Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content



Similar documents
Learning Outcome 1 The learner will: Understand the meaning of Information System and related terms. Indicative Content

G055/IC. APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Networking Solutions ADVANCED GCE INSTRUCTIONS FOR CANDIDATES JUNE 2011

Higher Computing Networking 1

Learning Outcome 1 The learner will: Understand the purposes and benefits of performance and reward management. Indicative Content

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Chapter 1 Instructor Version

GENERIC STANDARDS CUSTOMER RELATIONSHIPS FURTHER EXCELLENCE CUSTOMISED SOLUTIONS INDUSTRY STANDARDS TRAINING SERVICES THE ROUTE TO

ICTTEN2209A Build and maintain a secure network

FUNCTIONAL AREA 12. Network Administration (NET)

MANAGEMENT INFORMATION SYSTEMS 8/E

Business Management & Administration

NOS for Network Support (903)

i) Question Type The following are guidelines on the type of questions and their approximate weightings:

INFORMATION SECURITY POLICY

ACCOUNTING INFORMATION SYSTEMS

2 Basic Concepts. Contents

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar

DIPLOMA IN INTERNATIONAL PUBLIC FINANCIAL MANAGEMENT

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

EUROPASS DIPLOMA SUPPLEMENT

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

IAM Level 4. Diploma in Business and Administrative Management. Qualification handbook edition

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Module 3 Applications of Information Systems: Enterprise Systems

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Learning Outcome 1 The learner will: Understand the nature of the communications process and the concept of integrated marketing communications.

Scheme of Work Units 1 and 2: Setting up a Business and Growing as a Business an Integrated Approach

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

Draft Information Technology Policy

Lesson 24 Network Fundamentals

IT Services. We re the IT in OrganIsaTion. Large Organisations

Level 3 Install, configure and integrate networked hardware and software ( )

Network Technology (10101)

CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO

Model Assignment Issued July 2013 Level 4 Diploma in Business and Administration

ULH-IM&T-ISP06. Information Governance Board

CITY UNIVERSITY OF HONG KONG

NATIONAL CERTIFICATE (VOCATIONAL)

Progress Record. Course 21 (V) Associate of Applied Science in Computer Information Technology and Systems Management

Guide to the IT Passport Examination

E-COMMERCE AND ENTREPRENEURSHIP 579M. Essential Curriculum Course Overview. Total Hours: Should You Become an Entrepreneur?

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4

Information Security Policy

OCR Level 2 CAMBRIDGE TECHNICAL

CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

Information Security Policies. Version 6.1

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Cloud (educational apps) software services and the Data Protection Act

Certificate in procurement and supply operations Unit content guide. Leading global excellence in procurement and supply

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Community Development and Training Centre Semester IT 245 Management Information Systems

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Implementing Business Portal in an Extranet Environment

A GOOD PRACTICE GUIDE FOR EMPLOYERS

Fundamentals of Information Systems, Seventh Edition

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

Network Topology Comparison

Blacklisting Procedure

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18

Our Capabilities. 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses.

ELA Certification for Logistics Professionals

Networking (Exploration 1)

IAM Levels 4 and 5. Certificate in Business and Administrative Management. Qualification handbook edition

OCR LEVEL 3 CAMBRIDGE TECHNICAL

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing

Encryption Policy Version 3.0

APPENDIX 8 TO SCHEDULE 3.3

OCR LEVEL 3 CAMBRIDGE TECHNICAL

PROCUREMENT & LOGISTICS DEPARTMENT

Data Centre Networks Overview

Information Integrity & Data Management

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Business Administration. Level 2 Diploma in Business Administration (QCF) 2014 Skills CFA B&A units L1 Page 1

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

How To Manage A Contract

Job Description. To manage the College s accounting arrangements, financial planning and procurement. The Head of Finance is responsible for:

EUROPASS DIPLOMA SUPPLEMENT

Information Governance Policy (incorporating IM&T Security)

Oxford City Council ICT Strategy

Terms & Conditions Server Hosting

Transcription:

Unit Title: Information Systems Applications for Business Unit Reference Number: H/601/3904 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. 1.1 Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current examples. 1.1.1 Categorise computer systems according to their primary business functions. 1.1.2 Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current business examples. 1.2 Relate each type of system to the information needs of different levels of management. 1.2.1 Show how the separate levels of management require different types of information. 1.2.2 Relate the information needs of each level of management to particular categories of computer system. 1.3 Distinguish between batch, online and real-time operating modes. 1.3.1 Distinguish between batch, online and real-time operating modes. 1.3.2 Choose appropriate operating modes for common business processes and justify their selection. Learning Outcome 2 The learner will: Understand the features and business benefits of Local Area Networks (LANs). 2.1 Compare the commonly used LAN topologies, using diagrams where appropriate. 2.1.1 Explain the concept of a local area network (LAN). 2.1.2 Compare the commonly used LAN topologies, and, with the aid of diagrams, illustrate their components and organisation.

2.2 Assess the benefits and drawbacks of employing LANs in business applications. 2.2.1 Describe the potential benefits of using a LAN in a typical business setting. 2.2.2 Assess the possible pitfalls of the use of LANs. Learning Outcome 3 The learner will: Understand the features of Wide Area Networks (WANs) and the various communication technologies needed for their support. 3.1 Distinguish between LANs, WANs and Metropolitan Area Networks (MANs) in terms of their major components and applications. 3.1.1 Distinguish between LANs, WANs and MANs in terms of their configuration and applications. 3.1.2 Identify, and explain the function of, each of the layers of Open Systems Interconnection (OSI) 7 layer model. 3.2 Compare the main communication technologies in terms of media and channel capacities. 3.2.1 Identify the main media used for data transmission and compare their properties. 3.2.2 Describe, with the aid of diagrams, the media and devices used in typical LANs and WANs. 3.3 Explain the term Distributed Information System (DIS) and construct diagrams to compare alternative DIS structures. 3.3.1 Explain the term Distributed Information System (DIS), and justify the separation of a business application across several tiers. 3.3.2 Provide examples of DIS applications and construct diagrams to compare alternative DIS structures. Learning Outcome 4 The learner will: Understand the impact of the internet and other technologies on business models and commercial activities. 4.1 Distinguish between the common e-commerce business models employed on the internet, using examples. 4.1.1 Explain the term e-commerce and name the common business models supported by the internet. 4.1.2 Discuss, using a practical example, the features of each e-commerce business model.

4.2 Explain the use of mobile and m-commerce by describing current practical applications. 4.2.1 Explain how wireless technologies and modern hand-held devices have fostered the growth of mobile business applications. 4.2.2 Describe, in outline, the facilities and operation of current m-commerce applications. 4.3 Explain the business benefits of intranet and extranet applications such as supply chain management. 4.3.1 Distinguish between intranets and extranets by describing typical application areas. 4.3.2 Explain the business benefits of intranet and extranet applications such as supply chain management. 4.4 Describe the difficulties and drawbacks of implementing a commercial application on the internet. 4.4.1 Recognise the complexity, in terms of technologies and components, needed for the support of an e-commerce application. 4.4.2 Explain the practical difficulties and potential drawbacks of implementing a commercial application on the internet. Learning Outcome 5 The learner will: Understand the stages in the procurement of a computer system from suppliers. 5.1 Describe the essential preliminary work in project definition, risk analysis, budgeting and scheduling. 5.1.1 Recognise the many necessary technical, commercial and practical activities in the supply of an effective computer system. 5.1.2 Outline the essential preliminary work in project definition, risk analysis, budgeting and scheduling. 5.2 Explain how to create a system specification and invite proposals from suppliers. 5.2.1 Explain the need for a precise requirements specification and summarise its typical contents. 5.2.2 Outline the tendering process, in practical and legal terms, when inviting proposals from suppliers. 5.3 Explain how to shortlist proposals and proceed to a final selection based on agreed criteria. 5.3.1 Discuss the factors to be considered when evaluating tenders. 5.3.2 Describe a method of shortlisting proposals and reaching a final choice of supplier. 5.4 List and briefly explain 5.4.1 List and briefly explain the typical sections in a contract

the typical sections in a contract for the supply and maintenance of a complete computer system. for the supply and maintenance of a complete computer system. 5.4.2 Identify and compare the different methods of defining cost and ownership in a contract. Learning Outcome 6 The learner will: Understand the options available in acquiring the requisite hardware, software and services for an information system. 6.1 Compare direct purchase, leasing and renting as methods of obtaining hardware. 6.1.1 Outline the main methods of obtaining hardware such as direct purchase, leasing and renting. 6.1.2 Assess, from the user s viewpoint, the different methods of obtaining hardware. 6.2 Assess the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach. 6.2.1 Describe the different methods of obtaining software for a business application. 6.2.2 Summarise the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach. 6.3 Evaluate the use of employees, contract staff, consultants and outsourcing in the provision of information system services. 6.3.1 Describe the main staffing choices available when providing information system services. 6.3.2 Compare direct employment, contract staff, consultants and outsourcing as methods of obtaining information system services. Learning Outcome 7 The learner will: Understand the importance of observing legislation in managing information systems. 7.1 Explain how to ensure that general legislation covering the workplace is complied with in areas such as health and safety. 7.1.1 Recognise that many areas of legislation affect the supply and operation of computer systems. 7.1.2 Summarise the employer s responsibilities to conform to health and safety legislation.

7.2 Explain information laws covering copyright, data protection and computer misuse. 7.2.1 Explain briefly how the UK Copyright, Designs and Patents Acts aim to protect intellectual property rights. 7.2.2 Summarise the eight principles of the UK Data Protection Act 1998 and explain the rights given to private individuals. 7.2.3 Outline the offences created under the UK Computer Misuse Act 1990. Learning Outcome 8 The learner will: Know how to devise effective plans for implementing a security policy. 8.1 Explain how to apply a comprehensive risk assessment and analysis method. 8.1.1 Describe the risk management approach used to achieve an adequate level of security. 8.1.2 Explain how risk identification and risk analysis can reveal the required levels of security protection. 8.2 Explain how to evaluate strategies for handling risks. 8.2.1 Describe the common methods of handling risk such as risk avoidance, retention, reduction and transfer. 8.3 Recommend procedures and practices in order to achieve the desired level of protection. 8.3.1 Emphasise the importance of implementing a board level policy for security throughout the organisation with regular reviews. 8.3.2 Recommend procedures and practices in order to achieve the desired level of protection against both accidental and deliberate threats to security. Assessment: Assessment method: written examination (unless otherwise stated). Written examinations are of three hours duration. All learning outcomes will be assessed. Recommended Reading: Please refer to the Tuition Resources section of the Members Area of the ABE website (www.abeuk.com) for the recommended reading for this subject.