ntroduction to Information Systems
|
|
|
- Marvin Peters
- 10 years ago
- Views:
Transcription
1 James A. O'Brien George M. Marakas ntroduction to Information Systems fifteenth edition The McGraw-Hill Companie. ISBN MHID ^XConnect M \ L^rn M y Succeed"
2 ie Foundation Concepts Foundations of Information Systems in Business 3 Section I: Foundation Concepts: Information Systems in Business 4 The Real World of Information Systems 4 What Is an Information System? 4 Real World Case 1: ecourier, Cablecom, and Bryan Cave: Delivering Value through Business Intelligence 5 The Fundamental Roles of IS in Business 8 Trends in Information Systems 10 The Role of e-business in Business 12 Types of Information Systems 13 OperationsSupport Systems 13 Management Support Systems 14 Other Classifications of Information Systems 16 Managerial Challenges of Information' Technology 16 Success and Failure with IT 17 Developing IS Solutions 18 Challenges and Ethics of IT Challenges of IT Careers 21 The IS Function 24 Section II: Foundation Concepts: The Components of Information Systems 26 System Concepts: A Foundation 26 What Is a System? 26 Real World Case 2: JetBlue and the Veterans Administration: The Critical Importance of IT Processes 27 Feedback and Control 29 Other System Characteristics 29 Components of an Information System 31 Information System Resources 32 People Resources 32 Hardware Resources 32 Software Resources 33 Data Resources 33 Network Resources 34 Information System Activities 3 5 Input of Data Resources 35 Processing of Data into Information 35 Output of Information Products 35 Storage of Data Resources 36 Control of System Performance 36 Recognizing Information Systems 36 Real World Case 3: Sew What? Inc.: The Role of Information Technology in Small Business Success 41 Competing with Information Technology 43 Section I: Fundamentals of Strategic Advantage 44 Strategic IT 44 Competitive Strategy Concepts 44 Competitive Forces and Strategies 44 Real World Case 1: IT Leaders: Reinventing IT as a Strategic Business Partner 45 Strategic Uses of Information Technology 48. Other Competitive Strategies 48 Building a Customer-Focused Business 52 The Value Chain and Strategic IS 54 Value Chain Examples 55 Section II: Using Information Technology for Strategic Advantage 56 Strategic Uses of IT 56 Reengineering Business Processes 56 The Role of Information Technology 56 Real World Case 2: For Companies Both Big and Small: Running a Business on Smartphones 57 Becoming an Agile Company 60 Creating a Virtual Company 62 Virtual Company Strategies 62 Building a Knowledge-Creating Company 64 Knowledge Management Systems 65 Real World Case 3: Wachovia and Others: Trading Securities at the Speed of Light 70 XXVII
3 XXViii Contents Module is Information Technologies Computer Hardware 73 Section I: Computer Systems: End User and Enterprise Computing 74 Introduction 74 A Brief History of Computer Hardware 74 Real World Case 1: IBM, Wachovia, and Paypal: Grid Computing Makes It Easier and Cheaper 75 Types of Computer Systems ' 78 Microcomputer Systems 79 Computer Terminals 81 Network Computers 82 Information Appliances 82 Midrange Systems 83 Mainframe Computer Systems 85. Supercomputer Systems 86 The Next Wave of Computing 88 Technical Note: The Computer System Concept 88 Computer Processing Speeds 90 Moore's Law: Where Do We Go from Here? 90 Section II: Computer Peripherals: Input, Output, and Storage Technologies 93 Peripherals 93 Input Technologies/,'9 3 Pointing Devices 93 Real World Case 2: Apple, Microsoft, IBM and Others: The Touch Screen Comes of Age 94 Pen-Based Computing 96 ^Speech Recognition Systems 91 Optical Scanning, 99 Other Input Technologies 101 Output Technologies 101 Video Output.102 Printed Output 102 Storage Trade-Offs 103 Computer Storage Fundamentals 104 Direct and Sequential Access 105 Semiconductor Memory 106 Magnetic Disks 108 Types of Magnetic Disks 108 RAID Storage 109 Magnetic Tape 109 Optical Disks 109 Business Applications 111 Radio Frequency Identification 111 Predictions for the Future 112 Real World Case 3: Kimberly-Clark and Daisy Brands: Secrets to RFID Success Computer Software 123 Section I: Application Software: End-User Applications 124 Introduction to Software 124 What Is Software? 124 Types of Software 124 Application Software for End Users 124 Real World Case 1: GE, H.B. Fuller Co., and Others: Successful Implementations of Software-as-a-Service 125 Business Application Software 128 Software Suites and Integrated Packages 129 Web Browsers and More 130 Electronic Mail, Instant Messaging; and Weblogs 130 Word Processing and Desktop Publishing 132 Electronic Spreadsheets 133 Presentation Graphics 134 Personal Information Managers 135 Groupware 135 Software Alternatives 136 Application Service Providers 136 Cloud Computing 138 Software Licensing 139 Section II: System Software: Computer System Management 140 System Software Overview 140 Overview 140 Operating Systems 140 Operating System. Functions 140 Real World Case 2: Power Distribution and Law Enforcement: Reaping the Benefits of Sharing Data Through XML 141 Microsoft Windows 144 UNIX 145 Linux 146 Open-Source Software 146 OpenOffice.org Mac OS X 141 Application Virtualization 148 Other System Management Programs 149 Programming Languages 150 Machine Languages 150 Assembler Languages 151 High-Level Languages 151
4 Contents xxix Fourth-Generation Languages 152 Object-Oriented Languages 153 Web Languages and Services 154 HTML 154 XML 155 Javaand.NET 151 Web Services 151 Programming Software 160 Language Translator Programs 160 Programming Tools 160 Real World Case 3: Wolf Peak International: Failure and Success in Application Software for the Small-to-Medium Enterprise 166 Data Resource Management 169 Section I: Technical Foundations of Database Management 170 Database Management 170 Fundamental Data Concepts 170 Character 110 Field po Record 110 Real World Case 1: Cogent Communications, Intel, and Others: Mergers Go More Smoothly When Your Data Are Ready 171 File 113 y.:- Database 113 Database Structures 175 Hierarchical Structure 116 Network Structure 116 Relational Structure 116 Relational Operations 111 Multidimensional Structure 111 Object-Oriented Structure 111 Evaluation of Database Structures 119 Database Development 180 Data Planning and Database Design 181 Section II: Managing Data Resources 185 Data Resource Management 185 Types of Databases 185 Operational Databases 185 Distributed Databases 185 Real World Case 2: Applebee's, Travelocity, and Others: Data Mining for Business Decision 186 External Databases 189 Hypermedia Databases 189 Data Warehouses and Data Mining 191 Data Mining 192 Traditional File Processing 194 Problems of File Processing 195 The Database Management Approach 196 Database Management System 196 Database Interrogation 198 Database Maintenance 200 Application Development 200 Real World Case 3: Amazon, ebay, and Google: Unlocking and Sharing Business Databases 205 Telecommunications and Networks 207 Section I: The Networked Enterprise 208 Networking the Enterprise 208 The Concept of a Network 208 Metcalfe's Law 208 Real World Case 1: Starbucks and Others: The Future of Public Wi-Fi 209 Trends in Telecommunications 211 Industry Trends 211 Tech?iology Trends 212 Business Application Trends 213 Intemet2 213 The Business Value of Telecommunications Networks 214 The Internet Revolution 215 Internet Service Providers 215 Internet Applications 216 Business Use of the Internet 211 The Business Value of the Internet 218 The Role of Intranets 219 The Business Value of Intranets 219 The Role of Extranets 222 Section II: Telecommunications Network Alternatives 225 Telecommunications Alternatives 225 A Telecommunications Network Model 225 Real World Case 2: Brain Saving Technologies, Inc. and the T-Health Institute: Medicine through Videoconferencing 226 Types of Telecommunications Networks 228 Wide Area Networks 228 Metropolitan Area Networks 228 Local Area Networks 229 Virtual Private Networks 229 Client/Server Networks 231 Network Computing 232 Peer-to-Peer Networks 233 Digital and Analog Signals 234 Telecommunications Media 235
5 XXX Contents Wired Technologies 236 Twisted-Pair Wire 236 Coaxial Cable 236 Fiber Optics 236 The Problem of u The Last Mile " 236 Wireless Technologies 237 Terrestrial Microwave 231 Communications Satellites 231 Cellular and PCS Systems 238 Wireless LANs 239 Bluetooth 239 The Wireless Web 239 Telecommunications Processors 241 Modems 241 Internetwork Processors 242 Multiplexers 242 Telecommunications Software 243 Network Management 243 Network Topologies 244 Network Architectures and Protocols 245 Protocols 245 Network Architectures 245 The OSI Model 245 The Internet's TCP/IP 241 Voice Over IP 248 Bandwidth Alternatives 249 Switching Alternatives 250 Network Interoperability 251 Real World Case 3: Metric & Multistandard Components Corp.: The Business Value of a Secure Self-Managed Network for a Small-to-Medium Business 256 Business Applications Electronic Business Systems 259 Section I: Enterprise Business Systems 260 Introduction 260/ Cross-Functional Enterprise Applications 260 Enterprise Application Architecture 260 Real World Case 1: NetSuite Inc., Berlin Packaging, Churchill Downs, and Others: The Secret to CRM is in the Data 261 Getting All the Geese Lined Up: Managing at the Enterprise Level 264 Customer Relationship Management: The Business Focus 265 What Is CRM? 266 Contact and Account Management 266 Sales 266 Marketing and Fulfillment 261 Customer Service and Support 261 Retention and Loyalty Programs 261 The Three Phases of CRM 268 Benefits and Challenges of CRM 2 69 CRM Failures 210 WhatlsERP? 271 Benefits and Challenges of ERP 273 The Costs of ERP 213 Causes of ERP Failures 215 Supply Chain Management: The Business Network 276 WhatlsSCM? 276 Electronic Data Interchange 219 The Role of SCM 279 Benefits and Challenges of SCM 2 80 Enterprise Application Integration 282 Transaction Processing Systems 283 The Transaction Processing Cycle 285 Enterprise Collaboration Systems 286 Tools for Enterprise Collaboration 286 Section II: Functional Business Systems IT in Business 289 Marketing Systems 289 Interactive Marketing Real World Case 2: OHSU, Sony, Novartis, and Others: Strategic Information Systems It's HR's Turn 290 Targeted Marketing 293 Sales Force Automation 294 Manufacturing Systems 295 Computer-Integrated Manufacturing 296 Human Resource Systems 297 HRM and the Internet 291 HRM and Corporate Intranets 298 Accounting Systems 300 Online Accounting Systems 300 Financial Management Systems 302 Real World Case 3: Perdue Farms and Others: Supply Chain Management Meets the Holiday Season 308 Electronic Commerce Systems 311 Section I: Electronic Commerce Fundamentals 312 Introduction to Electronic Commerce 312
6 Contents XXXJ The Scope of e-commerce 312 e-commerce Technologies 312 Real World Case 1: KitchenAid and the Royal Bank of Canada: Do You Let Your Brand Go Online All by Itself? 313 Categories of e-commerce 316 Essential e-commerce Processes 317 Access Control and Security 318 Profiling and Personalizing 318 Search Ma?iagement 318 Content and Catalog Management 318 Workflow Management 320 Event Notification 321 Collaboration and Trading 321 Electronic Payment Processes 322 Web Payment Processes 322 Electronic Funds Transfer 322 Secure Electronic Payments 323 Section II: e-commerce Applications and Issues 324 e-commerce Applications and Issues 324 e-com,m,erce Trends 324 Business-tb-Consumer e-commerce 324 Real World Case 2: Linkedln, Umbria, Mattel, and Others: Driving the "Buzz" on the Web 325 e-commerce Success Factors 321 Web Store Requirements 331 Developing a Web Store 331 Getting Customers to Find You 332 Serving Your Customers 333 Managing a Web Store 334 Business-to-Business e-commerce 335 e-commerce Marketplaces 336 Clicks and Bricks in e-commerce 338 e-commerce Integration 338 Other Clicks-and-Bricks Strategies 340 e-commerce Channel Choices 341 Real World Case 3: Entellium, Digg, Peerflix, Zappos, and Jigsaw: Success for Second Movers in e-commerce 347 Decision Support Systems 349 Section I: Decision Support in Business 3 50 Introduction 350 Information, Decisions, and Management 350 Information Quality 350 Real World Case 1: Hillman Group, Avnet, and Quaker Chemical: Process Transformation through Business Intelligence Deployments 351 Decision Structure 354 Decision Support Trends 354 Decision Support Systems 357 Example 351 DSS Components 351 Management Information Systems 359 Management Reporting Alternatives 360 Online Analytical Processing 361 Geographic Information and Data Visualization Systems 364 Using Decision Support Systems 367 What-IfAnalysis 361 Sensitivity Analysis 368 Goal-Seeking Analysis 368 Optimization Analysis 369 Data Mining for Decision Support 369 Executive Information Systems 3 72 Features of an EIS 312 Enterprise Portals and Decision Support 374 Enterprise Information Portals 314 Knowledge Management Systems 376 Section II: Artificial Intelligence Technologies in Business 378 Business and AI 378 An Overview of Artificial Intelligence 378 Real World Case 2: Goodyear, JEA, OSUMC, and Monsanto: Cool Technologies Driving Competitive Advantage 379 The Domains ofartificial Intelligence 381 Expert Systems -384 Components of an Expert System 384 Expert System Applications 385 Benefits of Expert Systems 386 Limitations of Expert Systems 386 Developing Expert Systems 388 Knowledge Engineering 389 Neural Networks 390 Fuzzy Logic Systems 391 Fuzzy Logic in Business 392 Genetic Algorithms 392 Virtual Reality 394 VR Applications 394 Intelligent Agents 395 Real World Case 3: Harrah's Entertainment, LendingTree, DeepGreen Financial, and Cisco Systems: Successes and Challenges of Automated Decision Making 402
7 XXXii Contents lod u le Development Processes Developing Business/IT Solutions 405 Section I: Developing Business Systems 406 IS Development 406 The Systems Approach 406 Systems Thinking 406 Real World Case 1: PayPal: Going Global All Languages at a Time 407 Systems Analysis and Design 409 The Systems Development Life Cycle 409 Starting the Systems Development Process 410 Feasibility Studies 410 Operational Feasibility 411 Economic Feasibility 412 Techn ical Feasibility 412 Human Factors Feasibility 413 Legal/Political Feasibility 413 Systems Analysis 414 Organizational Analysis 414 Analysis of the Present System 414 Logical Analysis 415 Functional Requirements Analysis and Determination 415 Systems Design 416 Prototyping 416 The Prototyping Process 411 User Interface Design 418 System Specifications 420 End-User Development 420 Focus on IS Activities 420 Doing End- User Development 421 Technical Note: Overview of Object-Oriented Analysis and Design 423 Section II: Implementing Business Systems 426 Implementation 426 Implementing New Systems 426 Real World Case 2: Blue Cross and Blue Shield and Others: Understanding the Science behind Change 427 Project Management 430 What Is a Project? 430 The Process of Project Management 430 Evaluating Hardware, Software, and Services 432 Hardware Evaluation Factors 433 Software Evaluation Factors 434 Evaluating IS Services 434 Other Implementation Activities 435 Testing 435 Data Conversion 435 Documentation 436 Training 431 System Conversion Strategies 431 Postimplementation Activities 439 Systems Maintenance 439 Postimplementation Review 440 Implementation Challenges 441 User Resistance and Involvement 441 Change Management 442 A Change Management Process 443 Real World Case 3: Infosys Technologies: The Implementation Challenges of Knowledge Management Initiatives 449 o cl u S e V anagement Challenges Security and Ethical Challenges 453 Section I: Security, Ethical, and Societal Challenges of IT 454 Introduction 454 Business/IT Security, Ethics, and Society 454 Ethical Responsibility of Business Professionals 454 Business Ethics 454 Real World Case 1: Ethics, Moral Dilemmas, and Tough Decisions: The Many Challenges of Working in IT 455 Technology Ethics 458 Ethical Guidelines 458 Computer Crime 460 Hacking and Cracking 461 Cyber Theft 463 Unauthorized Use at Work 463 Software Piracy 466 Theft of Intellectual Property 461
8 Contents XXXJM Computer Viruses and Worms 468 Adware and Spyware 410 Privacy Issues 472 Privacy on the Internet 413 Computer Matching 414 Privacy Laws 414 Computer Libel and Censorship 416 The Current State of Cyberlaw 476 Other Challenges 477 Employment Challenges 411 Computer Monitoring 411 Challenges in Working Conditions 418 Challenges to Individuality 418 Health Issues 479 Ergonomics 419 Societal Solutions 479 Section II: Security Management of Information Technology 481 Introduction 481 Tools of Security Management 481 Real World Case 2: Raymond James Financial, BCD Travel, Houston Texans, and Others: Worrying about What Goes Ouf, Not What Comes In 482 Internetworke'd Security Defenses 484 Encryption 485 Firewalls 486 Denial of Service Attacks 481 / Monitoring 489 Virus Defenses 489 Other Security Measures 491 Security Codes 491 Backup Files 491 Security Monitors 492 Biometric Security 492 Computer Failure Controls 493 Fault-Tolerant Systems 493 Disaster Recovery 495 System Controls and Audits 495 Information System Controls 495 Auditing IT Security 496 Real World Case 3: Cyber Scams: Four Top Cyber Criminals Who They Are and What They Do 501 Enterprise and Global Management of Information Technology 503 Section I: Managing Information Technology 504 Business and IT 504 Managing Information Technology 504 Real World Case 1: Toyota, Procter & Gamble, Hess Corporation, and Others: Retiring CIOs and the Need for Succession Planning 505 Business/IT Planning 507 Information Technology Architecture 508 Managing the IT Function 509 Organizing IT 510 Managing Application Development 510 Managing IS Operations 511 IT Staff Planning 512 The CIO and Other IT Executives 512 Technology Management 513 Managing User Services 513 Outsourcing and Offshoring IT and IS 514 Outsourcing 514 Offshoring 515 Failures in IT Management 517 Management Involvement and Governance 518 \ Section II: Managing Global IT 522 The International Dimension 522 Global IT Management 522 Real World Case 2: Reinsurance Group of America and Fonterra: Going for Unified Global Operations 523 Cultural, Political, and Geoeconomic Challenges 525 Global Business/IT Strategies 527 Global Business/IT Applications 528 Global IT Platforms 530 The Internet as a Global IT Platform 531 Global Data Access Issues 532 Internet Access Issues 534 Global Systems Development 535 Systems Development Strategies 535 Real World Case 3: IBM Corporation: Competing Globally by Offshoring IT Workers and Giving Away Technology 541 Review Quiz Answers 543 Selected References 547 Glossary for Business Professionals 557 Name Index 577 Company Index 579 Subject Index 582
i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems
ACS 1803 Final Exam Topic Outline IV. Functional Area Information Systems a. Financial Information Systems (Lecture Outline 5.1) i. Budgeting Systems ii. Cash Management Systems iii. Capital Management
Introduction to Information Systems. 2 hrs lecture 2 hrs lab
Arab Academy for Science and Technology & Maritime Transport University/Academy: Arab Academy for Science and Technology & Maritime Transport Faculty/Institute: College of Computing and Information Technology
Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems
Brief Contents 1 Introduction Part One: Information Technology Infrastructure 2 Information Technology Foundations 3 Networks and Telecommunications 4 Database Management Part Two: Business Integration
Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2
Contents Preface Information Systems Perspective 1 An Introduction to Information Systems in Organizations 2 Spain 3 Information Concepts 5 Data, Information, and Knowledge 5 The Characteristics of Valuable
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33
contents CHAPTER 1 Information Systems in Business 1 INTRODUCTION 5 Apple Merging Section 1.1 Information Systems in Business 5 INFORMATION TECHNOLOGY'S ROLE IN BUSINESS 5 Information Technology's Impact
EIGHTH EDITION. Stephen Haag DANIELS COLLEGE OF BUSINESS UNIVERSITY OF DENVER. Maeve Cummings COLLEGE OF BUSINESS PITTSBURG STATE UNIVERSITY
EIGHTH EDITION Stephen Haag DANIELS COLLEGE OF BUSINESS UNIVERSITY OF DENVER Maeve Cummings COLLEGE OF BUSINESS PITTSBURG STATE UNIVERSITY McGraw-Hill Irwin TABLE OF CONTENTS PREFACE XIV CHAPTER OWE The
Progress Record. Course 21 (V) Associate of Applied Science in Computer Information Technology and Systems Management
Progress Record Study your lessons in the order listed below. As graded examinations are returned to you, enter your grade in the space below. Set a schedule for yourself then watch your progress. Course
Eighth Edition. New York University. Jane P. Laucfon. Azimuth Information PEARSON. Prentice Hall. Upper Saddle River, New Jersey 07458
Eighth Edition K %& 1 1 1 1 %& L S I l: ^Ф» RmCI %M Wl ^^ I New York University Jane P. Laucfon Azimuth Information Systems PEARSON Prentice Hall Upper Saddle River, New Jersey 07458 Complete Contents
Organizations, Management, and the Networked Enterprise 33
Complete Contents Part One Organizations, Management, and the Networked Enterprise 33 Chapter 1 Information Systems in Global Business Today 34! Opening Case: Efficiency in Wood Harvesting with Information
IT Infrastructure: Hardware and Software
IT Infrastructure: Hardware and Software LEARNING OBJECTIVES What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business?
IT1104- Information Systems & Technology (Compulsory)
INTRODUCTION - Information Systems & Technology (Compulsory) This is one of the 4 courses designed for Semester 1 of Bachelor of Information Technology (BIT) Degree program. Information Systems and Technology
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
One LAR Course Credits: 3. Page 4
Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,
BUSINESS TECHNOLOGY (BTE)
University of Miami Academic Bulletin 1 BUSINESS TECHNOLOGY (BTE) BTE 120. Introduction to Computer Information Systems. 3 Credit An introduction to computers and information processing, with emphasis
KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems
Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :[email protected], Website :
Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada
CORE CONCEPTS OF Accounting Information Systems Thirteenth Edition Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada Jacob M. Rose, Ph D. Trustee Professor Department
IT Infrastructure: Hardware and Software
Chapter 4 IT Infrastructure: Hardware and Software 4.1 Copyright 2011 Pearson Education, Inc STUDENT LEARNING OBJECTIVES What are the components of IT infrastructure? What are the major computer hardware,
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Business Driven nformation Systems
Paige Baltzan Daniels College of Business, University of Denver Amy Phillips Daniels College of Business, University of Denver Business Driven nformation Systems SECOND EDITION McGraw-Hill Irwin Boston
Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
Telecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy
Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the
FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT
Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm 9.1 Prentice Hall Objectives 1. How does the Internet work? What are its major capabilities and benefits to business?
How To Manage Technology
Chapter 4 IT Infrastructure: Hardware and Software 4.1 2007 by Prentice Hall STUDENT OBJECTIVES Identify and describe the components of IT infrastructure. Identify and describe the major types of computer
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
HHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
801134 - SISINF - Information Systems
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2014 801 - EUNCET - Euncet University Business School 801 - EUNCET - Euncet University Business School BACHELOR'S DEGREE IN BUSINESS
GLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this document in connection with our Group and our business. The terms and their meanings may not correspond
B.Sc. in Computer Information Systems Study Plan
195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210
Chapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
Chapter. 4.1 2007 by Prentice Hall
Chapter 4 IT Infrastructure: Hardware and Software 4.1 2007 by Prentice Hall STUDENT LEARNING OBJECTIVES What are the components of IT infrastructure? What are the major computer hardware, data storage,
GLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond
Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application
BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
Enterprise-Wide Information Systems in the Modern Organization
Enterprise-Wide Information Systems in the Modern Organization Module SAP 1 1 ERP in Modern Business: Topics Historical Perspective of IS in Business Levels of IT in Organization Examine ERP s and SAP
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
Computer Science 1301 Computer Literacy. Student Learning Outcomes
Computer Science 1301 Computer Literacy Student Learning Outcomes 1. Introduction to Computers Students will be introduced to basic computer concepts, such as what a computer is, how it works and what
City of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
E-Business Technologies
E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications
Course Description Bachelor in Management Information Systems
Course Description Bachelor in Management Information Systems 1605215 Principles of Management Information Systems (3 credit hours) Introducing the essentials of Management Information Systems (MIS), providing
Managing Information Technology 6 th Edition
Managing Information Technology 6 th Edition CHAPTER 6 ENTERPRISE SYSTEMS Copyright 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 APPLICATION AREAS Interorganizational systems Systems that
Information Systems: Definitions and Components
Information Systems: Definitions and Components What Is an Information System? Information system has been defined in terms of two perspectives: one relating to its function; the other relating to its
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies Content IT Infrastructure Infrastructure Components Contemporary Hardware Platform Trends Contemporary Software Platform Trends Management Issues 2 IT infrastructure
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
Introduction to Information Technology Course Number 10009
Course Name Introduction to Information Technology Course Number 10009 IT1.0 Understand the need for digital technologies within their life IT1.0 Understand the need and impact of technology IT1.1 Define
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
E-Business, E-Commerce
E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize
ICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
Detailed Syllabus \\Iconsserver\projects\MaxValue-Phase2\Purchased_images PGPX IN TELECOM MANAGEMENT
Detailed Syllabus \\Iconsserver\projects\MaxValue-Phase2\Purchased_images PGPX IN TELECOM MANAGEMENT Smart, Fun & Easy Way to Become A Complete Professional! Index Click on the subject for detailed syllabus.
Introduction to Information Technology
Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5
MANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
IT1105- Information Systems & Technology
INTRODUCTION - Information Systems & Technology This is one of the 4 courses designed for Semester 1 of Bachelor of Information Technology (BIT) Degree program. Information Systems and Technology course
Fundamentals of Information Systems, Seventh Edition
Chapter 1 An Introduction to Information Systems in Organizations 1 Principles and Learning Objectives The value of information is directly linked to how it helps decision makers achieve the organization
Module 3 Applications of Information Systems: Enterprise Systems
Contents Module 1 Introduction to MIS Define management information systems and explain its key attributes Describe information as an asset and explain its core attributes Explain how information technology
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Computers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
Management Information Systems. B08. Interorganizational and Global Information Systems
Management Information Systems Management Information Systems B08. Interorganizational and Global Information Systems Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:
Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS
CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Network Technology CMP-354-TE. TECEP Test Description
Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types
Web Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
ELECTRONIC COMMERCE SYSTEMS
CHAPTER ELECTRONIC COMMERCE SYSTEMS This chapter discusses one of the most visible segments of the business world today e-commerce. In general terms, the issues involve the electronic processing and transmission
Information Technology Hardware Technician
Apprenticeship Training Schedule Schedule of off the job courses Information Technology Hardware Technician Trade Code: 634B Course Summary Level 1 - Common Core S0791.0 Information Technology Contact
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY Scope These program criteria apply to Information Technology, Computer Engineering Technology, and specialities therein, such as computer programming, computer systems analysis,
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems
Chapter 5 Electronic Commerce System Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Electronic Commerce: Electronic commerce encompasses the entire online
C20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Developing Business / IT Strategies McGraw-Hill/Irwin Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved. 2-2 Learning Objectives Discuss the role of planning in the business
ก ก ก ก ก 460-104 3(3-0-6) ก ก ก (Introduction to Business) (Principles of Marketing)
ก ก ก 460-101 3(3-0-6) ก ก ก (Introduction to Business) ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก Types of business; business concepts of human resource management, production, marketing, accounting, and finance;
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Enterprise Information Systems
Enterprise Information Systems Dr Sherif Kamel Department of Management School of Business, Economics and Communication Enterprise Information Systems DSS to provide enterprise-wide support Support to
IS 300 Management Information Systems Summer II 2012 Department of Information System
IS 300 Management Information Systems Summer II 2012 Department of Information System Instructor: Peng He Class Time: Tu/Th 6:00pm - 9:10pm E-mail: [email protected] Classroom: ITE 459 Office: ITE 411 Office
Networking. Topic 5. Contents
97 Topic 5 Networking Contents 5.1 Introduction...................................... 99 5.2 Networks....................................... 99 5.2.1 The development of networks........................
Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 [email protected] Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
