StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Foundations of Business Computing - Essay Example

Summary
The paper "Foundations of Business Computing" is a good example of an information technology essay. Network engineer job is to maintain, install and support networks of computer communication between the firms or within the firm. A database administrator has duties of security, integrity, and performance of a database…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful

Extract of sample "Foundations of Business Computing"

Running Header: Foundations of Business Computing Student’s Name: Student number: Instructor’s Name: Course Code & Name: Date of Submission: Student Declaration: Contents Running Header: Foundations of Business Computing 1 Contents 1 Foundations of Business Computing 1 Career Opportunities in Information Systems and Related Fields 1 Grid Computing 1 Information Accuracy, Information Privacy, and Information Property 1 Culture 2 CIO 2 Risk analysis 2 Virus 3 In-sourcing 3 Encryption 3 Human-Based Approaches for Safeguarding Information Systems 4 Multidomestic Business Strategy 4 Data Warehouses and Data Marts. 4 Internally and Externally Focused Systems 4 Self-publishing 5 Transborder Data Flows 5 Flattening the World 5 This means that infrastructure of information technology will propel expansion of world economy and globalization in the current century. The advancement of technology increase productivity, expose comparative advantages, efficiently flattening the landscape of competition. Friedman suggested that the Berlin wall fall permitted people to think about universe in a unique way as one community, as a single market, and a single ecosystem (Tom 2004, p. 68) 6 Customised and Packaged Applications 6 Emerging Trends in Consumer-to-Consumer e-Commerce 6 Types of intelligent agents 6 Support and Confidence in Data Mining 7 References 8 Joverly 2009, In-sourcing or Outsourcing?, viewed 20 January 2011, 8 Kim, s 20009, System Security: 5 Ways to Improve Your Defenses Against Attack, viewed 20 8 January 2011, 8 Laura, S 2010, CIO - Chief Information Officer, viewed 20 January 2011, 8 Marcel, H & Martin, L 1999, ‘Architectural support for data mining’. Workshop on Knowledge 8 Discovery in Databases, vol. 9, no. 4, pp. 217-228. 9 Nishith 2006, Open Source Analytics, viewed 20 January 2011, 9 9 Ralph, M, George, R, & George, W 2009, Fundamentals of Information Systems, Cengage 9 Learning Inc., New Jersey. 9 Searchsqlserver.techtarget.com 1999, Database Administrator, viewed 20 January 2011, 9 9 Tom, C 2004, So Why Do I Care? Management, Marketing, and Innovation Insights for a 9 changing world, Routledge Publishing, London. 9 Foundations of Business Computing Career Opportunities in Information Systems and Related Fields Network engineer job is to maintain, install and support networks of computer communication between the firms or within the firm. A database administrator has duties of security, integrity, and performance of a database. He performs or directs every undertaking associated with maintaining an efficient environment of database (searchsqlserver.techtarget.com 1999). Computer system analyst analyses scientific or business activities and develop and plan the software and hardware systems that enable a computer to accomplish these jobs. Grid Computing Grid computing is a technique to accomplish compute tasks across a spread set of resources rather than one main resource. Some of the advantages of this are that environments of grid are highly modular and no opportunity for single positions of failure. Also, tasks can be performed in parallel speeding performance (Vassilios, 2008). One of the disadvantages is that it may require a high-speed interconnection between resources of compute. There are political complications in resources sharing. Information Accuracy, Information Privacy, and Information Property Information accuracy raises issue since majority of users obtain information reserved by other companies or people, e.g. on the internet. Users are required to analyze the value of the source before utilizing the information (Gary & Misty 2010, p. 400). Information privacy is the right of companies or persons to restrict the use and collection of information about them. Information property is the rights to which the owners are entitled for their information and given exclusive rights of information. Culture Culture is the way of life for whole society and it involves systems of belief, norms of behaviors, rituals, religion, language, dress, and codes of manners. Effect of globalization on culture is huge. This is because beliefs and ideas are distributed to many regions of the universe via information technology and individuals become more close to things from other regions, hence their culture is altered. CIO CIO is the chief information officer and it is a career title for the leader of information technology in a company. As information systems and technology have became vital, the CIO has turned to be a major player in developing strategic goals. CIO may be involved in reworking and analyzing existing processes of business, with restructuring the network access and physical infrastructure of the organization (Laura 2010). Risk analysis Risk analysis in information system security is the methodology that attempts to avoid or reduce losses suffered by organizations because of their complex information systems. The first way to approach security risk is to know the network by have inventory of every device on the network by use of tool for asset recovery. Secondly, test and document settings of security on system images prior to deployment of devices. Thirdly, using of seize control requiring individuals logging in remotely to utilize authentication of two-factor (Kim 2009) Virus One of the methods for preventing and/or managing the spread of computer viruses is scanning traffic of internet such that only particular types of traffic of network are permitted past exterior firewalls. The other method is to run workstation and server software of antivirus. In addition, this can be done by regular updating of definitions of virus. In-sourcing In sourcing is where the organization analyze its pool of workers to obtain those who might be utilized to undertake particular required job. For example, an organization may utilize in house engineers to develop equipment technical manual they have developed (Joverly 2009) In addition, organization may promote some of its employees to the top management position instead of hiring from outside. Encryption Encryption is the technology on security that guards the privacy of details transferred over a network. In an effectively developed system, only the aimed receiver is capable to decrypt the data stream that is encrypted to obtain the information. Almost 9 years after the FIPS 197 publication, AES encryption has maintained the main current standard for symmetric encryption. Human-Based Approaches for Safeguarding Information Systems One of the human-based approaches for safeguarding information systems is administrative approach that is composed of written guidelines, standards, procedures, and policies. The other one is logical approach that utilize data and software to control and monitor access to computing and information systems. Lastly, physical approach to control and monitor the computing facilities and environment of the workplace. Multidomestic Business Strategy Multidomestic business strategy stresses the necessity of being responsive to every local situation and therefore, it means competition in industry sectors that are highly affected by local differences. A multi-domestic strategy tends not to integrate the platforms of IT to the same extent as organizations that are highly global. Therefore, the flow of control information is not effective compared to global oriented organizations. Data Warehouses and Data Marts. Data mart is a particular, subject focused, data repository developed to solve particular questions for a particular group of users. A data mart is mostly planned as one dimensional model as OLAP cube consisting of multiple dimension tables and a fact table. Data warehouse is one organizational store of enterprise broad data across all or many fields (Nishith 2006) Internally and Externally Focused Systems Externally focused systems particularly focus on business partners, suppliers or customers that are external to the firm. On the other hand, internally focused systems particularly concentrate on the decision-making process and internal processes of an organization. This may include the establishment of new service, new product, a new IT infrastructure, and reorganization of departments. Self-publishing One type of self-publishing is micropublishing where a group or an individual utilize effective distribution and publishing methods to publish work meant for a particular micromarket. Another one is vanity publishing where publishers establish contract with authors to publish the work. Publishers of this category generate their huge percentage of revenue from fees of author instead of sales. Transborder Data Flows Transborder data flows imply the flow of information across the boarders of countries. The importance of this is that rapid advancement of technology in the area of communications, computers, and information are the main aspects to economies structural changes in the globe. Flow of information and computerized data is vital consequence of advancement of technology and is taking huge part in economies of nations. Flattening the World This means that infrastructure of information technology will propel expansion of world economy and globalization in the current century. The advancement of technology increase productivity, expose comparative advantages, efficiently flattening the landscape of competition. Friedman suggested that the Berlin wall fall permitted people to think about universe in a unique way as one community, as a single market, and a single ecosystem (Tom 2004, p. 68) Customised and Packaged Applications Customized applications are particularly created for some particular user or other organization. Large organizations utilize custom applications for vital functions such as human resource management and inventory management. Packaged applications are collection of programs or commercial application program created to meet the requirements of different users. Vanilla version is software that is non-customized from its form of delivery while best practices-based software are utilized by software firms to back on improvement objectives. Emerging Trends in Consumer-to-Consumer e-Commerce Emerging trends are personal services, games, and web-based communication. These trends involve transactions among and between consumers (Ralph, George & George 2009, p. 202). Personal services are situations where consumers can send their items on the website while waiting another consumer t buy. There also exist virtual games that are played between two consumers. Web-based communication sites pose as medium of communication for deliberations of peer-to-peer. Types of intelligent agents The four types are model based reflex agents, simple reflex agent, utility based agents, and goal based agents. These intelligent agents are beneficial to organization since they are applicable on e-commerce. Although model of web business is different from tradition method, the principle needs of business and consumer are same. These result to development of various intelligent agents working for sellers and buyers of services and products on the web. Support and Confidence in Data Mining Confidence is the predicted range of the variable of output given a set of values of input variables. The interval of confidence sets the range within which the corresponding predicts results per input combinations happening 95% of the time. Database support for data mining is vital particularly for huge volumes of high dimensional data. Support is utilized in tackling sub problems that occur in various established techniques of data mining (Marcel &Martin 1999, p. 218). References Gary, B & Misty, E 2010, Discovering Computers 2010: Living in a Digital World, Fundamentals, Course Technology, Boston. Joverly 2009, In-sourcing or Outsourcing?, viewed 20 January 2011, Kim, s 20009, System Security: 5 Ways to Improve Your Defenses Against Attack, viewed 20 January 2011, Laura, S 2010, CIO - Chief Information Officer, viewed 20 January 2011, Marcel, H & Martin, L 1999, ‘Architectural support for data mining’. Workshop on Knowledge Discovery in Databases, vol. 9, no. 4, pp. 217-228. Nishith 2006, Open Source Analytics, viewed 20 January 2011, Ralph, M, George, R, & George, W 2009, Fundamentals of Information Systems, Cengage Learning Inc., New Jersey. Searchsqlserver.techtarget.com 1999, Database Administrator, viewed 20 January 2011, Tom, C 2004, So Why Do I Care? Management, Marketing, and Innovation Insights for a changing world, Routledge Publishing, London. Vassilios  2008, Technology News & Ideas, viewed 20 January 2011, Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us