• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Accounting Info Sys Design & Strategy

Extracts from this document...


Acc Info Sys Design & Strategy Contents Page BACKGROUND 3 INTRODUCTION 3 REQUIREMENTS 4 POSSIBLE SOLUTIONS 6 CONCLUSION AND RECOMMENDATION 7 APPENDIX 1: INTERNET SEARCH PROCESS 8 APPENDIX 2: DECISION TABLE 9 APPENDIX 3: NETWORK FLOWCHART 9 BIBLIOGRAPHY 10 Background As an ICT consultant, I have been contracted by Greenwich Construction Ltd, a general Builder operating from the out skirts of Greenwich for the past 50 years. The Greenwich Construction ltd is bidding for a number of Olympic Building Contracts. The Directors' believe that they do not have technical computer infrastructure or the knowledge to set up one. This is where I must aid them in coming up with requirements, and a solution to meet those requirements. Introduction In this report, I will explore how Greenwich Construction Ltd will be able to overcome these business difficulties and how to search the internet. In this fast-changing technological world, sometimes you are faced with some difficult choices. These choices that you make improve operational efficiency of the company. These choices could for example a choice of equipments. On today's market are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. Such uses are, access to the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more, which can be provided by PDAs and the ever-growing category of smart phones. These Mobile devices are often seen as an extension to our own computer. ...read more.


Firewall and encryption software must be install to prevent unauthorized users from accessing the network and also coding and scrambling of message to prevent unauthorized access to or understanding of the data being transmitted and an Internet Service Provider (ISP) for their emails, phone calls and their portable devices Wireless networking is easy to set up, and it's convenient, especially if you are on the move without your portable computer while staying connected. But because they use the airwaves, wireless communications are more vulnerable to interception and attack than a wired connection. Encryption is the number one security measure, but many wireless access points (WAPs) don't have encryption enabled by default. Although most WAPs support the Wired Equivalent Privacy (WEP) protocol, it's not enabled by default. WEP has a number of security flaws, and a knowledgeable hacker can crack it, but it's better than no encryption at all. Be sure to set the WEP authentication method for "shared key" rather than "open system". The latter does not encrypt the data; it only authenticates the client. Change the WEP key frequently and use 128-bit WEP rather than 40-bit. Greenwich Construction can also isolate their wireless network from the rest of the LAN. To protect their wired internal network from threats coming over the wireless network, they must create a wireless DMZ or perimeter network that's isolated from the LAN. That means placing a firewall between the wireless network and the LAN. Then they can require that in order for any wireless client to access resources on the internal network, he or she will have to authenticate with a remote access server and/or use a VPN. ...read more.


A user can use a stylus and operate the computer without having to have a keyboard or mouse. The benefit of a Tablet PC is its PC's compact, convertible design allows users to comfortably use your computer in small spaces-even while standing up. Tablet PCs also include wireless Internet support and a long battery life. Due to its convertible design, you can sit across the table from someone and take notes without having your PC act as a dividing wall. It's perfect for sales meetings, or any meeting in which you don't want technology to interfere with the personal dynamic. Appendix 2 shows a complete decision table for all the mobile devices Conclusion and Recommendation I recommend PDA because Greenwich Construction Ltd is most likely to meet the requirements for the Olympic bid. As shown from the decision table in appendix 2, it has the highest weighting. PDA is ideal for business meetings - multimedia sales presentation can be taken with you anywhere. It can provide Greenwich Construction sales or marketing staff with PDA's pre-loaded with professional multimedia presentations. APPENDIX 1: INTERNET SEARCH PROCESS Features Laptop PDA Blackberries Tablet PC Weightings (%) Bluetooth Yes Yes Yes Yes 5 Allows data to be shared between mobile devices e.g. Synchronising Paging No Yes Yes No 5 WiFi Yes Yes Yes Yes 5 Allows connection to internet via wireless access points QuandBand No Yes Yes No 10 QuadBand literally means four (4).It's to designate a phone that can operate in 4 bands GPRS No Yes Yes No 15 General Packet Radio Technology allows flexible data transmission rates (e.g. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. kanthal - accounting

    Over a period of several months of interviews and investigation, the team was able to divide Kanthal's costs into order and volume costs. Further analysis revealed four major cost drivers associated with order placement and completion: 1. Manufacturing order costs - includes the cost of setup and other activities when ordered products are not in stock.

  2. Spreadsheet project

    A lot of data is not going to be repeatedly typed and there isn't going to any training needed to use this method. This method is easy, cheap and practical and as my company does not need to enter much information onto their system they will not need to use

  1. Evaluate the uses and benefits of computers in accounting

    In our increasingly complex society computers are being used in business more and more. They can be used to process information on which to base decisions as well as a storage system making information readily available. It is reasonable to say that, without the power of computer systems, today's modern business world could not function.

  2. The use of ICT in accounting

    communicate the importance of the business in annual meetings (graphs can be plotted to show significance in specific fields and can be laid out professionally by businesses) also accounting firms such as PWC can also be in par with JAVED & CO because the same software is being used, therefore it's a level plane field for competing firms.

  1. Business Organisations - set questions and answers.

    This would be done by an architect, who has been hired to do the inside and outside of the house so that it looks attractive for the new owners. They are being told what to do by the customers wanting to buy the house, so that the house is done a specific way.

  2. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    * How to obtain the Socio-economic command of the developments of science and technology (Sundaram1987) * How to master the change to the best advantage for development strategies. When this is done would avoid mismatch between the tasks, which can be performed by GIS and the reality of the current application situation.

  1. The report lists out the benefits of keeping a proper accounting records and followed ...

    2.1.1 Reasons for improving daily record keeping (a) Business failure: The success or failure of a business usually depends on the result of a few important business decisions. More often, those who failed, were not because of the insufficient efforts put by them, but rather, had made improper or poor business decisions based on inaccurate and outdate information.

  2. The relationship between information system functions and corporate strategy.

    The plan must also be specific enough to enable understanding of each application and to know where it stands in the order of development. The term 'Strategic Information Systems Planning' (SISP) was born. SISP is defined as 'The means of identifying application systems which support and enhance organisational strategy and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work