
Read Text Preview

Extract of sample "Computer Information System Brief"

Download file to see previous pages

It is easily understood that Kudler has appropriately invested and organized their computer information method for various business functions. To develop the organization’s computer information system, it is necessary to identify the key business and accounting information needs such as strengths and weaknesses, opportunities as well as threats that Kudler may encounter. “The accounting firm discovered many troubles in the current information system for Kudler’s Fine Foods. While investigating Kudler’s Fine Foods’ key business and accounting needs, it was determined that they are in need of many changes” (Kudler Fine Foods Information System Analysis, n.d., para. 2). To correctly evaluate and suggest a successful computer system and make assessments based on: 1) Key business and accounting information requirements of Kudler’s Fine Foods. 2) Identifying Kudler’s current computer information system 3) Explaining advantages received from technological improvements in Kudler’s business. 4) Recognizing strengths and weaknesses by way of probable technology threats.

The management of Kudler understands that using computer information technology enhances the accounting operations of the company and helps in meeting their company requirements. The computer information system in Kudler feels that food incorporation will develop the communication system between their retail stores by connecting every point-of-sale terminal, altering just-in-time procedure of inventory control management and cooperating with workers, clients as well as dealers to bring foodstuffs to market as quickly and cost efficiently as possible.

Besides, by forming a virtual company, Kudler will be capable of expanding a well-organized distribution infrastructure in addition to organizing network of citizens and monetary resources to rapidly make profits for the company. Analyze the strengths and weaknesses of Kudler’s current computer system and technology use, including hardware and software. At the present, most organizations use Information Technology (IT) to enhance functions and develop consumer service. Kudler Fine Food has plans to promote the inventory and ordering mechanization by setting up new e-commerce abilities and an online cookery linkage.

Strategic Information Systems of Kudler Fine Foods Company have the capability to amplify strengths into possibly sustainable competitive benefit. Strengths of Kudler’s current computer system are as follows: Easily assessing all costs associated and completion targets. Ease of preservation and maintenance. Tolerates alterations in Management Information System staffing. Documentation of all the activities in all the locations. Well defined user input. Controls all the activities taking place in all the locations.

Weaknesses of Kudler’s current computer system include: Increased development time. Enlarged cost of development. Inflexibility. Difficulties in estimating expenses and projecting overruns. Explain what opportunities Kudler has in terms of technology and provide suggestions for improving Kudler's ability to maximize these opportunities: The Kudler’s food store was established by Kathy Kudler. Kathy enjoys cooking epicure foods and realized an opportunity to give her cooking to the public as a source to obtain revenue.

Her stores give the most delicious domestic and imported food items such as pastries and other fresh baked eatables, fresh meat, fresh produce and seafood, packaged food and condiments, specialty

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Information System Brief Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1434559-computer-information-system-brief
(Computer Information System Brief Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/finance-accounting/1434559-computer-information-system-brief.
“Computer Information System Brief Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/finance-accounting/1434559-computer-information-system-brief.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Information System Brief

Management information system

According to (Caldwell 175) computer security has five fundamental functional areas which are listed below: Risk Avoidance This is a basic security fundamental which deals with questions like unrestricted internet access, business engaging in risky activities and standardization on a desktop operating system.... Prevention This consists of implementing security to the system in order to avoid any attacks.... Deterrence It deals with the threats to information assets, consisting of communication strategies which are developed and designed to catch the intruders when they attack the system....
8 Pages (2000 words) Essay

History of Operating Systems

Today's computing system can be traced back to the 'Harvard Mk I' and Colossus (both of 1943).... Colossus was an electronic computer built in Britain at the end 1943 and developed to crack the German coding system - Lorenz cipher.... Today's computers also have huge speed and capacity for information processing compared to computers of the past, and they have become exponentially more powerful over the years (a phenomenon known as Moore's Law)....
6 Pages (1500 words) Essay

The PC: 35 Years and Computing - Computer Crime

Ever since the inception of computers, some computer users pose to be a threat for the In the mid 1970's when the personal computer was not as common as the current times, computing attacks were done on the telephone systems for example John Draper hacked the AT&T system to make free long distance calls.... Randy (2009) pointed out that he achieved to get through the respective system by a simple whistle which he got in a cereal box.... The recipient enters his personal information in response, thinking that it is a genuine banking process....
6 Pages (1500 words) Essay

The History of Computer Programming

In the 1940s, computer coding was done manually and then entered into the system as the systems were slow and had limited memory.... It involves the use of programming languages to design, write, test, and maintain computer program source codes.... computer programming has advanced greatly since its… computer codes developed through phases namely first generation code (machine language), second-generation code (assembly language) and third generation code (high level language)....
5 Pages (1250 words) Research Paper

Charles Babbage and His Lifetime

This essay "Charles Babbage and His Lifetime " proposes to discuss Charles Babbage's contribution to the development of computer technology through his work on The Difference Engines and The Analytical Engines.... nbsp;… His extensive work in other areas such as mathematics, economics and business management have made significant contributions to society, and it can be observed that all these have the common Charles Babbage (1791-1871) a mathematician, scientist, and economist, is well-known as the “father of computing” for his invention of the modern computer....
7 Pages (1750 words) Essay

Latest Advances in Hotel Computer Systems

This paper outlines a brief backgrounder of the subject and future technologies.... Hotel chains quickly seized on the opportunity offered by the technology because the system posed dramatic potential in regard to centralizing day-to-day operations as well as addressing the emergent challenges that came with global expansion and the dynamism of the hospitality landscape.... The main thesis of this paper is that the latest advances in a hotel computer system, which is characterized by high-technology and increasing reliance on the internet, demonstrates the immense benefits of using computer technology in order to support the expansion of hotels globally and the streamlining of operations that increase profitability....
9 Pages (2250 words) Term Paper

The Impact of Computer Viruses on Business and Users

Loss of files, unusual changes in computer operations, slow functions performed by the computer and corrupted files are also the indication of viruses in the computer system.... The viruses that affect the whole functions or memory of the computer are, of course, posing a threat to the data stored in the computer system.... The viruses that enter the computer multiply them by created and spreading in each section of the system.... hellip; In the modern age, computers have taken the responsibility of storing large amounts of data and information....
6 Pages (1500 words) Essay

Information Technology and Information System Security

… The paper "Information Technology and information system Security" is an engrossing example of coursework on information technology.... The paper "Information Technology and information system Security" is an engrossing example of coursework on information technology.... It is a methodology implemented on the basis of different types of threats, vulnerabilities, and methods of system attack in relation to security threats.... This clearly indicates that modifications such as developing a more generic methodology should be considered to minimize the exposure of my computing system and data to huge threats and vulnerabilities....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us