IT205 Discussion Questions
IT205 Discussion Questions
Popular in Course
verified elite notetaker
Popular in Department
This 6 page Study Guide was uploaded by tophomework Notetaker on Thursday November 12, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 18 views.
Reviews for IT205 Discussion Questions
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/12/15
Week 1 DQ 1 The benefit of implementing an information system into a small company such as the Bead Bar, is the systems allowance of designing and creating electronic records of employee information and company transactions such as (a) product inventory, (b) customer records such as name, address, product order, secure payment information, and delivery and (c) records of vendors. An information system would assist in keeping uptodate payroll records and reports as well as provide electronic automated billing and account notices. The financial benefit would be that the system would allow users to access data easily on a timelier basis. There would be no reason for keeping hardcopy logs of all company transactions. The nonfinancial benefit would be that an information system would allow more than one individual access to the records at any given time; therefore, saving time on an individual having to search for information and possibly wait for someone else to finish accessing the data before allowing another individual access to the records. The bottom line is that an information system implemented into any small company would save on time and money which in turn would benefit the company by increasing net profits. Week 1 DQ 2 The waterfall model is a valuable tool in the management of information technology as it contains seven phases in the building process of developing and maintaining an information system. With the waterfall model each phase is dependent on information and completion of previous phases. Use of the waterfall model allows an individual to improve products and exerts their creative abilities by reasoning and discovery by “trial and error” of mistakes and areas with needs for improvement. Compare to the building of a house by a carpenter or any other building or development project; the developer must have a firm foundation before continuing on to phase two of the project. This type of model (waterfall) is valuable as noone wants a program that is going to crash or experience any technical problems that allow loss of detrimental company information that would be time consuming and costly or even impossible to replace. Each phase must be completed and pass inspection or usage expectations leading into the next phase. The end result should produce a sound, reliable highend product for company distribution and customer usage. Week 3 DQ 1 WORD PROCESSING Word Processing software is used to create and edit documents and allows the user to apply special formatting and style to the documents. Word Processing software is commonly used for company letters, memos, and legal documents in a business. Software packages such as Microsoft Word and Word Perfect are two of the common word processing programs used in business today. SPREADSHEET SOFTWARE A spreadsheet is used by accountants, department managers, researchers, etc. to analyze financial data. Popular packages that supply a spreadsheet include Microsoft’s Excel, Lotus 123, and Corel’s Quattro Pro. A spreadsheets primary duty is to handle numbers and mathematical formulas either builtin to the software or set up by the user. The user can then transfer the data from the spreadsheet into a chart or graph with just a few clicks, if desired, using the same Excel program or whichever they are currently using. Companies can use a spreadsheet for monthly sales reports, yearly comparisons, projection sales reports, income reports, and monthly cost and analysis. Additionally, a company can use the software for employee payroll. WEB BROWSERS In order for a company to view web pages from the internet, the company would need web browser software. There are several on the market today such as Internet Explorer, Netscape, Mozilla Firefox, and Google has a new one out called Chrome. Web browsers work with an internet connection and a Graphic User Interface (GUI) which allows users to interact with computers. (internet.com, 2008) This is important as it allows customers and employees to interact with the company website and be able to communicate with each other via the web. Axia College of University of Phoenix, (2007). Software Technologies. Information Systems Technologies. Retrieved September 15, 2008, from Axia College, Week 3 reading, aXcess, IT205Management of Information Systems Course Web site. Internet.com, (2008). Retrieved September 15, 2008, from http://www.webpedia.com/TERM/G/Graphical_User_Interface_GUI.html Week 3 DQ 2 Rachel (VP of Operations and Purchasing) needs a Database Management System Software (DBMS). Rachel could install barcode scanner hardware and software to her current computer system, and the DBMS would allow her to organize the data of all inventory products incoming and outgoing. Mitch (VP of Bead Bar on Board) would like software he can use on his handheld computer. Mitch needs Personal Information Manager (PIM) Software such as FrontRange’s Goldmine which focuses on sales and contact management. Mitch would have the ability to enter client contact information and personal notes concerning business options. The PIM software can be synchronized with information on a desktop computer system. Week 5 DQ 1 Spreadsheets can handle data storage in general but businesses require systems with the ability to manipulate the data into various scenarios for different reasons. Database Management Systems (DBMSs) are important because businesses need to be able to access large amounts of information, and that information must be accessible to multiple users quickly, and from any location. DBMSs are excellent at providing security to a firm's privileged information; from anyone like disgruntled employees, to competitors trying to "hack" into the infrastructure. Week 5 DQ 2 My recommendation is that the Stationary Stop uses an Enterprise database management system. The company’s desire to create a Web site and the evident company expansion are the reasons for my choice. Desktop DBMSs have all of the same functions with the exception of integrating into a Web site. In addition to creating invoices and reports, accessing product availability, storing customer and vendor information, and providing current prices, Enterprise databases can process and track online customer ordering. With the creation of a Web site for the Stationery Stop linked to an Enterprise database, a company will ensure seamless transactions and instant feedback not only for the customer, but for anyone who accesses the Web site. Week 7 DQ 1 If a hacker were to breach a system that stored my credit card information, I would suffer greatly. I would have to go through the pain of justifying the incident with my credit card company, my bank, any online stores, my landlord, and my medical physicians; the end result? I would have to rebuild my credit from scratch which would probably take years to achieve. To ensure safety of my financial information used online, I implement the use of PayPal, which is a secure website that stores my purchasing information, credit card and bank account numbers, securely. When purchasing through PayPal, no account information leaves PayPal to become visible to any vendor over the internet. If my computer had no Firewall or AntiVirus software installed, my computer would be at risk of attack by a virus which could delete data, or render the system totally inoperable. If a virus attacked my computer, I could be totally devastated. I would be incapable of accessing any financial records, business documents, academic documents, etc. that is currently being stored on my system. With Firewall and AntiVirus software installed, none of my critical data will be visible and no “bug” could gain access to my system. If a poorlywritten email program caused an “opendoor” effect in its configuration, I could be attacked through spam messages, and most importantly, by viruses embedded in an email attachment whether the sender knowingly or unknowingly sent the virus to me. Week 7 DQ 2 We have the right to privacy in our homes through the use of AntiVirus, firewalls, encrypted email, complicated passwords, and parental controls to prevent the intrusion from viruses, poorlywritten software, and hackers. We have no such right to privacy at work because businesses have the right to observe and track employee email messages and Internet activity; monitor employee activities by installing cameras, and restrict employees to specific areas by issuing key cards. I worked in 2001 at a company called SITEL Corporation as an AOL Customer Support Technician. We, as an employee, had to sign an agreement that we would not abuse company property by accessing the internet for personal use during “on the clock hours”. About ½ of the employees broke this rule as I discovered that some would play games at Pogo while carrying on conversations with customer’s about their computer problems. The employee kept the game running in the background and would switch back and forth between screens. Being caught would result in a writeup and a second offense would result in termination. The company knew that people wanted to talk on the messengers, send personal email, or play games so they set up several computers in the break room specifically for this purpose. These computers were to be accessed during the two 15 minute breaks per shift and the one hour lunch break. Each computer had the AOL, Yahoo, and MSN messengers downloaded and the java for the Pogo games….but for some individuals, the time allotted for access in the break room just was not enough so they proceeded to access Pogo through the workstation computers that were being monitored by the company. The desktops in the workstations did not allow for any unauthorized downloads, however they accessed the internet and that gave employees the ability to break the rules by sending and receiving personal email on company time. The company blocked access to certain files, actions, and abilities on the workstation computers. Noone could erase their footprints so the company could check a random computer at anytime if there was suspicion about any employee’s actions. No, Noone has any privacy at any company concerning internet usage. Companies have to protect themselves and this is one way I guess they can follow through with that protection. Week 9 Capstone System Administrator System Administrators (sysadmin) are people employed by companies to maintain and operate a computer system and/or network. Duties of the sysadmin vary but include installing, supporting, and maintaining servers or other computer systems, planning for and responding to any service outages among other problems that may arise. Other duties may include scripting (requiring knowledge of programming languages), light programming, project management for systems related projects, training and supervising computer operators, and being a consultant for computer problems which go beyond the knowledge of technical support staff. Skills of a sysadmin require the knowledge of operating systems and applications, security, hardware and software troubleshooting, and knowledge of the purpose for which each computer operator in the organization uses a computer. The most important skill of the sysadmin is the ability to solve problems. The problem solving part of the sysadmin’s job is sometimes performed under stress; therefore, being able to stay on track and work well in stressful situations is a positive skill for a sysadmin applicant. The sysadmin is always on call when the computer system goes down or malfunctions, and must be able to quickly diagnose problems and suggest the best fix for the problem. Database Administrator The Database Administrator’s (DBAs) job is to implement software to meet the needs of employees effectively. A DBA performs analysis of employees at work and uses the information collected to find new and better ways to organize, store, and manage company data. DBAs, along with a team of other qualified individuals, install database management systems (DBMS) and perform tests on the installed systems to ensure proper performance of the system’s abilities such as storage, archiving, and backup and recovery processes in the event of natural disaster or other unforeseen circumstance. A major responsibility of the DBA is database security to ensure no outside breaching of the company system. The skills required to be an efficient DBA include the ability to communicate with computer operators who may have no computer technology background at all, and with other personnel such as computer programmers and managers. DBAs must have the ability to perform numerous tasks simultaneously, and the ability to concentrate and pay close attention to detail. These professions are useful in businesses such as The Bead Bar scenario we are studying. The DBA would analyze the employee’s positions and needs for proper functioning of their jobs, and use this information to find ways to improve their user/computer abilities. The DBA would then get with a specified team and put together a DBMS that would benefit the company and employees best in their job functions. The sysadmin would operate and maintain the company’s computer system and/or network to ensure proper access and communication throughout the network. The sysadmin would be on call 24/7 in case of system malfunction or shut down. Both the DBA and the System Administrator are responsible for monitoring security of the system to prevent outside breaching of personal and private company information. I chose these professions because I tend to pay close attention to detail in any job I perform; both positions call for detail attentiveness. I believe a profession in either of these positions will fulfill my need for working in the field of computer technology while leaving me room for advancement into a managerial position and eventually entrepreneurship of my own computer consultant business, if I chose this route in my career.
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'