• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Modification in Activities

Extracts from this document...


TASK 3C (M2) MODIFICATIONS IN ACTIVITES Business and organisations from time to time will change they activities to improve their company/business. The reasons that an organisation will modify their activities in response to the IT development are:- SYSTEM They will upgrade they system so that they can perform task faster as using old system will slow down they progress. If they use old system new software and devices might not be compatible with they old system. By upgrading there system it will also make them get a bigger profit as they will be able to do more task in one go and faster than before when using old systems. ...read more.


An example of the above would be when using a debit or credit card you will need to a password in order for the purchase to be completed without it the purchase can't be completed. This will make it safe and make customers feel safe when shopping at that company or business. It will also prevent them from getting viruses which can destroy they server if one gets in this will make them lose money and probably customers. CUSTOMER SATISFACTION Another reason they will upgrade they system is to make customers happy by providing them a faster service such being able to order online from they web site instead of getting customers to ring up and give them a big phone bill. ...read more.


Also to save them time when doing task as by using old systems will make them to the task slowly but by upgrading they can do more tasks at once and save a lot of time. All of the above are reasons why a company or business will upgrade they systems. The only down side is if the company does not have the right amount of money and they spend it on upgrading their system they will lose money and might end up closing them self's down as a lot of planning is needed before putting an upgrade in place. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Designing a booking system for an Estate Agent.

    So what kind of interaction do you have when using computers? Well, aside from doing our usual tasks whilst on the job to communicate with other employees, branches and the head office we often use email to send reports, presentations and other documents.

  2. ICT Security Report

    Phishing Phishing is viewed as a form of social engineering. It is characterised by a persons attempt to fraudulently acquire sensitive information. This can include passwords and credit card details, and is done by a malicious person masking themselves as a trustworthy person or business that is seemed to be an official electronic communication.

  1. software development

    The most famous is git, used by the linux kernel. * Bug trackers and task lists: Most large-scale projects require a bug tracker to keep track of the status of various issues in the development of the project.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    Even Goldenberg (2002) agrees same thing by pointing out viral complainers as "the rotten apple spoiling the lot" (p.13). Therefore, keeping the customers happy is the whole goal of CRM system. Following is an example of a company that has been greatly impacted by the people component in their CRM initiative (Goldenberg, 2002).

  1. Software Development Processes - What is Software Engineering?

    models: Showing the sequence of activities in the process together with their inputs, outputs and dependencies. The activities in this model represent human actions. * Dataflow/ activity models: Showing the process as a set of activities, which bring about some data transformation.

  2. What the term Enterprise Resource Planning means and to whom.

    SAP also offer modules for logistics and human resources. Recently, SAP has expanded its product line by including supply chain management, sales-force automation and data warehousing software. PeopleSoft is the number two ERP vendor. PeopleSoft made its mark with human resource software. The company currently targets the service sector with products designed to help companies handle their intangible costs.

  1. The company that I have been studying in this Task is ECsoft (European Community ...

    In ECsoft Pink Roccade do the systems administration. They are under a contract. There is one ECsoft systems administrator who manages Pink Roccade. The company's turnover in the UK alone in 2001 was $111 million R.1.2 The structure of the organisation ECsoft is part of a chain across Europe.

  2. Implementation of an IT system.

    to be carried out in Excel, such as going to the next page or calculating a certain amount of sums. The way that I created the macro is this: from the Tools menu, I selected Macro, then Record New Macro, like so: After that a dialogue box was displayed, and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work