Information Systems Mba Sem 1 Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Question 1:-

Introduction of IT Infrastructure:-

Information technology is an integral part of the modern world, especially for business.
Definition of IT Infrastructure “All hardware, software, networks, facilities, etc., required to
develop, test, monitor, control, or support IT services.” Processes, documentation, and users
or IT staff not considered part. To run information technology requires a good
foundation. Just as utilities need roads and cities need sewers, information technology needs
physical components to function effectively.

There are basically three types of infrastructure components. The hardware,


software, and networks required for an organization to function. An IT infrastructure is built
around an organization's business needs. Hardware refers to computers, devices, servers,
routers, switches, etc. Similarly, software refers to operating systems, VoIP
applications, applications used in business such as MS Word or Excel. After all, no word or
spreadsheet task can be completed without a real application. Finally, here is the network
component. This component is a little different than her other two. It consists of
hardware and software components that enable an organization to establish communication
links both internally and externally or to the Internet. Contains everything needed to facilitate
operations on and between networks and other external systems. Infrastructure components
are the foundation upon which an organization performs various functions, and without
components the organization's functionality is compromised.
To plan your organization's growth, you need to set your infrastructure growth plan accordingly.

Now Mr. Farokh wants to update his company's IT infrastructure and align it with the corporate
strategy. To do this, he needs to ask you some questions about your business needs, below
are his IT infrastructure questions related to business requirements.

What business requirements must the infrastructure components meet?


This question has to be answered by identifing complete the set of needs for which support is
needed. In future which components are require to meet to fulfill business needs.

How can technology help an organization compete?


Contribute to or deal with. Please answer this question if the application or service is
necessary for your organization.

Is the skill suitable for the job?


This question highlights the issue of enabling alternative technologies to meet organizational
needs. To succeed in the task, we need to consider the best technology. Because the
right technology should not meet the requirements of each task.
Is the technology best in class?
This question is about the quality of the selected technologies compared to the price paid
for them.

Mr. Farokh, I have a few questions for you regarding your technology problem. Below are IT
infrastructure questions related to technology issues.

Is the technology scalable?


This question addresses the question of whether technical capabilities can be expanded to
meet the future needs of the organization
The question arises whether the potential of current technology can be used for the future
growth of the organization.

Are the technologies interoperable?


This question shows that IT infrastructure components such as hardware, software and
networks can all work together. All of these components must be able to work together with
different file formats, different data standards, and different communication standards.
Interoperable technologies are the best option for a successful IT infrastructure.

What is the technology roadmap?


This question relates to the need for organizations to ask how the company plans to develop
and scale in the future before acquiring technology, known as a technology roadmap. During
the technology roadmap, if a particular technology proves to be a good area for the future, it
should be adopted within the organization for further upgrades and modifications. And
if the technology turns out to be uncertain going forward, you probably shouldn't make an
investment decision.
This question is about the innovation cycle of technology. Updates are very important
when technology is developed. User must update. This cycle informs users that their
organization requires investment and related changes.

Do you have manufacturer support?


This is a very important question in building an IT infrastructure. Many companies rely on
vendors to support their IT infrastructure. Many organizations can purchase technology
from vendors but cannot provide support. For this support, therefore, the vendor must hire
a support team.
Team support for technology purchases is therefore very important.

What is the nature of technology lock-in?


Technology lock-in is a technique used by technology providers to lock customers into their
products and services. It is difficult for an organization to switch to a competitor
without significant expense and difficulty. As such, organizations need to be aware that there
is lock-in and how expensive it is to switch to another competing technology.
Make or buy?
This is a very important question and requires expert input from your organization's internal IT
team. An organization's IT team must decide whether to build its technology components
in-house or purchase them from a third-party vendor.

These are the questions that Mr. Farokh needs to consider, relating to his business needs
and technical issues.

Conclusion:-

IT infrastructure is the backbone of today's digital business. Empower users to run


applications that run your business. Recent advances in technology have opened up
possibilities. For many companies, IT is very expensive and hardware-centric. IT infrastructure
is critical because organizations need to design, develop, and build infrastructure to achieve
the availability, maturity, and scalability of a modern intelligent infrastructure. IT infrastructure
is a very important part of enterprise information technology. IT infrastructure is the most
difficult IT investment to justify upfront and consider the consequent impact.
However, IT infrastructure planning and management should be part of mainstream corporate
governance.

Question 2:-

Introduction:-

As CEO, he is the most senior individual employee in the organization. CEOs typically work for
an organization like any other employee, but CEOs have more responsibility and
influence within an organization than regular employees. The CEO reports directly to the
company's board of directors and is ultimately accountable. Its members are elected
by shareholders. The CEO's responsibilities may vary slightly from company to company, but
generally the CEO is responsible for the organization's ultimate success and
for the organization's failure.
CEOs can assume any role or responsibility within an organization, but some CEOs in
smaller organizations tend to be heavily involved in some corporate functions.

Objectives:-

The CEO's primary responsibilities are:- Setting and executing organizational strategy,
building leadership levels within the team, determining the organization's capital allocation,
and guiding the CEO in setting vision, values , set the corporate culture, and communicate
effectively with all stakeholders.
Type of Decision Making:-
The CEO's primary role in an organization is to make decisions using the MIS (Management
Information System). Decision making is the process of making decisions from alternative
courses of action based on facts. Once a decision is made, it implies a commitment of
resources. There are three types of decisions a CEO makes: tactical decisions, operational
decisions, and strategic decisions. Let's discuss one by one:-

1. Tactical Decisions:-
These decisions are related to the implementation of strategic decisions. When it comes
to tactical decisions, they are direct departmental plans, designing work processes, building
sales channels, and procuring resources such as people, goods, and money. These decisions
are made by the middle management level of the organization.

2. Operational Decisions:-
These decisions relate to the day-to-day operations of the organization. These operational
decisions give you a short-term view as these decisions are made repeatedly. These
decisions are based on facts during live performances during business hours. These decisions
do not require much business judgment. Operational decisions are made at
lower management levels. Information systems need to focus on the administrative
decision-making process because managers need information to make rational and
well-informed decisions.

3. Strategic Decisions:-
The set of decisions made by the top level management (CEO) of an organization are known
as strategic decisions. Strategic decisions are important decisions that affect all or most of the
company. These decisions contribute directly to the achievement of the
organization's common goals. These decisions are made with long-term
implications for the company. Strategic decision-making is generally unstructured, requiring
managers to use business judgment, evaluation, and intuition to define the problem. These
decisions are based on partial knowledge of dynamic and uncertain
environmental factors. Such decisions are made at a higher management level Strategic
decision making is inherently complex. Because strategic decisions are made at the top level,
these decisions are future-relevant and involve many risks and are therefore uncertain.
Strategic decision making is very different from tactical and operational decision
making. Strategic decisions are made in accordance with the organization's mission and
vision. These decisions are relevant to the overall contingency plan of all organizations. and
accommodate organizational growth.

Database Concepts:-
A database is a collection of files that store data. These databases associate files and data
with each other. These files and data in the database can
be from the same function, domain, organization, or different categories. The files in the
database are created according to an organization's needs, and this database is maintained
with data related to the applications that the organization runs. An example of a
database is an organization's "employees" database. This employee database is maintained
by the organization's human resources department. This employee database contains data
and files related to employee profiles, vacation histories, family details, medical benefits
details, salary details, etc., called “structures”. Data is maintained in these structures.
The basic structure of this file is called a field. A field is a defined space with
specific dimensions in which data is arranged. You can read and delete arbitrary data from
fields. When designing a field, you need to define exactly what the field will contain. All
collections of these fields are called records.

Basic Architecture:-
Databases are used and organized in many different ways. Individual users create these
databases for personal use in their organization or at home. Data in this database is
entered and updated by users and used by users. For example, a cell phone contact database
is a personal database. All data is entered and used by mobile
phone users, but database design is not created by users.

Data Warehouse:-
“Data Warehouse” Bill Inmon coined the term in 1990. This is the process for creating and
using a data warehouse. A data warehouse is created by inputting data from multiple
sources. A data warehouse helps support analytical reporting and decision-making within an
organization. Data cleansing, data integration, and data integration include data warehousing
Organizations have decision support technologies that help them take advantage of the data
available in their data warehouse. With the help of these technologies, executives
use warehouses quickly and effectively. Based on the information available in the warehouse,
managers collect data, analyze it and make decisions. Information collected in the warehouse
can be used in areas such as production strategy optimization, customer analysis, and
operational analysis. Data extraction, data cleaning, data transformation, data loading, and
updating are data warehouse tools and utilities.

Question 3 A:-

Introducing BYOD (Bring Your Own Device):-

BYOD in its full form is "Bring Your Own Device". BYOD is a policy followed by
many organizations. This policy allows employees in your organization to use
their personal devices for work-related activities. This activity allows employees to access
emails related to the organization. You can connect directly to your corporate network.
It also accesses enterprise applications and data. Smartphones are the most common device
employees use at work. But employees also bring their own laptops, tablets, and USB
drives to work. The use of personal devices at work has prompted many companies to
implement his BYOD policy. A BYOD policy describes how a company can use technology,
how it can be used, and how to protect the company from cyber threats such as
ransomware, hacking, and data breaches.
Having a clearly defined BYOD policy and understanding the risks and benefits of BYOD for
your organization is very important. Not only within organizations, but also for educational
purposes, students are using this BYOD concept in the classroom to enhance their education.

BYOD Level: -

There are 3 three BYOD Levels: -

Personal Devices Provided: -


At this level, employees bring their own devices and work on their company workstations To
do. At this level, infrastructure and applications are partially virtualized. At this
level, the IT resource's workstation does not involve employees. However, at this
level, employees can only use email and some applications on their personal devices.
Employees can easily access her IT support and corporate services from her personal device.
This level is also known as COPE (Corporate Owned, Personal Enabled).

Catalog of managed BYOD devices:-


At this level, the employee can select her workstation from
the company's service her catalog. At this level, infrastructure and applications are partially
virtualized. At this level, the IT department provides employees with a device catalog and
allows them to select devices. At this level, all services and applications are available on the
employee's own workstation. This level is also known as CYOD (Choose Your Own Device).

Full BYOD Model: -


This level allows employees to procure and own their own workstations. At this level,
infrastructure and applications are partially virtualized
At this level, the company can offer employees to purchase devices. At this level, all services
and applications are available on the employee's own
workstation. This tier only supports business apps exchanging services. At this level,
employee responsibilities include hardware, devices, and basic services such as operating
systems, office apps, and browsers. Improve work flexibility.

Conclusion:-
Overall, BYOD is a good initiative to try to implement when circumstances permit.
BYOD gives employees great flexibility in their jobs. Employees can also perform some
important tasks from their workstations. This BYOD trend has now become a way of life for
many employees and students. Intel first implemented it in his 2009, but it became popular
after 2011 when more companies started implementing it. And after the
COVID pandemic, the concept of BYOD is booming in every industry.
Question 3B:-

Introduction of BYOD :-

BYOD is a full form of “bring your own device”. BYOD is a policy followed by
many organizations. This policy allows employees in your organization to use
their personal devices for work-related activities. This activity allows employees to access
emails related to their organization
You can connect directly to your corporate network. It also accesses enterprise
applications and data. Smartphones are the most common devices employees use
at work. But employees also bring their own laptops, tablets, and USB drives to work. The
use of personal devices at work has led many companies to implement his BYOD policy. A
BYOD policy describes how a company can use technology, how it can be used, and how
to protect the company from cyber threats such as ransomware, hacking, and data
breaches. Having a clearly defined BYOD policy and understanding the risks and benefits of
BYOD for your organization is critical. Not only within organizations, but also for educational
purposes, students are using this BYOD concept in the classroom to enhance their education.

Pros. Of BYOD:-

cost savings:-

Providing every employee with a device significantly increases costs across


the organization. However, a BYOD policy can significantly reduce the cost of purchasing or
renting equipment for every employee in your organization. This policy reduces
the cost of providing training to use new devices. It also reduces the cost of hiring hardware
and IT support teams. These savings amount to up to $3,150 per employee per year,
according to the Cisco Internet Business Solutions Group. Additionally, when employees bring
their own devices, they are better managed, saving additional costs for deploying replacement
devices.

No training required:-

Not all employees in your organization are sufficiently technically savvy. Poor grasp of new
operating systems (OS) and software. For example, the older generation of employees
used Windows OS. So when a company upgrades his devices to other operating
systems like his Mac OS, Linux etc, it makes it very difficult for these employees to get
the new operating system. they have to be trained for that. It
increases training costs for companies. However, BYOD arrangements allow employees to
use whatever device they are most comfortable and comfortable using. Also, this his BYOD
policy eliminates the need for additional training.
Cons. of BYOD:-

Increased distractions:-
Social media apps, games, and other distractions can interfere with employee work hours
when they bring their own devices into the workplace.

Higher security risk:-


Employees using their own devices to work from home can put the company's It can increase
the risk of data being stolen or misplaced. Employers may have less control over who uses
their employees' personal devices when they are at home. Employee children
may accidentally download high-risk apps.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy