IMS Notes For Exam PDF
IMS Notes For Exam PDF
IMS Notes For Exam PDF
In order to operate, businesses must deal with many different pieces of information about suppliers, customers, employees, invoices and
payments, and of course, their products and services. They must organize work activities that use this information to operate efficiently
and enhance the overall performance of the firm. Information systems make it possible for firms to manage all their information, make
better decisions, and improve the execution of their business processes.
Business Process:
• Business processes refer to the manner in which work is organized, coordinated, and focused to produce a valuable product or
service.
• Business processes are the collection of activities required to produce a product or service. These activities are supported by flows
of material, information, and knowledge among the participants in business processes.
• Business processes also refer to the unique ways in which organizations coordinate work, information, and knowledge, and the
ways in which management chooses to coordinate work.
• The outcome of a well-designed business process is increased effectiveness (value for the customer) and increased efficiency (less
costs for the company).
• There are three types of business processes:
• Management Processes: The processes that govern the operation of a system. Typical management processes include
corporate governance and strategic management
• Operational Processes: The processes that constitute the core business and create the primary value stream. For example,
taking orders from customers, and opening an account in a bank branch.
• Supporting Processes: Theses processes support the core
processes. Examples include Health & Safety, accounting,
recruitment, call center, technical support.
• Many business processes are tied to a specific functional area, such as
sales and marketing, while others cross many different functional areas
and require coordination across departments.
• Every business can be seen as a collection of business processes, some
of which are part of larger encompassing processes.
Business Process and Information Systems: Other business processes
cross many different functional areas and require coordination across
departments
What Is Collaboration?
Let ‘s first determine exactly what the term collaboration means working with others to achieve shared and explicit goals.
• All members that involve in collaborative work environment focus on a particular task or mission.
• Collaboration and teamwork have grown in popularity over the last few years because new technology has made it much easier for
people to communicate and share information, files, and documents.
• Collaboration among employees, suppliers, and customers is becoming an important tool in increasing a company’s competitive
advantage.
• Social networking platforms like Facebook, Twitter, and Pinterest help improve a company’s social business to establish and improve
interactions with groups inside and outside the organization.
• Information sharing, innovation, and decision-making are enhanced through these technologies.
Tools and Technologies for Collaboration and Social Business: Many new systems for interacting with other employees, managers,
vendors, and customers have been developed. We probably use some of them without realizing how essential they ‘ve become in
creating an environment that supports a collaborative culture.
• E-mail and instant messaging: Billions of messages flow everyday between employees, managers, suppliers, and customers.
• Social networking: More than just a way to socialize among friends, these tools give corporations another way for users to share
ideas and collaborate with each other. According to Forrester Research survey of 1,217 business decision makers worldwide late
last year, 95% use social networks to some extent.
• Wikis: Wikis are a type of Web site that makes it easy for users to contribute and edit text content and graphics without any knowledge
of Web page development or programming techniques. The most well-known wiki is Wikipedia. It relies on volunteers, makes no
money, and accepts no advertising. Wikis are ideal tools for storing and sharing company knowledge and insights.
• Virtual worlds: Able to house online meetings, training sessions, and this type of tool is gaining popularity as a way to meet, interact,
and exchange ideas.
• Virtual Meeting Systems: With a virtual meeting system you can hold strategy sessions once or twice a week instead. You would feel
like all of your teammates are physically located in the same place if you use telepresence technology. You can share ideas and
documents in real-time. Best of all, you don’t have all the travel hassles and you can sleep in your own bed.
• Microsoft SharePoint: SharePoint is a browser-based collaboration and document management platform, combined with a powerful
search engine that is installed on corporate servers. SharePoint has a Web-based interface and close integration with everyday tools
such as Microsoft Office desktop software products. SharePoint software makes it possible for employees to share their Office
documents and collaborate on projects using Office documents as the foundation.
• Lotus Notes: Another Internet-based collaboration environment a team could use is IBM’s Lotus Notes. It provides all the basic
collaboration tools as Google Apps/Google Sites and SharePoint do but with a few added features.
• Google Apps and Google sites: One of the most widely used free online services for collaboration is Google Apps/Google Sites.
Google Sites allows users to quickly create online, group editable Web sites. Google Sites users can design and populate Web sites
in minutes and, without any advanced technical skills, post a variety of files including calendars, text, spreadsheets, and videos for
private, group, or public viewing and editing. Google Apps works with Google Sites and Compiled By: Krishna Bhandari
www.genuinenotes.com includes the typical desktop productivity office software tools (word processing, spreadsheets, presentation,
contact management, messaging, and mail).
Tools & Technologies: post-pandemic | pre-pandemic for the collaboration and social business.
The Covid-19 pandemic has led to an inevitable surge in the use of digital technologies due to the social
distancing norms and nationwide lockdowns. People and organizations all over the world have had to adjust to
new ways of work and life. We explore possible scenarios of the digital surge and the research issues that arise.
An increase in digitalization is leading firms and educational institutions to shift to work-from-home (WFH).
Blockchain technology will become important and will entail research on design and regulations. Gig workers
and the gig economy is likely to increase in scale, raising questions of work allocation, collaboration, motivation,
and aspects of work overload and presenteeism. Workplace monitoring and technostress issues will become
prominent with an increase in digital presence. Online fraud is likely to grow, along with research on managing
security. The regulation of the internet, a key resource, will be crucial post-pandemic.
Research may address the consequences and causes of the digital divide. Further, the issues of net neutrality
and zero-rating plans will merit scrutiny. A key research issue will also be the impact and consequences o f
internet shutdowns, frequently resorted to by countries. Digital money, too, assumes importance in crisis
situations and research will address their adoption, consequences, and mode. Aspects of surveillance and
privacy gain importance with increased digital usage.
With the spread of the pandemic, almost all regions have implemented lockdowns, shutting down activities that
require human gathering and interactions - including colleges, schools, malls, temples, offices, airports, and
railway stations. The lockdown has resulted in most people taking to the internet and internet-based services to
communicate, interact, and continue with their job responsibilities from home. Internet services have seen rises
in usage from 40 % to 100 %, compared to pre-lockdown levels. Video-conferencing services like Zoom have
seen a ten times increase in usage, and content delivery services like Akamai have seen a 30 % increase in
content usage.
The lockdowns across countries have entailed a rise in the use of information systems and networks, with
massive changes in usage patterns and usage behaviour. Employees are adjusting to new "normals” - with
meetings going completely online, office work shifting to the home, with new emerging patterns of work. These
changes have come across most organizations, whether in business, society, or government. The changes have
also come suddenly, with barely any time for organizations and people to plan for, prepare and implement new
setups and arrangements; they have had to adjust, try, experiment, and find ways that did not exist before.
Experts in most countries are wary of the possibility of the disease spread re-emerging, and that lockdown norms
may be relaxed carefully and slowly with social distancing at the core of the new normal.
It is in this context that we see the use of information systems to continue in the same vein for some time in the
foreseeable future as during the lockdown. We examine the possible scenarios in this surge in information
technology usage during and post the pandemic. Our estimation of these effects assumes that there was a
digital transformation already underway, before the pandemic set in, and it will take certain forms owing to the
impact of the lockdowns.
Increasing digitalization: As the use of video- and audio-conferencing tools increases significantly,
organizations will ramp up their technology infrastructure to account for the surge. This will lead to increased
investment in bandwidth expansion, network equipment, and software that leverages cloud services. With
employees becoming acclimatized to the idea of work-from-home (WFH), meeting and transacting online, firms
will shift to WFH as a norm rather than as an exception.
Education is another domain in which there a dramatic shift to the online mode of transacting. Since the
beginning of the lockdown, schools, colleges, and universities around the world have shifted their classes to
video conferencing platforms like Zoom and Google Meet.
Digital transformation technologies such as Cloud, Internet-of-Things (IoT), Blockchain (BC), Artificial
Intelligence (AI), and Machine Learning (ML), constitute a bulk of the of what is being adopted by organizations
as part of their transformation effort.
Blockchain (BC) technology presents an opportunity to create secure and trusted information control
mechanisms. As education and healthcare services witnesses a shift to the digital domain, BCs enable a way
to secure and authenticate certificates, health records, medical records, and prescriptions.
Explain Porter’s Competitive Forces Model in brief with the example.
Porter's Five Forces is a model that identifies and analyzes five competitive forces that shape every industry
and helps determine an industry's weaknesses and strengths. Five Forces analysis is frequently used to identify
an industry's structure to determine corporate strategy.
Porter's model can be applied to any segment of the economy to understand the level of competition within the
industry and enhance a company's long-term profitability. The Five Forces model is named after Harvard
Business School professor, Michael E. Porter.
Porter's 5 forces are: Competition in the industry, Potential of new entrants into the industry, Power of
suppliers, Power of customers, Threat of substitute products
Porter's Five Forces is a business analysis model that helps to explain why various industries are able to sustain
different levels of profitability.
• Competition in the Industry: The first of the Five Forces refers to the number of competitors and their ability
to undercut a company. The larger the number of competitors, along with the number of equivalent products
and services they offer, the lesser the power of a company.
Suppliers and buyers seek out a company's competition if they are able to offer a better deal or lower prices.
Conversely, when competitive rivalry is low, a company has greater power to charge higher prices and set
the terms of deals to achieve higher sales and profits. Example - Several large, established companies
already occupy the athletic apparel industry. They have big budgets and lots of resources to maintain their
share of the market. Argento's products are not yet patented, so these companies or others could potentially
copy them. Competitive rivalry for Argento is high.
• Potential of New Entrants Into an Industry: A company's power is also affected by the force of new entrants
into its market. The less time and money it costs for a competitor to enter a company's market and be an
effective competitor, the more an established company's position could be significantly weakened.
An industry with strong barriers to entry is ideal for existing companies within that industry since the company
would be able to charge higher prices and negotiate better terms. Example - Entering the athletic apparel
market requires a large investment for production, advertising and branding. However, existing large apparel
companies could decide to enter the athletic market. The threat of new entrants is medium to low.
• Power of Suppliers: The next factor in the Porter model addresses how easily suppliers can drive up the
cost of inputs. It is affected by the number of suppliers of key inputs of a good or service, how unique these
inputs are, and how much it would cost a company to switch to another supplier. The fewer suppliers to an
industry, the more a company would depend on a supplier.
As a result, the supplier has more power and can drive up input costs and push for other advantages in
trade. On the other hand, when there are many suppliers or low switching costs between rival suppliers, a
company can keep its input costs lower and enhance its profits. Example - The athletic apparel industry has
a large and varied supplier base. Further, Argento has many options because it manufactures its products
using different companies in multiple countries. The bargaining power of suppliers is low.
• Power of Customers: The ability that customers have to drive prices lower or their level of power is one of
the Five Forces. It is affected by how many buyers or customers a company has, how significant each
customer is, and how much it would cost a company to find new customers or markets for its output.
A smaller and more powerful client base means that each customer has more power to negotiate for lower
prices and better deals. A company that has many, smaller, independent customers will have an easier time
charging higher prices to increase profitability. Example - Argento's buyers include both end-users and
wholesale. Wholesale customers have enough bargaining power to substitute Argento's products with those
of lower-priced competitors. End-users, however, are loyal to Argento's brand. The collective bargaining
power of buyers is medium.
• Threat of Substitutes: The last of the Five Forces focuses on substitutes. Substitute goods or services that
can be used in place of a company's products or services pose a threat. Companies that produce goods or
services for which there are no close substitutes will have more power to increase prices and lock in
favorable terms. When close substitutes are available, customers will have the option to forgo buying a
company's product, and a company's power can be weakened. Example - While companies could copy
Argento's unpatented products, the demand for athletic wear high and continuing to grow. The threat of
substitute products is low.
Understanding Porter's Five Forces and how they apply to an industry, can enable a company to adjust its
business strategy to better use its resources to generate higher earnings for its investors.
Ethical, social and political issues raised by Information Systems
Information technology is introducing changes for which laws and rules of acceptable conduct have not yet been developed. Increasing
computing power, storage, and networking capabilities--including the Internet--expand the reach individual and organizational actions
and magnify their impacts. The ease and anonymity with which information is now communicated, copied, and manipulated in online
environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issue
raised by information systems center around information rights and
obligations, property rights and obligations, accountability and control,
system quality, and quality of life.
• Ethical issues: Intellectual property rights, electronic monitoring of
employees and data utilization;
• Cultural issues: Assimilation of emerging technologies, developing trust,
power asymmetry, policy implementation, and social environments;
• Human interaction issues: recruitment and retainment of technical
personnel, motivation, leadership, social presence, and organizational
champions of information systems;
• Relationship issues: development partnerships, virtual teams, group
cohesiveness, collaboration, group facilitation, networking, and buyer-
supplier linkages;
• Security issues: misuse of data, virus/worm creation, Intranet abuse,
data protection, fraud with systems use, and standards and regulations.
Ethics In An Information Society: Ethical choices are decisions made by individuals who are responsible for the consequences of their
actions. Responsibility is a key element and means that you accept the potential costs, duties, and obligations for the decisions you
make. Accountability is a feature of systems and social institutions and means mechanisms are in place to determine who took
responsible action, and who is responsible. Liability is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or organizations. Due process is a related feature of law-
governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to
ensure that the laws are applied correctly.
Current trends in hardware and software include the increasing use of reduced instruction-set computing, movement to the UNIX
operating system, the development of large software libraries, microprocessor-based smart terminals that allow remote validation
of data, speech synthesis and recognition, application generators, now in fourth-generation languages, computer-aided software
engineering, object-oriented technologies, and artificial intelligence. The computer industry and its products continue to undergo
dynamic change. Software development continues to lag behind hardware, and its high cost is offsetting the savings provided by
hardware.
The future of hardware is quite shaky because of the troubles between software and hardware computer engineers and now that
software could not keep up with hardware, hardware may be declining as software will take over.
Grid computing: It involves connecting geographically remote computers into a single network capable of working in parallel on
business problems that require short-term access to large computational capacity. Meaning rather than purchase huge
mainframes or super computers, firms can chain together thousands of smaller desktop clients into a single computing grid.
Example thinks about how much time you don’t use your personal computer, in reality not a lot. Most computers in the world are
being idle and at night they are sleeping. What if you could combine all the idle time of hundreds or thousands of computers into
a continuous, connected computing capacity to capture, process, manage, store, and retrieve data? You wouldn’t have to
purchase enormous, super computers to realize this capability and capacity. You just have to turn on grid computing.
Cloud computing: This is a model of computing where firms and individuals obtain computing power and software applications
over the Internet, rather than purchasing their own hardware and software. Data are stored on powerful servers in massive data
centres, and can be accessed by anyone with an Internet connection and standard Web browser. Cloud computing is an umbrella
term used to refer to Internet based development and services. The cloud is an image for the Internet. A number of characteristics
define cloud data, applications services and infrastructure:
Remotely hosted: Services or data are hosted on someone else’s infrastructure.
Everywhere: Services or data are available from anywhere.
The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity. You pay for what you
would like pays as you go or the more you use the more you pay.\
Cloud computing is a general term for anything that involves delivering hosted services over the internet. These
services are divided into three main categories or types of cloud computing: infrastructure as a service (IaaS),
platform as a service (PaaS) and software as a service (SaaS).
A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a
proprietary network or a data center that supplies hosted services to a limited number of people, with certain
access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable
access to computing resources and IT services. Cloud infrastructure involves the hardware and software
components required for proper implementation of a cloud computing model. Cloud computing can also be
thought of as utility computing or on-demand computing.
These characteristics support a variety of important benefits for modern business, including the following:
• Cost management. Using cloud infrastructure can reduce capital costs, as organizations don't have to
spend massive amounts of money buying and maintaining equipment. This reduces their capital
expenditure costs -- as they don't have to invest in hardware, facilities, utilities or building large data
centers to accommodate their growing businesses. Additionally, companies don't need large IT teams
to handle cloud data center operations because they can rely on the expertise of their cloud providers'
teams. Cloud computing also cuts costs related to downtime. Since downtime rarely happens in cloud
computing, companies don't have to spend time and money to fix any issues that might be related to
downtime.
• Data and workload mobility. Storing information in the cloud means that users can access it from
anywhere with any device with just an internet connection. That means users don't have to carry
around USB drives, an external hard drive or multiple CDs to access their data. Users can access
corporate data via smartphones and other mobile devices, enabling remote employees to stay
up to date with co-workers and customers. End users can easily process, store, retrieve and
recover resources in the cloud. In addition, cloud vendors provide all the upgrades and updates
automatically, saving time and effort.
• Business continuity and disaster recovery (BCDR). All organizations worry about data loss. Storing data
in the cloud guarantees that users can always access their data even if their devices, e.g., laptops or
smartphones, are inoperable. With cloud-based services, organizations can quickly recover their data in
the event of emergencies, such as natural disasters or power outages. This benefits BCDR and helps
ensure that workloads and data are available even if the business suffers damage or disruption.
Explain the risk management of the data stores and different security measures to safeguard
from cyber threat.
Cybersecurity breaches have been on the rise, and it's expected that by 2023, they'll have grown to 15.4 million. While technological
advancements have made it easy for organizations to upgrade their security measures, malicious hackers are now using sophisticated
tools. This means that in addition to implementing strict cybersecurity policies, you also have to take proactive measures to reduce your
cybersecurity risks.
• Encrypt Your Data and Create Backups: Make sure all your sensitive data is encrypted. Saving your data in normal-text format only makes
it easy for hackers to access. Data encryption, on the other hand, limits data access to parties that have the encryption key. It also
ensures that even when unauthorized parties gain access to the data, they can't read it. Some data encryption software even lets
you know when other people try to alter or tamper with the information.
• You should also conduct regular backups for your important information. Sometimes cybersecurity breaches can result in data loss.
When this happens, and you don't have a reliable and secure backup, it could result in operational disruptions that could cause
your organization a lot of lost revenue. One of the most effective data backup strategies is the 3-2-1 rule. Based on this strategy,
you should have at least 3 copies of your data stored. 2 of them should be stored on different media, and one should be in an offsite
location.
• Conduct Regular Employee Training : One of the common ways malicious hackers gain access to your database is through phishing
emails sent to your employees. In fact, statistics show that over 3.4 billion phishing emails are sent globally. These emails contain
malicious malware in the form of links that give hackers access to user data, including login credentials. Phishing emails are often
hard to detect as they seem legitimate. For instance, a hacker may send an email impersonating leaders in the organization asking
for personal details. Without proper training, the employee may end up divulging this information. This is why it's vital that you
conduct cybersecurity awareness training. Let your employees know of the main forms of cybersecurity attacks and the best ways
to prevent them.
• Keep Your Systems and Software Updated: Software and system updates highly impact your cyber security and digital safety. This is
because they not only add new features but also fix bugs and help patch security flaws and vulnerabilities that can be exploited.
Malicious hackers write code that they use to exploit the vulnerabilities. Most of the time, this code is packaged in the form of
malware which can affect your entire system. So, make sure you use a patch management system to automatically manage all
updates and uphold information security.
• Use Strong Password: Here's an interesting fact; over 80% of organizational data breaches result from weak passwords. Hackers don't
need much to gain access to your systems. They only require a small gap, and they'll exploit it fully. Password cracking technology
has greatly advanced, and simple passwords don't cut it anymore. Instead, you need to use complex passwords and deploy multi-
factor authentication strategies to discourage cybercrime in your organization. You should also discourage password sharing among
employees so that even if one desktop is hacked, the rest remain secure.
• Assess and Monitor Your Vendors: Chances are that your cyber security is highly dependent on third-party vendors, which is why you can’t
afford to ignore vendor risk management. This will help you mitigate third-party risk instead of solely relying on incident response.
Your main focus should be on:
• Cybersecurity risk: onboard vendors using the right strategies and monitor them throughout your relationship.
• Legal, regulatory, and compliance risk: ascertain that the vendor will not impact your compliance with regulations, agreements,
and local legislation.
• Operational risk: if the vendor is a critical aspect of your organization, ensure that they won't disrupt your operations.
• Strategic risk: ensure the vendor will not impact your ability to meet your organizational objectives.
• Reduce Your Attack Surface: Your attack surfaces are the vulnerabilities or entry points that malicious hackers can use to access
sensitive data. They could be anything like IoT, software, web application systems, and even employees that are often susceptible
to social engineering attacks such as whaling and phishing.
• Pay Close Attention to Physical Security: Most organizational cyber risk management policies focus on the digital aspect of cyber risks and
entirely neglect their physical premises. Conduct a security assessment and determine whether your critical infrastructure is safe
from security breaches. You should also analyze your data protection policy and decide whether or not it has data disposal
strategies. Think of a scenario where your online systems are safe from cybercriminals, but you experience a breach because
someone broke into your offices and rummaged through your file cabinets. That would be tragic! There are even other instances
where janitors go through the garbage and obtain customer and employee personal information. If you have any restricted areas,
make sure they are protected using high-value systems. You should also use 2-factor authentication such as keycards
and biometrics. This way, even if the keycard is lost or stolen, no one will be able to access the area.
• Install Firewalls: Cyber security threats are becoming more sophisticated, and everyday hackers come up with new ways of accessing
data. So, you should defend your networks from cyber attacks by installing firewalls. A reliable system will effectively protect you
from brute attacks or prevent security incidents from causing irreversible damage.
In addition to this, firewalls monitor your network traffic to identify any suspicious activity that could compromise your data integrity.
They also prevent complex spyware from gaining access to your systems and promote data privacy.
• Create A Secure Cybersecurity Policy: Your organization's cybersecurity is highly influenced by the policies that you have in place. Do you
have guidelines for data breach prevention and detection? How often do your IT teams conduct risk assessments or penetration
testing? It all starts with your guidelines!
Go through your existing policies and identify any loopholes they may have. Some of the guidelines you should have in place include;
• Disaster recovery: If a breach occurs, a disaster recovery plan ensures that your employee and IT teams know the next course of
action. It's aimed at reducing the amount of time that you are offline, thereby ensuring that your operations resume as soon as
possible.
• Access control/management: this policy highlights the parties that can access sensitive information, reducing the risk of
unauthorized access. Data mishandling has both financial and legal consequences, so make sure your access management policy
specifies which stakeholders are allowed access to what and under which circumstances they can share this information.
• Security testing: the policy should state the frequency of your cybersecurity tests. This allows you to uncover vulnerabilities before
it’s too late. Some of the security tests that you should conduct include; vulnerability scanning, security posture assessment,
penetration testing, ethical hacking, cybersecurity assessments, etc.
• Incident response plan: this is documentation of the steps and procedures that should be implemented in case of a breach. It also
highlights the responsibility of key information security players and reduces your organization's response time.
“This is the digital world”. Justify the statement and what are the different digital technologies
help in the current business development.
Digital world means connected by the help of digital devices, media or we can say digital marketing services that are available to everyone
at any time. It is the world full of ideas, opinions, learning and opportunities. Only because of the Internet has made it possible for all of
us to connect whenever we consider it necessary. There are many methods in which we take the benefit of the digital world, because of
the digital world people run worldwide online business, it has enhanced communication. Technology has also enhanced teaching and
learning. . We need to look at our daily lives or those of our who are very near to us (family and colleagues).
Internet has revolutionized the communication systems and put our world on fast track. The old days are gone where travelling far or
communicating with the people that not living near to us was not even a concept and the work place was near to the living area. Now,
due to the advances in technology, we have entered a world where we can work for a company that isn’t even based in our country,
where we can complete the tasks the are assigned to us by just being online, by these advances any one can do what he want to do e.g.
where everyone can be a film star, release a hit single or be a comedian reaching out to a global audience, and much more. This is just
the beginning , there are many more that lies in the digital world that the previous generation couldn’t even think about. Digital technology
has effects all around the globe.
Let us get into details of a few important determinants of the digital world:
Engagement: Now more than ever, technology has been important in helping us stay engaged with friends and family. Analogue
engagement refers to physical engagement such as talking to someone face to face. This has not been possible during the pandemic,
leading to an increase in digital engagement, which refers to virtual methods of engagement such as online messaging, phone calls and
video calls. Digital engagement lacks aspects such as proximity, body language, facial expressions, and tone of voice which prevents a
personal connection being established unlike analogue engagement. However, despite the lack of some of these aspects, without these
virtual methods, people would not have been able to communicate with their loved ones due to lockdown restrictions.
Data Security: The Internet of Things (IOT) describes the network of physical objects that are embedded with sensors, software, and
other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Digital home
assistants (such as an Amazon echo) are internet-connected devices designed to make life easier for the user. These devices can carry
out tasks via voice control such as turning lights on or off, playing music or telling you the weather. This can have a positive impact on
users as it helps with everyday tasks. However, many people have concerns about these devices violating their privacy. These digital
assistants can record our conversations as well as our location via our smartphones, and they can use this data for machine learning to
improve themselves over time. Concerns about data security are valid concerns because these devices can be vulnerable to technical
failure, and can also be hacked remotely.
Online behaviour and freedom of speech: Freedom of speech is part of the Human Rights Act, which states that people have the
right to hold an opinion and they have the freedom to express these opinions. The internet provides a good platform for people to
express their opinions as well as educate others on important topics. For example in 2020, social media was used to support the Black
Lives Matter campaign and to raise awareness about how minority groups are treated. Without the internet, the world would not have
been made aware of the unjust treatment that led to George Floyd’s death, and justice would not have been served. Although racism is
still alive in the world today, the internet and the freedom to express your opinion has allowed users to educate themselves on the
subject, which is the first step to fighting it. However sometimes it can be difficult to find the balance between freedom to express and
freedom from abuse. Although freedom of speech is important, cyber bullying is not acceptable and the anonymity of the internet
provides an easy way for hate speech to take place.
These eight technologies have the greatest impact on business and society
• Digital assistants: Digital assistants are various types of software that are capable of performing rule-based work processes and
communicating with people through writing and speech. The digital assistants are represented by technologies such as the Robotics
Process Automation (RPA), chatbots and voice assistants.
• Internet of things: The Internet of Things (IoT) comprises objects, often electronics and sensors, that are identifiable and can
communicate with each other and exchange data via the Internet and cloud solutions. Third parties are also part of this network
from time to time, and can offer insights and services to users. IoT objects could be anything from a sensor that monitors a pump
at a manufacturing facility to the smartphone you use to unlock your car or house.
• Artificial intelligence (AI): AI (artificial intelligence) is a broad term that refers to a computer program’s or computer’s ability to appear
intelligent. AI usually has the ability to capture data about its environment and can learn or adapt in order to achieve a given goal.
In order to build an AI system that adds value, large volumes of data and an algorithm are used that are suitable for what the system
is intended to achieve. After consuming the data, the system can make decisions based on the knowledge it has built up.
• Virtual & augmented reality: Virtual reality (VR) is a technology that allows the user to interact in a computer-simulated recreation
of a real environment. Augmented reality (AR) is a fusion of VR where reality and a computer-simulated environment are merged,
which we have seen for example with Pokemon Go or with lenses in Snapchat. In industrial environments, AR is used in a similar
way to present drawings or status information for equipment that you are filming or looking at through glasses or a tablet/iPad.
• Blockchain: A blockchain is a distributed transactional database in which all the parties are always in possession of the same
information about the transactions. It is not possible to change information in the database unless the majority of participants agree
that the change complies with the rules defined for a transaction to be approved. A blockchain therefore makes it possible to carry
out transactions securely between multiple parties without the need for the transaction to be verified by a third party (such as a
bank). Blockchains establish trust between the parties in a network who will be interacting.
• 3D printing: 3D printing is a digitally-operated manufacturing technology in which physical objects are printed by a 3D printer based
on the specification of a digital 3D model. The manufacturing process is additive, which means that an object is produced layer by
layer rather than milling or turning a larger object down to the desired shape.
• Drones: A drone is an unmanned aircraft that can fly (or dive) autonomously using software or be remotely controlled by people.
For example, drones can be used for searching, surveillance and transportation.
• Robotics and automation: Automation of physical work duties is a growing trend within several sectors. This means that physical
robots and machines are increasingly taking over work duties previously carried out by human employees.
Artificial Intelligence plays a vital role in the different decision making process among the
Customer. Discuss the ways in which the AI is used.
The uncompromising competition of the business world forces 83% of companies to rely on the power of Artificial
Intelligence solutions. Artificial Intelligence (AI) includes not only the automation of many recurring processes
but goes further – it influences decision making.
By eliminating human errors and analyzing vast amounts of various data quickly and constantly, AI equips
businesses with a full range of information and provides structured solutions to arising issues.
Businesses tend to choose solutions empowered with big data, Artificial Intelligence, or Machine Learning more
and more often. Such solutions can aggregate data from various areas of the company’s operations, such as
finance, accounting, customer service, and more.
Professionals use this data to save costs, build growth strategies, streamline inner business processes, and
enhance decision making initiatives. Combined with the flexibility of cloud computing, AI facilitates management,
problem-solving, and strategic development.
So, when is it worth implementing technologies based on Artificial Intelligence? The answer is simple: when you
want specific processes in the company to be faster and more efficient and let qualified employees engage in
more creative tasks.
Artificial Intelligence adds to decision making a lot. It makes the process clearer, faster, and more data-driven.
Empowered with AI, you can make small decisions on the go, solve complex problems, initiate strategic
changes, evaluate risks, and assess your entire business performance.
What are the different stages in the decision making process in the organization?
Decision making is the process of making choices by identifying a decision, gathering information, and assessing
alternative resolutions.
Using a step-by-step decision-making process can help you make more deliberate, thoughtful decisions by
organizing relevant information and defining alternatives. This approach increases the chances that you will
choose the most satisfying alternative possible.
1. Identify the decision: To make a decision, you must first identify the problem you need to solve or the question
you need to answer. Clearly define your decision. If you misidentify the problem to solve, or if the problem you’ve
chosen is too broad, you’ll knock the decision train off the track before it even leaves the station.
If you need to achieve a specific goal from your decision, make it measurable and timely.
2. Gather relevant information: Once you have identified your decision, it’s time to gather the information relevant
to that choice. Do an internal assessment, seeing where your organization has succeeded and failed in areas
related to your decision. Also, seek information from external sources, including studies, market research, and,
in some cases, evaluation from paid consultants.
3. Identify the alternatives: With relevant information now at your fingertips, identify possible solutions to your
problem. There is usually more than one option to consider when trying to meet a goal. For example, if your
company is trying to gain more engagement on social media, your alternatives could include paid social
advertisements, a change in your organic social media strategy, or a combination of the two.
4. Weigh the evidence: Once you have identified multiple alternatives, weigh the evidence for or against said
alternatives. See what companies have done in the past to succeed in these areas, and take a good look at
your organization’s own wins and losses. Identify potential pitfalls for each of your alternatives, and weigh those
against the possible rewards.
5. Choose among alternatives: Here is the part of the decision-making process where you actually make the
decision. Hopefully, you’ve identified and clarified what decision needs to be made, gathered all relevant
information, and developed and considered the potential paths to take. You should be prepared to choose.
6. Take action: Once you’ve made your decision, act on it! Develop a plan to make your decision tangible and
achievable. Develop a project plan related to your decision, and then assign tasks to your team.
7. Review your decision: After a predetermined amount of time—which you defined in step one of the decision-
making process—take an honest look back at your decision. Did you solve the problem? Did you answer the
question? Did you meet your goals?
Discuss the various tools and technologies used for digital transformation of the Software
consultancy firm.
When digital transformation is discussed, technology is usually not far behind. Whether it’s Internet of Things (IoT),
cloud, or artificial intelligence (just to name a few), tech is changing how organizations around the world are doing
business. While there’s no question that technology goes hand-in-hand with digital transformation, there are other
essential considerations that must come first in a digital transformation strategy. These include identifying value-
driven business outcomes and developing a culture of change and collaboration.
As industrial enterprises look for efficiencies, additive manufacturing has impacts across the value chain, not
just manufacturing. For example, if customers – or field operations – have the ability to “print” replacement
parts for a machine, this provides more efficient, seamless customer service, decreases downtime, and
lowers service costs. Creating the digital thread as a single source of truth enables this additive manufacturing
use case and unifies value chain functions.
Explain in detail the virtual world is augmented in the business world rather the manual world.
Slowly but steadily, the related technologies of Augmented Reality (AR) and Virtual Reality (VR) are moving
from the lab to the commercial space. They have started capturing the imagination of the general public and the
corporate world. Like any other emerging technology their perceived benefits are checkmated by legal,
technological and economic hurdles.
Virtual Reality: Refers to interactive simulated computer generated experience where in a user is cut off from
the real world and is immersed in the digital world mostly composed of artificial sounds and sights. At current
state of technologies, it requires a Head Mounted Display (HMD) and content changes with movement of eyes
as well as the body and the user can interact with the virtual world.
Augmented Reality: It appeared after Virtual Reality and here the real world is augmented by the digital world.
The user can observe his or her surroundings. It can be experienced using smartphones and tablets, besides
the HMDs. Due to users’ inhibitions to be completely cut off from the real world, it can generate more use cases
than Virtual Reality.
Mixed Reality: The term is of recent use and refers to an enhanced version of Augmented Reality. Mixed reality
augments the real world with virtual objects that aim to look as if they are really placed within the real world. It
carries more intelligence as it locks the position of digital objects in relation to the real objects. In future, it may
overshadow its other two cousins.
Benefits
Games: Many people associate AR/VR with gaming and that remains its important application. One popular
application of Augmented reality was demonstrated in the game Pokeman Go in 2016 where players targeted
to search for virtual creatures on their smartphones.
Training: Training of all types is the most important potential use of AR/VR. It could be high end training of
aircrafts, military and space environments; industrial training of manufacturing processes and equipments or
school and college level training. While former can reduce costs, interactive and immersive trainings can make
school and college curriculum more interesting
Tours: Travel industry can help the tourists to take virtual tours of the places they want to visit later. Google
StreetView is an example of an application which can help in this. Real Estate industry is using such tours to
provide immersive view of properties using Virtual Reality.
Retail experience: The experience of online shopping can be improved by AR/VR as users can view or even
try the product under the context it will be used say a piece of furniture inside their room. This is being used by
many companies including Swedish retail giant, IKEA. This can reduce marketing costs as well as returns.
AR/VR can also be used for more engaging and immersive advertisements and marketing campaigns.
Challenges
However there are multiple challenges to surmount before any of the Realty technologies are adapted on a large
scale.
HMDs: Currently, all Reality technologies suffer from form factor. All VR and some AR use cases need HMD
which are bulky and may need to be connected by wires to computers or gaming consoles. For example VR
HMDs e.g. HTC Vive, PlayStation VR and Oculus Rift need to be connected to a machine while standalone
ones e.g. Google Carboard exists but have smaller market share.
Networks: Faster Wireless communication is another requirement for AR/VR acceptance. The required speeds
is in Gbits/sec and cannot be provided by 4G networks, so deployment of 5G networks will be a key enabler.
Even in 5G the required speeds will be achieved at frequencies of few tens of GHzs.
Artificial Intelligence: Augmented Reality needs virtual world and the physical world match precisely and
change in real time according to user movement. Advanced image and video processing technologies based
on deep learning are needed to dynamically and accurately recognize walls, floors, tables and other objects.
Predictions
As per Gartner Hype cycle, both Augmented Reality and Virtual Reality will reach “Plateau of Productivity” in the
next 10 years implying mass adoption will take off. As per one of IDC’s report, worldwide spending on AR/VR
products and services will experience five-year compound annual growth rate (CAGR) of 98.8% during the 2017-
2021 forecast period. According Goldman Sachs’ base case scenario, AR/VR market will touch $80 billion in
2025 from less than $10 billion in 2017. The numbers vary based of what is included in the data i.e. hardware,
software or services but all forecasts point to exponential growth rates.
Business intelligence and database
Business Intelligence (BI) systems are used to improve an enterprise's decision making by combining tools for gathering,
storing, accessing, and analyzing business data. While traditional features for querying, reporting, and analytics have long
been the core focus of these tools, BI has evolved in recent years to become comprehensive, enterprise-wide platforms,
and newer trends, such as self-service BI, have helped to continue interest in this technology. BI is a combination of the
tools and systems involved in an enterprise's strategic planning that aid in its analysis.
While applicable to organizations of any size, business intelligence solutions are most relevant to industries with large
numbers of customers, high levels of competition (with the resultant need for differentiation), and large volumes of data.
Common business intelligence functions include, but are not limited to, the following:
• Analyzing sales trends.
• Tracking customer buying habits.
• Managing finances.
• Evaluating sales and marketing campaign effectiveness.
• Predicting market demand.
• Analyzing vendor relationships.
• Assessing staffing needs and performance.
Market Leaders: As with other aspects of the technology industry, the business intelligence market has long been segmented
into two major parts: standalone solutions and products that are part of larger, enterprise suites. However, that is changing
as enterprise vendors acquire the standalone ones. In the past couple of years, SAP acquired Business Objects, IBM
acquired Cognos, and Oracle acquired Hyperion.
• IBM Cognos: Cognos, around since the 1970s, entered the BI market in the 1990s. In late 2005, Cognos re-
architected its BI product and released Cognos 8 BI. The product includes reporting, analysis, scorecarding,
dashboards, business event management, data integration, and a strong searching feature. Cognos acquired
Applix, a well known vendor of performance analytics, in October 2007.
• Information Builders: Information Builders' BI product is called WebFOCUS. It uses Ajax technology, which
combines asynchronous JavaScript and XML. The latest release, WebFOCUS 8, was introduced in April 2010. It
fully integrates a Performance Management Framework (PMF) interface; includes a new BI Portal for developers to
build and deploy dashboard solutions; allows users to create portable BI applications; offers an Activity Monitor for
business activity monitoring (BAM) and the CEP Enable capability for complex event processing; and includes two
new advanced analytic components, Visual Discovery 8 for visual analytics and RStat 1.2 for predictive analytics.
The product will be generally available in the fourth quarter of 2010.
• Microsoft: Microsoft's BI product line comprises SQL Server 2008 R2 for data storage and management
(encompassing data mining, data warehousing, data quality, and ad-hoc analysis); SharePoint Server 2010 for
information delivery (encompassing dashboards, collaboration/search, managed reporting, visualization, and
scorecards); and Excel, along with SQL Server, for query, reporting, and analysis (encompassing ad-hoc analysis,
production reporting, and OLAP analysis). Microsoft released SharePoint Server 2010 and Office 2010 on May 12,
2010; however, both products were involved in a large beta program. By the time of the products' release, 8.6 million
people were already using Office 2010 and related products, and more than 1,000 partners were already building
solutions for the products.
• Oracle: Oracle's BI focus is based on its Business Intelligence Suite. This product line comprises Oracle BI Suite
Enterprise Edition Plus, Oracle BI Standard Edition One, and Oracle BI Oracle Publisher (formerly XML Publisher),
an enterprise reporting solution for authoring, managing, and delivering highly formatted documents. The Oracle BI
product line integrates the Oracle database with Fusion middleware and analytics software and also includes
analytics software originally from Siebel Systems, another Oracle acquisition. The product family works with both
Oracle and non-Oracle environments. Oracle took another step in the direction of BI supremacy with the acquisition
in March 2007 of Hyperion System 9 BI+. This product, originally called Hyperion Essbase (derived from Extended
SpreadSheet database), was developed by Arbor Software, which Hyperion acquired in 1998. Oracle has now
renamed it Oracle Essbase. The product includes reporting capabilities, dashboards, and an analysis feature that
also can be used in Microsoft Excel. Additionally, it combines its BI functionality with financial applications, making
it more of a Business Process Management (BPM) system than "just" BI.
• SAP: Business Objects was acquired by SAP in a "friendly takeover" completed in 2008. At its completion, SAP
announced the release of nine packages, combining solutions from both companies in various groupings that are
being sold by the sales departments of both companies as well. The packages fall into three categories: performance
optimization applications, including Financial Performance Management (FPM) and Governance, Risk, and
Compliance (GRC); business intelligence platform packages that include Visualization and Reporting, Enterprise
Query, Reporting, and Analysis, Data Integration and Data Quality Management, and Master Data Services; and
packages geared to small and midsized companies, including SAP Business All-in-One with BusinessObjects Edge
Standard, Crystal Reports Server, and BusinessObjects Edge Series, which now includes integration for SAP
Solutions. According to Gartner, the combination of SAP and Business Objects formed the largest installed base in
the market, with an estimated 46,000 customers. SAP has integrated PilotWorks with its own applications.
Additionally, the company continues to market another BI product line. SAP's Business Intelligence software
package is a component of the company's NetWeaver platform, which also includes an enterprise portal, tools for
integrating SAP software with barcode readers and Bluetooth devices, and data management software, as well as
tools for custom application development. The Business Intelligence component offers a full line of extraction,
analysis, and reporting tools with the capability to publish information to an intranet portal or mobile device.
Normalization in database
Normalization is the process of organizing data in a database. This includes creating tables and establishing
relationships between those tables according to rules designed both to protect the data and to make the
database more flexible by eliminating redundancy and inconsistent dependency.
Redundant data wastes disk space and creates maintenance problems. If data that exists in more than one
place must be changed, the data must be changed in exactly the same way in all locations. A customer address
change is much easier to implement if that data is stored only in the Customers table and nowhere else in the
database.
What is an "inconsistent dependency"? While it is intuitive for a user to look in the Customers table for the
address of a particular customer, it may not make sense to look there for the salary of the employee who calls
on that customer. The employee's salary is related to, or dependent on, the employee and thus should be
moved to the Employees table. Inconsistent dependencies can make data difficult to access because the path
to find the data may be missing or broken.
There are a few rules for database normalization. Each rule is called a "normal form." If the first rule is
observed, the database is said to be in "first normal form." If the first three rules are observed, the database is
considered to be in "third normal form." Although other levels of normalization are possible, third normal form
is considered the highest level necessary for most applications.
As with many formal rules and specifications, real world scenarios do not always allow for perfect compliance.
In general, normalization requires additional tables and some customers find this cumbersome. If you decide
to violate one of the first three rules of normalization, make sure that your application anticipates any problems
that could occur, such as redundant data and inconsistent dependencies.
Normalization example:
Data warehouse and data mart
A Data Warehouse collects and manages data from varied sources to provide meaningful business insights.
It is a collection of data which is separate from the operational systems and supports the decision making of the company.
In Data Warehouse data is stored from a historical perspective.
The data in the warehouse is extracted from multiple functional units. It is checked, cleansed and then integrated with
Data warehouse system. Data warehouse used a very fast computer system having large storage capacity. This tool can
answer any complex queries relating data.
A data mart is a simple form of a Data Warehouse. It is focused on a single subject. Data Mart draws data from only a
few sources. These sources may be central Data warehouse, internal operational systems, or external data sources.
A Data Mart is an index and extraction system. It is an important subset of a data warehouse. It is subject-oriented, and
it is designed to meet the needs of a specific group of users. When compared Data Mart vs Data Warehouse, Data marts
are fast and easy to use, as they make use of small amounts of data.
Usage It helps to take a strategic decision. It helps to take tactical decisions for the business.
OLTP (Online Transactional Processing) is a type of data processing that executes transaction-focused tasks. It involves
inserting, deleting, or updating small quantities of database data. It is often used for financial transactions, order entry,
retail sales and CRM.
While these databases have scaled significantly, they still present many limitations. They perform small but numerous
transactions that can result in large data sets. However, pulling insights from these data sets requires accumulating,
synthesizing, and then analyzing the large volume of data. OLTP was built to collect voluminous data transactions but not
necessarily to analyze that data in the aggregate.
One of the drivers behind the data warehouse was to provide a better way to gain actionable intelligence from large
quantities of small, fractured data sets. The data warehouse stores a copy of the data residing in OLTP databases, along
with larger sets of Internet and cloud-born data, allowing query access to comprehensive enterprise data from one
location, no matter how large or small the set.
For example: POS (point of sale) system of any supermarket is a OLTP System.
Every industry in today’s world use OLTP system to record their transactional data. The main concern of OLTP systems
is to enter, store and retrieve the data. They covers all day to day operations such as purchasing, manufacturing, payroll,
accounting, etc.of an organization.
Some other examples of OLTP systems include order entry, retail sales, and financial transaction systems.
Advantages of an OLTP System:
• OLTP Systems are user friendly and can be used by anyone having basic understanding
• It allows its user to perform operations like read, write and delete data quickly.
• It responds to its user actions immediately as it can process query very quickly.
• This systems are original source of the data.
• It helps to administrate and run fundamental business tasks
• It helps in widening customer base of an organization by simplifying individual processes
The main characteristics of an online transaction processing system are the following:
• ACID compliance: OLTP systems must ensure that the entire transaction is recorded correctly. A transaction is
usually an execution of a program that may require the execution of multiple steps or operations. It may be complete
when all parties involved acknowledge the transaction, or when the product/service is delivered, or when a certain
number of updates are made to the specific tables in the database. A transaction is recorded correctly only if all
the steps involved are executed and recorded. If there is any error in any one of the steps, the entire transaction
must be aborted and all the steps must be deleted from the system. Thus OLTP systems must comply with atomic,
consistent, isolated, and durable (ACID) properties to ensure the accuracy of the data in the system.
o Atomic: Atomicity controls guarantee that all the steps in a transaction are completed successfully as
a group. That is, if any steps between the transactions fail, all other steps must also fail or be reverted.
o Consistent: The transaction preserves the internal consistency of the database. If you execute the
transaction all by itself on a database that’s initially consistent, then when the transaction finishes
executing the database is again consistent.
o Isolated: The transaction executes as if it were running alone, with no other transactions. That is, the
effect of running a set of transactions is the same as running them one at a time. This behavior is
called serializability and is usually implemented by locking the specific rows in the table.
o Durable: The transaction’s results will not be lost in a failure.
• Concurrency: OLTP systems can have enormously large user populations, with many users trying to access the
same data at the same time. The system must ensure that all these users trying to read or write into the system
can do so concurrently. Concurrency controls guarantee that two users accessing the same data in the database
system at the same time will not be able to change that data, or that one user has to wait until the other user has
finished processing before changing that piece of data.
• Scale: OLTP systems must be able to scale up and down instantly to manage the transaction volume in real time
and execute transactions concurrently, irrespective of the number of users trying to access the system.
• Availability: An OLTP system must be always available and always ready to accept transactions. Loss of a
transaction can lead to loss of revenue or may have legal implications. Because transactions can be executed from
anywhere in the world and at any time, the system must be available 24/7.
• High throughput and short response time: OLTP systems require nanosecond or even shorter response times
to keep enterprise users productive and to meet the growing expectations of customers.
• Reliability: OLTP systems typically read and manipulate highly selective, small amounts of data. It is paramount
that at any given point of time the data in the database is reliable and trustworthy for the users and applications
accessing that data.
• Security: Because these systems store highly sensitive customer transaction data, data security is critical. Any
breach can be very costly for the company.
• Recoverability: OLTP systems must have the ability to recover in case of any hardware or software failure.
Types of information system and their differences
An information system is a group of data sets that ensures that business operates smoothly, embracing
change, and helping companies achieve their goal. The dictionary defines an information system as a
computer system or set of components for collecting, creating, storing, processing and distributing
information. The information system is incomplete without the support of information technology (IT)
systems.
Information Security is not only about securing information from unauthorized access. Information Security
is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information. Information can be physical or electronic one. Information
can be anything like Your details or we can say your profile on social media, your data in mobile phone, your
biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile
Computing, Cyber Forensics, Online Social Media etc.
The ever-expanding digital footprint of modern organizations continually exposes software vulnerabilities
and presents threat actors with an expanding attack surface. The larger the target, the harder it is to miss.
Managing risk is an ongoing task, and its success will come down to how well risks are assessed, plans are
communicated, and roles are upheld. Identifying the critical people, processes, and technology to help
address the steps above will create a solid foundation for a risk management strategy and program in your
organization, which can be developed further over time.
MCQ
Which is NOT a part of behavioral approach and technical approach? Technology Design
The performance of a system is optimized when both the technology and the Sociotechnical Approach
organization mutually adjust to one another until a satisfactory fit is obtained.
_____________ for middle management help with monitoring, controlling, Transaction Processing System
decision-making, and administrative activities.
______________ use to integrate business processes in manufacturing and
production, finance and accounting, sales and marketing, and human Management Information System
resources into a single software system.
___________ which are company websites that are accessible to authorized
vendors and suppliers and are often used to coordinate the movement of E-Business
supplies to the firm’s production apparatus.
The information of MIS comes from the boot _______ source. internal and external
_________ is the part of e-business that deals with the buying and selling of E-Commerce
goods and services over the Internet.
Publish and rapidly access knowledge; discuss opinions and experiences? Blogs and Wikis
Real-time information streams, status updates, and announcements from Feeds and Notifications
designated individuals and groups.
____________ system provide information to coordinate all of the business
processes that deal with customers in sales, marketing, and service to Customer Relationship Management
optimize revenue, customer satisfaction, and customer retention.
___________ focuses on task or mission accomplishment and usually takes Collaboration
place in a business or other organization and between businesses.
Which of the following factor has helped spur the popularity of collaborative emergence of cloud networks
software for conferencing and workgroup support?
Yahoo's Exchange platform added
Point out the wrong statement: features to compete with Notes
Which of the following is not a social networking site? None of the mentioned
Information technology plays a critical role in helping organizations: perceive environmental change.
The principles and standards that guide our behavior toward other people are Ethics
called:
The situation in which one accepts the potential costs, duties, and obligations responsibility
for the decisions one makes is called:
The statement that if an action is not right for everyone to take it is not right the Categorical Imperative
for anyone to take is an expression of:
What records information about you during a Web surfing session such as
what Web sites you visited, how long you were there, what ads you looked at, Cookie
and what you purchased?
The statement that everything is owned by someone else, and that the the Ethical "no free lunch" rule
creator wants compensation for his work is an expression of:
Nanotechnology uses individual atoms and molecules to create computer 10,000 times thinner than a human hair
chips and other devices that are:
Windows
The operating system that dominates the client marketplace is:
Older transaction processing systems created for mainframe computers that Legacy systems
continue to be used to avoid the high cost of replacement are known as:
Java was created by a community of
several hundred thousand programmers
around the world
Which of the following statements about Java is not true?
The TCP/IP layer that is responsible for providing the communication and Transport layer
packet services is the:
Train
Which of the following is not a local area network (LAN) topology?
What tells the browser software exactly where to look for the information URL (Uniform Resource Locator)
being requested?
RFID systems transmit radio signals
Which of the following statements about radio frequency identification (RFID) over long distances
is not true?
The method of slicing digital messages into parcels, sending them along
different communication paths, and then reassembling them after they arrive Packet switching
at their destination is called:
__________ are methods, policies, and organizational procedures that
ensure the safety of the organization's assets, the accuracy and reliability of Controls
its records, and operational adherence to management standards.
______________ involves redirecting a web link to an address different from
the intended one, with the site masquerading as the intended destination. Spoofing
Geoscience
Which is NOT a Location-based services?
Website
Which is not a platform for Social Media
Social Media platform
Identify appropriate social platforms and content for products and services
Display Ads
As of 2018, which Online ad spending by format has the maximum revenue
All the above
On-demand business example is?
______________ is thought to be the collective and individual experience of Wisdom
applying knowledge to the solution of problems.
_______________ involves identifying and exploring various solutions to the Intelligence
problem.
Do data values fall within defined ranges? Is an Information quality dimension Integrity
of ____________?
________________use statistical analysis, data mining techniques, historical
data, and assumptions about future conditions to predict future trends and Predictive Analytics
behavior patterns
Systems design, systems analysis, ,
conversion, testing, programming, and
The systems development process take place in sequential order. Select the production and maintenance
correct sequence.