STRAYER CIS109 all WEEK discusions [ week 1 to week 11 ]

Question # 00051755 Posted By: steve_jobs Updated on: 03/02/2015 04:31 PM Due on: 03/12/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image
WEEK 1


Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"An Overview of Information Systems and a Computer System "

  • Read the article titled “Top 10 Reasons Why Systems Projects Fail”, located at in the online course shell. You may also view the article at http://dulcian.com/articles/dorsey_top10reasonssystemsprojectsfail.pdf. Next, compare and contrast the key differences between information systems and information technologies. Discuss one to two (1-2) ways in which a company uses management information systems in order to increase organizational efficiency and productivity.
  • Explain the overall manner in which the four (4) building blocks (i.e., input devices, CPU, main memory, and output devices) of a computer system work together to perform the three (3) basic tasks of computer operation (i.e., arithmetic operations, logical operations, and storage and retrieval operations). Include one (1) example of such collaboration to support your response.








WEEK 2



Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Personal, Legal, Ethical, and Organizations Issues of Information Systems "

  • Describe at least two (2) methods that business owners could use in order to protect the privacy of both personal information and organizational data resources related to the Web and information technologies. Provide one (1) example of the use of each method to support your response.
  • Use the Internet or the Strayer Library to research articles on Online Analytic Processing (OLAP) and Online Analytic Processing (OLTP). Next, compare and contrast the key similarities and differences between Online Analytical Processing (OLAP) and Online Transaction Processing (OLTP). Speculate on the primary manner in which a grocery chain could use OLAP to gain a competitive advantage. Provide a rationale to support your response.










WEEK 3


Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Computer and Network Security"

  • Identify two to three (2-3) information technology tools that affect privacy. Next, discuss the main way in which one would use the tools that you have identified to commit computer crimes. Provide a rationale to support your response.
  • Assume that you have been asked to develop a security policy for your local bank. Suggest your top three (3) recommendations to the bank in order to improve the security and privacy of online banking. Provide a rationale to support your response.








WEEK 4




Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Data Communication and Web 2.0"

  • Describe the key components of a data communication system. Next, discuss the overall manner in which a company uses data communication in order to reduce its operations cost. Include one (1) example of such a reduction in operation costs to support your response.
  • Use the Internet or the Strayer Library to research articles on Web 2.0 technologies and their applications for business. Next, identify two to three (2-3) ways in which a business could apply Web 2.0 technologies in order to improve its business operations. Provide one (1) example of such application to support your response.



WEEK 5


Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"e-Commerce and Security Measures"

  • Describe the fundamental advantages and disadvantages of e-Commerce, as compared to traditional commerce. Next, identify what you believe to be the most widely used business model of e-Commerce, and give your opinions as to why the model you have identified is most widely used. Justify your response.
  • It is common knowledge that Cyber Monday is a most commonly known event in the e-Commerce world. Explain the main reasons, related to security, why Cyber Monday may not be as important as it once was. Provide a rationale for your response.










WEEK 6




Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Globalization"

  • Use the Internet or the Strayer Library to research articles on organizations that successfully go global and adopt global information systems. Next, select one (1) organization that successfully went global and adopted global information systems. Then, explain the overall manner in which the organization in question has benefited from its globalization. Include at least two (2) examples of such benefits to support your response.
  • Describe the four (4) organizational structures, as discussed in Chapter 9 of the textbook, which determine the architect of a global information system. Next, identify one (1) obstacle to the design and implementation of a global information system, and explain one (1) way in which an organization can overcome the obstacle in question.







WEEK 7



Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Information System and Enterprise Systems"

  • Identify the key factors that companies should consider when deciding whether to buy or to build their own information systems. Explain your rationale.
  • Select one (1) type of the four (4) enterprise systems (i.e., supply chain management, customer relationship management, knowledge management systems, and enterprise resource planning), and speculate on the main issues that companies may encounter when implementing the type of enterprise system that you have selected. Next, suggest two or three (2 or 3) general techniques that companies could use in order to mitigate the issues in question.











WEEK 8


Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Management Support Systems"

  • Review the main management support systems discussed in Chapter 12 of the textbook. Next, select one (1) such system, and describe its key components, capabilities, and the overall manner in which an organization could benefit from it. Include one (1) example of such application and related benefit(s) to support your response.
  • Recommend two (2) strategies for designing a successful management support system for an organization. Provide a rationale to support your response.





WEEK 9



Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Expert Systems and Intelligent Agents"

  • Use the Internet or the Strayer Library to research articles on expert systems and companies which use them. Next, select two (2) companies that currently use expert systems. Then, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your response.
  • Select one (1) of the four (4) categories of intelligent agents, as discussed in Chapter 13 of the textbook, that is currently available. Identify the main risks of using intelligent agents in the category that you have selected. Next, speculate on one (1) way which you would use in order to mitigate the risks in question. Justify your response.











WEEK 10



lick the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"SaaS and Cloud Computing"

  • Discuss the fundamental advantages and disadvantages of using software as a service (SaaS) within organizations. Next, give your opinion as to why SaaS has become a common delivery model for many business applications.
  • According to the textbook, most experts believe that security is a concern when using a cloud computing platform, and users play an important role in its success. Imagine that you have been asked to provide suggestions for an organization that is planning to acquire a cloud computing provider. Select one (1) out of Gartner's seven (7)cloud-computing security risks, as discussed in Chapter 14 of the textbook, and suggest one (1) way in which you would negative the chosen risk for the organization for which you are working. Justify your response.








WEEK 11


Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information.

"Course Conclusion"

  • You have just completed ten (10) weeks of an introduction to management information systems course. Imagine you have been asked to create a one (1) day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.
    • Create a hierarchy of no more or no less than five (5) of the most important topics that you believe that a one-day course titled “Management Information Systems: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics.

Dot Image
Tutorials for this Question
  1. Tutorial # 00163324 Posted By: spqr Posted on: 01/09/2016 02:09 PM
    Puchased By: 3
    Tutorial Preview
    The solution of STRAYER CIS109 all WEEK discusions [ week 1 to week 11 ]...
    Attachments
    CIS_109_Discussions_and_Resp.docx (160.29 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Vin...zUMk Rating Quite presentable tutorials 10/08/2019

Great! We have found the solution of this question!

Whatsapp Lisa