• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Modification in Activities

Extracts from this document...


TASK 3C (M2) MODIFICATIONS IN ACTIVITES Business and organisations from time to time will change they activities to improve their company/business. The reasons that an organisation will modify their activities in response to the IT development are:- SYSTEM They will upgrade they system so that they can perform task faster as using old system will slow down they progress. If they use old system new software and devices might not be compatible with they old system. By upgrading there system it will also make them get a bigger profit as they will be able to do more task in one go and faster than before when using old systems. ...read more.


An example of the above would be when using a debit or credit card you will need to a password in order for the purchase to be completed without it the purchase can't be completed. This will make it safe and make customers feel safe when shopping at that company or business. It will also prevent them from getting viruses which can destroy they server if one gets in this will make them lose money and probably customers. CUSTOMER SATISFACTION Another reason they will upgrade they system is to make customers happy by providing them a faster service such being able to order online from they web site instead of getting customers to ring up and give them a big phone bill. ...read more.


Also to save them time when doing task as by using old systems will make them to the task slowly but by upgrading they can do more tasks at once and save a lot of time. All of the above are reasons why a company or business will upgrade they systems. The only down side is if the company does not have the right amount of money and they spend it on upgrading their system they will lose money and might end up closing them self's down as a lot of planning is needed before putting an upgrade in place. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Designing a booking system for an Estate Agent.

    So you do not have a booking system? Not a proper system. We just use paper base as I mention we use a diary. However, a new booking system will be much efficient and useful as this would be more organised and can store information for future reference. 10.

  2. ICT Security Report

    This is generally done by scanning listening ports. * Account Compromise - This is when the hacker discovers user's accounts and their passwords. It then allows an unauthorized user to gain access to all resources for which that user account is authorized.

  1. software development

    Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of computer architecture. C++: This is a general-purpose programming language. C++ is regarded as a middle-level language, as it comprises a combination of both high-level and low-level language features.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    A CRM package, in other words, will pay for itself in its first year if it's only 5 percent effective." CHAPTER III PROCESS Goldenberg (2002) acknowledges that, the process component of CRM is very delicate and improper automation of the CRM business process will harm the CRM initiative.

  1. Software Development Processes - What is Software Engineering?

    It shows how the input to the process such as how a specification is transformed to an output, such as a design. These transformations may be carried out by people or by computers. * Role/ action models: This shows the various roles of the people involved in the software processes and the activities for which they are responsible.

  2. What the term Enterprise Resource Planning means and to whom.

    SAP also offer modules for logistics and human resources. Recently, SAP has expanded its product line by including supply chain management, sales-force automation and data warehousing software. PeopleSoft is the number two ERP vendor. PeopleSoft made its mark with human resource software. The company currently targets the service sector with products designed to help companies handle their intangible costs.

  1. The company that I have been studying in this Task is ECsoft (European Community ...

    In ECsoft Pink Roccade do the systems administration. They are under a contract. There is one ECsoft systems administrator who manages Pink Roccade. The company's turnover in the UK alone in 2001 was $111 million R.1.2 The structure of the organisation ECsoft is part of a chain across Europe.

  2. Implementation of an IT system.

    means such as for example going to Sheet 2 by clicking at the bottom of the page; this could create human error as my end user could click on Sheet 3 by accident, so the macro is more user friendly, its also a way of speeding up processes which have

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work