• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

University Degree: Information Systems

Browse by
Word count:
fewer than 1000 (9)
1000-1999 (19)
2000-2999 (27)
3000+ (42)
Submitted within:
last month (1)
last 3 months (1)
last 6 months (1)
last 12 months (1)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 2
  3. 3
  4. 4
  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

    Bibliography 32 8.1 Books 32 8.2 Websites 32 8.3 Software 32 1. Traditional Systems Life Cycle 1.1 Introduction A Systems Life Cycle describes the process in which a Business Information System is fully developed. It attempts to create a structured framework in order to establish more control of this process. The traditional approach is a waterfall method meaning a sequence of stages in which the output of each stage becomes the input for the next. A traditional systems life cycle has a number of different stages.

    • Word count: 6224
  2. Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instruc

    Although the obsolete computer does not perform well, if at all, the data on hard disk often is intact. For this reason, companies and government agencies take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instructor which method or program is the best for destroying data so that nobody can recover it.

    • Word count: 2748
  3. The survivability and continuity characteristics of the IT infrastructure for the Illinois Emergency Management Agency (IEMA) are the subjects of this case study.

    This access to information is critical to a successful, accurate assessment, and cannot be over-valued. Current Issues 1) The merging of two agencies, and IT infrastructures, into one agency and IT infrastructure. On July 1, 2003, the former Illinois Department of Nuclear Safety became a division within the Illinois Emergency Management Agency. 2) The construction of a new, state of the art, State Emergency Operations Center (SEOC) in Springfield, Illinois. Listed as "key budget Initiative" in SFY05 budget document. 3) The need to upgrade IEMA's Remote Monitoring System, which electronically monitors nuclear facility critical safety functions.

    • Word count: 2876
  4. The case study I have chosen is Northwestern Business College. Northwestern Business College is a small private 2-year college with three campuses in Chicago, Bridgeview, and Naperville. The goal of this study is to identify software and hardware that wil

    Also, the company is vulnerable to viruses/worms/trojan horses, unauthorized sniffing of network traffic, and denial of service attacks. The goal of this study is to identify software and hardware that will reduce single points of failure, reduce network threats, and improve the availability of critical information systems. 2 Methodology To analyze the problems identified I used the following steps: * Diagram the environment. * Identify single points of failure and services/application affected by them. * Define critical functions/services. * Identify threats The following assumptions are made by this case study: * The estimated annual cost of downtime is $16,826,600.66 (1,919.57/hour).

    • Word count: 1942
  5. The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines. A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing. T

    This network is using a combination of high speed (1 Gbps) fiber optic link and low speed (32 Kbps) Frame Relay rented from Cable and Wireless, the lone telecommunication company in the country. Smartstream is the main application being used by the treasury. Smartstream is a client/server system that enables companies to effectively manage financial and operational information and dynamically upgrade business processes across the entire enterprise. Smartstream application comprise of a complete set of solutions for managing your company's back office, including general ledger, budget administration, receivables and payables, billing, asset management, procurement, and human resources.

    • Word count: 2137
  6. Website Design. This is a Texans Credit Union online website. It has recently been upgraded and allows the user to perform banking related functionality. Our area of focus for this project is the self service section of the website.

    Wire transferring funds to another bank account at another institution. Problems/Ideas: 1. Once a user is logged in additional activities shouldn't require resubmitting known information. For example when purchasing a CD the Texans Online System asks the user to submit the member name, member number, drivers license number etc... 2. Tax information should be displayable online and not just mailed to home address. 3. When ordering a Certificate of Deposit display the current rates offered to the customer. 4.

    • Word count: 3630
  7. The purpose of this paper is to provide an analysis of Cisco Systems primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry.

    The paper concludes with a final analysis of the success of Cisco Systems, including strategies and information technology that gave Cisco a competitive advantage. Cisco's current position in the industry for continued future success will also be addressed. SECTION I: THE NETWORK EQUIPMENT INDUSTRY A. Industry Profile The network equipment industry, although still in its infancy, is a booming industry made possible by the Internet revolution. Broad acceptance of the Internet has created new models for business, new means to motivate, organize and inform the public, and new thinking about how humans communicate.

    • Word count: 15746
  8. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants to assess their current IT infrastructure, provide a comprehensive upgrade and implementation strategy for the network software and hardware design and install

    and London. This project must have all required amenities of a modern, efficient computer network, be successfully completed on time and within budget. Androsia Superior Fabrics initial network setup was not truly arranged as a computer network. In fact, the computers used within the company's business could be described as a "Sneaker Network" and were implemented as follows: Carmichael Road Branch (Head Office) * Currently a true computer network is not implemented. * 4 separate computers running Windows98 SEare used for various business transactions.

    • Word count: 5836
  9. This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study.

    In addition access security can be customized to meet NAFRAC requirements, which helps to protect sensitive data from loss, destruction, theft, or unauthorized disclosure. Above all, most client-server environments have discretionary access control which allows a system administrator to grant or deny access to a file (resource).This will further increase system security. Most network operating systems (NOS) provide a number of fault tolerance features, such as disk mirroring, disk duplexing, and disk stripping. These features serve to improve reliability and minimize network down time.

    • Word count: 11449
  10. Happy Holidays Hotel. Information Systems Analysis and Design. When we design the new system, it will be providing the owners to receive and store reservations from customers through the internet, or by other booking methods and then record into the syst

    Another problem which is availability of rooms and facilities, the manual record keeping has become inadequate. The new system only provide for some staffs to access, and there is only one receptionist is good at computer, but other staffs are no interest in computers, so we need to train some of staffs to using the computer to run the new system. Actually the business has some opportunities faced to them which are they have different styles of room can let customers to choose and also they have their own pool and the private beach which can run some special events.

    • Word count: 2632
  11. CW2 Quality Function Deployment CW2

    (Source; System requirements analysis By Jeffrey O. Grady) The process of Requirements Analysis is important to a software project because if there is not enough attention given to this process, the system may not deliver on what it was expected to do. It would also be a waste of money and resources to spend money on a system that does not meet the requirements of an organisation. The initial steps of the Requirements Analysis are to define a high level view of how the proposed system meets the business functionality requirements.

    • Word count: 1443
  12. The intention of this study is to analyze and explore the emerging field of grid technology. It delves into how the grid is being used to enhance the capabilities of existing distributed systems and data resources.

    the Grid 59 Figure 5.14: Separate Interaction with Databases on the Grid 61 Figure 5.15: Flowchart for Query Processing on the Grid 62 Figure 6.16: Proposed Structure for the University of Karachi Grid 68 Figure 6.17: Issuing Certificate to Grid User 69 LIST OF TABLES Table 2.1: US-CMS Grid Resources [TGB2004] 14 Table 5.2: Example Accounting Policy 66 Chapter 1 FUNDAMENTALS OF GRID COMPUTING The notion of linking people, computers, sensors and data with networks is decades old. However, the grid concept has gradually evolved and now, for the first time there is a coherent description of the hardware, software and applications required to create a functioning and persistent grid.

    • Word count: 21063
  13. Types of IT Security Threats

    Defending against this attack was not possible through the usual means of eMail virus protection, as users simply had to receive the eMail for the attack to come into effect. SYN attacks take advantage of the TCP three-way handshake. Attackers deploy a DoS using a SYN attack by, firstly, sending multiple SYN packets to the target. As any system would treat these incoming SYN packets, the target machine will send a SYN-ACK back to the attacker. However, the attacker will not respond to this phase of the handshake, often because the IP is spoofed, so the target will attempt to resend the SYN-ACK a number of times.

    • Word count: 3391
  14. Usability Evaluation Methods

    Furthermore, the advantages and disadvantages for one evaluation method from each of the approaches is selected elaborated upon. The second task involves performing a heuristic usability evaluation on an interactive website using Jakob Nielsen's heuristics. The process identifies usability problems on the website based on the heuristics that are not conformed to. An analysis of the results is then provided and a conclusion is drawn about the overall usability of the website with regards to the perceived severity of the problem identified. Part I: Analytical and Empirical Methods for Usability Evaluation Usability Concept Usability can be defined as the degree of satisfaction, efficiency and effectiveness to attain specified goals by designated users for having used a product in a particular context (ISO, in (Te'eni et al., 2007).

    • Word count: 6250
  15. Visual Basic

    Visual Basic (VB) is the event-driven third-generation programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Due to its BASIC heritage and graphical development features, VB is also considered a comparatively easy to use and learn programming language. Visual Basic enables the rapid application development (RAD) of graphical user interface (GUI) applications and was derived from BASIC. It provides the facility to access databases using Remote Data Objects, ActiveX Data Objects or Data Access Objects, and formation of ActiveX controls and objects.

    • Word count: 2651
  16. RFID and GPS in Business

    With technology that is up-to-date days by days, there are many high technologic products that become important for organization. High technology helps organization perform the jobs so much better due to its advantages. That is why businesses now depends much on technology and sees it as a vital role. Two most popular products of high technology that can show how it impacts on organization in business are Radio Frequency Identification (RFID) and Global Positioning System (GPS). RFID is the system that was developed by the demand of making the process of marking and recognizing objects more easily in 1980s of manufacturing environment, especially objects of inventory.

    • Word count: 2986
  17. Defining the scope of the Information Security Management System (ISMS) in a company

    The expressions came from ISO 27001. "The principle behind ISMS is that an organisation should design, implement and maintain a clear set of policies, processes and systems to manage risks to its information assets, therefore ensuring acceptable levels of information security risk." ISMS should be competent in the future and should adapt to changes whether they are internal or external and therefore should integrate the Plan-Do-Check-Act cycle method which will keep it up to date. PLAN Establish ISMS policy, objectives, processes in the organisation to manage risks and improve security.

    • Word count: 1601
  18. The role of IT Security in a corporation

    As well as that the role of IT security Management in a corporate compliance is to make sure that a corporations rules, regulations, specifications, polices, laws and standards are met these can also be met through the corporations objectives. Failure to meet these compliances can mean severe consequence for example the UK government lost 25 million child benefit records from 2 cd's that were sent unrecorded using the courier TNT.

    • Word count: 518
  19. Creating a shopping website with Project management

    Many Software tools were used to help build and run the website. PHP my admin was used to store all of the data. Mi-Linux was used to host the website and Ps Pad was used to build the website in PHP. Planning stages included creating backlogs which were regularly updated. After each sprint the group held review sessions to investigate the project progression. The backlogs were then updated. Individual activity sheets were completed by each group member weekly to enhance personal skills. Each member also completed diaries weekly showing their commitment to the project and their next week's targets.

    • Word count: 6895
  20. Computer Networks Architectures & Protocols

    One of the greatest of all of the benefits of using a hierarchal or layered approach to networking and communications protocols is the greater compatibility between devices, systems and networks that this delivers. The portability is a benefit to the layered networking protocol because it is much easier to port from one system or architecture to another, which reduces time wasting. Disadvantages of layered protocol The main disadvantages of a layered protocol consists primarily of overhead both in computation and in message headers caused by the abstraction barriers between the layers, this is because a message often has to be

    • Word count: 3245
  21. Hardware and Software Support

    The core software tools used by everyone in the agency include the Microsoft Word processing software; Microsoft Excel spreadsheet software; PowerPoint presentation graphics software; occasionally Access database software; and Outlook, an independent personal information manager. Outlook is used mainly as an e-mail application and for scheduling meetings, and contact management, and meeting scheduling requests and receipts of acceptance are a primary function that the entire agency uses. Associates' company e-mail accounts are accessed via Outlook, but it also includes a calendar, task manager, and note taking that is useful to keep track of individual schedules and meetings.

    • Word count: 935
  22. Information Systems and Business Processes

    An information system is used to store information that a company needs to run its daily processes, and saves time through the use of technology, making any organization more efficient and productive. By using a combination of resources, both human and technical, it produces data and information required to support organizational procedures and help users make intelligent decisions based on that information. Not only does an information system store and display information for its user, but also helps to generate as well as send and receive data.

    • Word count: 1134
  23. BIM and Facility Management

    The facility manager generally has the most influence upon the quality of life within a facility. The facility department has in practice sub departments (the blue squares). To ensure that everything is working properly and that everybody is happy with his or her working environment the facility department has set up a front- and back office system. That works as an assistant for the Facility Manager. When an employee (in this case a costumer of the facility management department) got a Wish, Need for information, Complain or an Interruption (WICI) they can contact he front office by phone or e-mail.

    • Word count: 3236
  24. Building Information Management. In this paper we asked the question how Facility Managers can use BIM to help them develop into the future. To give an answer to this question we first analysis the usability of BIM for Facility Managers.

    The main topics of this paper are Facility Management (FM) and Building Information Modeling (BIM). 1.1.1 BIM BIM is a tool for architects that was developed from 2D and 3D CAD applications in the 1990s. It was the first attempt to provide drawn elements with architectural properties and make rendering possible to create images that derive directly from the drawings. The basic concept is to allow architects to use their 3D models to extract all the required information such as building view and project drawings.

    • Word count: 3742

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.