Preview

Business Processes and Information Systems

Powerful Essays
Open Document
Open Document
2574 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Processes and Information Systems
1)Define IT Infrastructure from both a technology and a service perspective. Which services does IT infrastructure comprise?
IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise. It is also a set of firmwide of services budgeted by management and comprising both human and technical capabilities.
Services include:
Platforms used to provide computing services that connect employees, customers, and suppliersinto a coherent digital envronment, including large main frames, desktop and laptop computers, pda’s, and internet appliances.
Telecommunications services that provide data , voice and video connectivity to employee, customers, and suppliers.
Data management services that store and manage corporate data and provide acapabilities for analyzing the data.
Applications software service that provide enterprise wide capabilities such as enterprise resource planning, customer relationsip management, supply chain management and knowledge management systems that are shared by all business units.
Physical facilities managament services that develop and manage the physical installations required for computing, telecommunications, and data management services.
IT management services that plan and develop the infrastructure, coordinate with the business units for IT services, manage accounting for IT expenditures, and provide project management services.
IT education services that provide training in system use to employees and offer managers training in how to plan and manage IT investments.
IT research and development services that provide the firm with research on potential future IT projects and investments that could help the firm differentiate itself in the marketplace.

2) List each of the eras in IT infrastructure evolution, and describe their distinguishing characteristics.
Electronic ACCTG Machine Period (1930 to 1950)
Specialized machines that could sort computer cards

You May Also Find These Documents Helpful

  • Satisfactory Essays

    that is used to connect computers and the users. Infrastructure also includes the transmission media such as the lines through telephones television satellites as well as any sort of routers antennas and any other devices that would control the transmission paths. When it comes to managing infrastructures this refers to managing the computing facilities as well as the key elements such as the computer databases the information management systems and the application software. One of the risks in managing the IS would be the globalization issues. Globalization does have its positive side such as opportunities for companies to grow however with that there is also the chance of complex array of operating risks. Without the right infrastructure to conquer these sorts of risks it can lead to company shutdown and no company wants that to happen. Here are a few ways to prevent that from happening.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    expansion. The following are the key aspects of the IT infrastructure that must be put in place to…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    Read the following case description of an IT crisis and answer the questions posed at the end of the description.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cis 850 Study Guid

    • 499 Words
    • 2 Pages

    * Describe the three types of IT assets that must be well managed in today's digital age.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The case of Fare v. Michael concentrates on what the Miranda case law did for an adults 5th Amendment rights, but now deals with a juvenile and an added element (Elrod & Ryder, 2014). The defendant in this case was 16 years old and had been charged with murder (Elrod & Ryder, 2014). The juvenile defendant did not ask for an attorney, but did ask for his probation officer as he was currently on probation (Elrod & Ryder, 2014). The police denied his request to have his probation officer contacted and brought in. They then proceeded with the custodial interrogation after the defendant agreed to waive his rights.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 9 Final Paper

    • 1645 Words
    • 7 Pages

    Management information system (MIS) provides information which is needed to manage organizations efficiently and effectively and the interface between information technology and people ( 4).…

    • 1645 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Brochure Bus-210

    • 465 Words
    • 2 Pages

    This computer connects to an individual’s PCs in the network. Some companies had limited IT budgets and used them as a substitute for a mainframe. The PCs linked to a central server known as a “LAN”.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT 205 week 2

    • 482 Words
    • 2 Pages

    The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources.…

    • 482 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Dkjflkguopibj'; Vf

    • 5927 Words
    • 24 Pages

    Information Management Systems: Managing the Digital Firm, 11e (Laudon/Laudon) Chapter 5 IT Infrastructure and Emerging Technologies 1) IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise. Answer: FALSE Diff: 1 Page Ref: 163 AACSB: Use of information technology CASE: Content Objective: 5.1 2) Client/server computing is a widely used form of centralized processing. Answer: FALSE Diff: 2 Page Ref: 166 AACSB: Use of information technology CASE: Content Objective: 5.1 3) In two-tiered client/server architecture, the processing is split between two types of servers. Answer: FALSE Diff: 3 Page Ref: 166-167 AACSB: Use of information technology CASE: Content Objective: 5.1 4) N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user. Answer: TRUE Diff: 3 Page Ref: 167 AACSB: Use of information technology CASE: Content Objective: 5.1 5) Application server software is responsible for locating and managing stored Web pages. Answer: FALSE Diff: 2 Page Ref: 167 AACSB: Use of information technology CASE: Content Objective: 5.1 1 Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall 6) An application server may reside on the same computer as a Web server or on its own dedicated computer. Answer: TRUE Diff: 2 Page Ref: 167 AACSB: Use of information technology CASE: Content Objective: 5.1 7) Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business. Answer: TRUE Diff: 2 Page Ref: 167-168 AACSB: Use of information technology CASE: Content Objective: 5.2 8) The mainframe market has grown steadily over the past decade. Answer: TRUE Diff: 2 Page Ref: 176 AACSB: Use of information technology CASE: Content Objective: 5.2 9) The…

    • 5927 Words
    • 24 Pages
    Satisfactory Essays
  • Good Essays

    Romeo and Juliet are that couple always standing in the middle of the hallway, locked in a tight embrace, mesmerized by each other and blind to the rest of the world. They’re so passionate and hopelessly attracted to each other that their minds can’t comprehend the hordes of people scrambling around them rushing off to class. Crowds push and shove them into corners and lockers, but the couple’s eyes’ are still locked on each other. This causes a massive collision right in the middle of the busiest hallway in school. Teenagers sprawled on the ground slowly rise up, giving the couple irritated glares, brush off their pants and hurry down the hall. Romeo and Juliet’s unrelenting adoration for each other causes tragic and terrible consequences, due to their rash decisions and ignorance to the world around them. In Romeo and Juliet, Shakespeare demonstrates to the reader how love leads to irrational decisions because of its blinding nature. The author does this by using light vs dark imagery, as light is hate and darkness is love. Light blinds Romeo and Juliet from making reasonable decisions, but darkness further increases their love for one another. Through the use of the themes of light vs dark, Shakespeare is able to transform hate into love, which occurs due to the pressures of family and romantic love.…

    • 1795 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Richter’s CIO is facing two major decisions – is the current IT structure appropriate to meet the growing demands of the overall organization and to what extent should IT at affiliates be centrally controlled.…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Bis Tutorail Answer

    • 7855 Words
    • 32 Pages

    The academic objectives of this worksheet are to: 1. To discuss the core ICT infrastructure and software structure in a modern business. 2. To discuss various issues in the management of ICT infrastructure. 3. To investigate the offerings of IT research and advisory companies like Gartner 4. To investigate an IT Department (in an educational institution or elsewhere). 5. To compare Voice over Internet Protocol rates with traditional telephone providers.…

    • 7855 Words
    • 32 Pages
    Powerful Essays
  • Better Essays

    Outsourcing Risk

    • 1859 Words
    • 8 Pages

    ▪ Enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking…

    • 1859 Words
    • 8 Pages
    Better Essays
  • Better Essays

    HP ERSPECTIVES Am I Doing Architecture or Design Work? Roberto Rivera R ecently, as part of my work as the worldwide architect profession lead at HewlettPackard, I was (once again) engaged in an exchange dealing with the differences between architecture and design work for information systems. Architects obviously do architecture work, while technical consultants and engineers handle the detailed design required to accomplish project goals. This seems a reasonably simple definition, but the devil lies in Let’s figure out whether you’re more of an architect or a technical consultant or engineer. the details—especially in smaller institutions where people might perform a mixture of architecture and design work.…

    • 1855 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    • Define complementary assets and explain how they ensure that information systems provide genuine value to an organization. • Describe the different academic disciplines used to study information systems and explain how each contributes to our understanding of them. • Explain what is meant by a sociotechnical systems perspective.…

    • 27141 Words
    • 109 Pages
    Satisfactory Essays