Premium Essay

Myfiles

In:

Submitted By rummykhan
Words 817
Pages 4
Rehan Manzoor
ID 57370
ERP – BPR
Enterprise Resource Planning – Business Process Re - Engineering

Assignment Topic
Engineering Vs Re-Engineering
Engineering is actually a closer to creativity whereas re-engineering is editing an existing an organization in such a way that its efficiency is increased and resources are planned.

Let’s take a look on BPR (Business Process Re-Engineering) and then we will move further to the comparison one by one
Business process reengineering
Business process re-engineering is a business management strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows and processes within an organization. BPR aimed to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational costs, and become world-class competitors. In the mid-1990s, as many as 60% of the Fortune 500 companies claimed to either have initiated reengineering efforts, or to have plans to do so.
BPR seeks to help companies radically restructure their organizations by focusing on the ground-up design of their business processes. According to Davenport (1990) a business process is a set of logically related tasks performed to achieve a defined business outcome. Re-engineering emphasized a holistic focus on business objectives and how processes related to them, encouraging full-scale recreation of processes rather than iterative optimization of sub processes.

“BPR Process Circle”
“Engineering”
Engineering is the application of scientific, economic, social, and practical knowledge, in order to design, build, and maintain structures, machines, devices, systems, materials and processes. It may encompass using insights to conceive, model and scale an appropriate solution to a problem or objective. The discipline of engineering is extremely broad, and

Similar Documents

Free Essay

Pt 1420 Unit 10 Homework

...connection between the file and a program; this allows the program to read data from the file. * Process the file – Data is either read from the file or written to the file * Closing the file – The file must be closed when a program is finished using it. Closing the file disconnects the file from the program. 2. The file must be closed so the program will force any unsaved data in the buffer to be written to the file. 4. The file will not be erased, and any new data will be written at the end of the file’s current contents. 5. The program will create a new file. Algorithm Workbench 1. Declare OutputFile myFile Open myFile “my_name.dat” Write myFile “fatima” Close myFile 2. Declare InputFile myFile Declare String name1 Open myFile “my_name.dat” Read myFile name1 Close myFile Display ”Hello! My name is,” 3. Declare OutputFile numberList Declare Integer counter = 1 Open numberList “number_list.dat” For counter = 1 to 100 Write numberList, counter Next counter End For Close numberList 4. Declare InputFile number_list Declare Integer myNumber Open number_list ”number_list.dat" Display "Here are the numbers: " While NOT eof (number_list) Read numberList myNumber Display myNumber End While Close myName Programming Exercise Pg. 410 1. Declare Integer number Declare InputFile numberFile Open numberFile “numbers.dat” Display “Here are the numbers:...

Words: 291 - Pages: 2

Free Essay

Pt 1420 Homework

...Opening the file creates a connection between the file and a program; this allows the program to read data from the file. * Process the file – Data is either read from the file or written to the file * Closing the file – The file must be closed when a program is finished using it. Closing the file disconnects the file from the program. 2. The file must be closed so the program will force any unsaved data in the buffer to be written to the file. 4. The file will not be erased, and any new data will be written at the end of the file’s current contents. 5. The program will create a new file. Algorithm Workbench 1. Declare OutputFile myFile Open myFile “my_name.dat” Write myFile “fatima” Close myFile 2. Declare InputFile myFile Declare String name1 Open myFile “my_name.dat” Read myFile name1 Close myFile Display ”Hello! My name is,” 3. Declare OutputFile numberList Declare Integer counter = 1 Open numberList “number_list.dat” For counter = 1 to 100 Write numberList, counter Next counter End For Close numberList 4. Declare InputFile number_list Declare Integer myNumber Open number_list ”number_list.dat" Display "Here are the numbers: " While NOT eof (number_list) Read numberList myNumber Display myNumber End While Close myName Programming Exercise Pg. 410 1. Declare Integer number Declare InputFile numberFile Open numberFile “numbers.dat” Display “Here are the numbers: “ While NOT eof(numberFile)...

Words: 296 - Pages: 2

Free Essay

File Permissions

...Directions: Discuss some of the different file permissions available within UNIX®. Include how certain settings can help increase the security of the system. * Please type the discussion information into this handout and post in the Assignments Area for grading. |File Permissions |Discussion & Information | | | | | |r: file is readable by owner, group or other. | | |w: file is writeable. On a directory, write access means you can add or delete files. | |r, w, and x are three types of |x: file is executable (only for programs and shell scripts - not useful for data files). Execute permission on a directory means | |permissions |you can list the files in that directory | | | | | |Default file...

Words: 406 - Pages: 2

Premium Essay

Cis170 Final Exam Guide

...5. MC 1. Delete (TCO 13) The header file that defines the classes for processing and manipulating files is called the _____. 4 Points : Instructor Explanation: Chapter 13.1 Introduction Edit 6. 7. 8. MC 2. Delete (TCO 13) What do the following statements accomplish? ifstream theFile; theFile.open( myFile.txt , ios::in); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 9. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::out); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 10. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::app); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 11. MC 2. Delete (TCO 13) What do the following...

Words: 2540 - Pages: 11

Premium Essay

Michael

...Your organization routinely uses scripts, but as some employees have left, there are scripts that contain only command lines and no one is certain of their purpose. What steps can be taken to ensure a way for others to know the purpose of a script? C. Require that script writers place comment lines inside the scripts using the # symbol to begin each command line. Which of the following shells enable the use of scripts? (Choose all that apply.) A. Bash B. csh D. zsh You frequently use the command ls-a and want to save time by just entering l to do the same thing. Which of the following commands enables you to set your system to view hidden files by only entering l? D. alias l= "ls -a" You have written a script, but when you run it there is an error. Which of the following commands can you use to debug your script? (Choose all that apply.) B. sh -v D. sh -x You have written a shell program that creates four temporary files. Which of the following commands can you use to remove these files when the script has completed its work? A. trap Which of the following commands work well for menus used in a script? (Choose all that apply.) B. case You are currently in the soruce directory, which is the new directory you have just created for storying and running your scripts. You want to make certain that the source directory is in your default path. Which of the following commands enable you to view the current default path settings? D. echo $PATH ...

Words: 696 - Pages: 3

Premium Essay

Essay

...SCHULICH SUPPLEMENTARY APPLICATION SEPTEMBER 2014 ENTRY This is not an application for admission. To obtain admission application information, please visit http://futurestudents.yorku.ca. Current York students applying for Delayed Entry (Year 2) should complete a BBA Delayed Entry Application form and attach it to a printed completed Supplementary Application and submit it directly to the Undergraduate Programs Unit, Schulich School of Business, Room W262P. Information packages for Delayed Entry applicants are available at W262P, Schulich School of Business. All candidates must submit a completed Supplementary Application to the Schulich School of Business by the applicable deadline date indicated on this form to be considered for admission. York Student Number: Program Choice: □ Bachelor of Business Administration (BBA) q □ International Bachelor of Business Administration (iBBA) 213593330 (9 digit York student number) Which category are you applying for? (Check only ONE): □ Direct Entry applicants (Year 1). Deadline to submit form is February 5, 2014. q □ Delayed Entry applicants (Year 2). Deadline to submit form is March 12, 2014. Personal Information Surname Saleem First Name Farrukh Date of Birth (dd/mm/yy) Email Address: Province/State 10 / 02 / 97 q □ Male □ Female farrukhsaleem77@hotmail.com Ontario Country Current or most recent Educational Institution City and Province/State of Institution ...

Words: 2890 - Pages: 12

Free Essay

Ecet 370 Hw1

...======================================== DeVry College of New York ECET 370 HW #1: Dynamic 2D-array ------------------------------------------------- Objective: Write a program to calculate students’ average test scores and their grades. You may assume the following file input data: Johnson 85 83 77 91 76 Aniston 80 90 95 93 48 Cooper 78 81 11 90 73 Gupta 92 83 30 69 87 Blair 23 45 96 38 59 Clark 60 85 45 39 67 Kennedy 77 31 52 74 83 Bronson 93 94 89 77 97 Sunny 79 85 28 93 82 Smith 85 72 49 75 63 Use three arrays: a one-dimensional array to store the students’ names, a (parallel) two-dimensional array to store the test scores, and a parallel one dimensional array to store grades. Your program must contain at least the following functions: a function to read and store data into two arrays, a function to calculate the average test score and grade, and a function to output the results. Have your program also output the class average. Tools required: PC & Visual studio software Code: #include <iostream> #include <fstream> #include <sstream> #include <string> using namespace std; bool readStudentData(ifstream &inFile, string &name, int &score1, int &score2, int &score3, int &score4, int &score5) { string line; if (getline(inFile, line)) { string word; istringstream iss(line, istringstream::in); int count = 0; try { while (iss >> word) { //cout...

Words: 673 - Pages: 3

Free Essay

Infotech 3i

...ITtestPapers.com – Placement Papers, Interview Questions and Tutorials ------------------------------------------------------------------------------------------------------------------------------- 3i-Infotech Technical Paper – 9 1. A 2MB PCM(pulse code modulation) has a) 32 channels b) 30 voice channels & 1 signalling channel. c) 31 voice channels & 1 signalling channel. d) 32 channels out of which 30 voice channels, 1 signalling channel, & 1 Synchronizatio channel. Ans: (c) 2. Time taken for 1 satellite hop in voice communication is a) 1/2 second b) 1 seconds c) 4 seconds d) 2 seconds Ans: (a) 3. A dishonest shopkeeper professes to sell pulses at the cost price, but he uses a false weight of 950gm. for a kg. His gain is ...%. 4. Max number of satellite hops allowed in voice communication is : a) only one b) more than one c) two hops d) four hops Ans: (c) 5. Conditional results after execution of an instruction in a micro processor is stored ina) register b) accumulator c) flag register d) flag register part of PSW(Program Status Word) Ans: (d) 6. Frequency at which VOICE is sampled is a) 4 Khz b) 8 Khz c) 16 Khz d) 64 Khz Ans: (a) 7. Line of Sight is a) Straight Line b) Parabolic c) Tx & Rx should be visible to each other d) none Ans: (c) 8. Purpose of PC(Program Counter) in a MicroProcessor is a) To store address of TOS(Top Of Stack) b) To store address of next instruction to be executed. c) count the number of instructions. d) to store base address of the stack. Ans:...

Words: 2873 - Pages: 12

Premium Essay

Program

...Purple Pizza Eater CTU IT110 Sam Craig Tammera Atencio 2/25/2015 Contents Week 1: 3 Project Description or Overview 3 Case Diagram 3 Java Fundamentals 4 Program 4 Screen Shots 6 Week 2 Jave Control Structures 7 Program 7 Screen Shots 11 Week 3 14 Week 4 15 Week 5 16 Week 1: Project Description or Overview The company that I am working for is Purple Pizza Eater. This is a new pizza company. I am helping them setup their online ordering system. They will offer different kinds of pizza. You can pick from Meat Lovers, BBQ chicken and hot wing pizza. You will also have 3 different option of crust thin, pan and deep dish. The prices got from 6 dollars for a signal topping and 12 dollars for special pizza. Case Diagram Order pizza Order pizza Offer GUI Offer GUI Customer Customer Take order Take order Java Fundamentals Program /* Name – Sam Craig * Date – 3/2/2015 * Project - IT110 Phase 1 IP * Description - This is my first Java program to introduce an online product to sell * and prompt the user for information */ package phase.pkg1.ip; import javax.swing.JOptionPane; public class Phase1IP { public static void main(String[] args) { // declare and initialize variables String openingMsg, nameInputMsg, customerName, nameOutputMsg, returnInputMsg, customerReturn, returnOutputMsg, greetingOutputMsg, outputMsg; ...

Words: 1940 - Pages: 8

Free Essay

Nt1430

...the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access permission on the file. It lets you tell the system how much (or little) access it should permit to a file. 2.) Owner can read, write and execute a file; group and others can read and execute file. 10. If I needed to change a user’s username from kcarter to kparker, what command would I use? usermod 11. What does grep do? Used to search text for patterns specified by the user. 12. What does mkdir do? What does rmdir do? 1.) Creates a new...

Words: 348 - Pages: 2

Premium Essay

Program Design & Development

...Appendix D: Answers to Checkpoint Questions Chapter 1 1.1 A program is a set of instructions that a computer follows to perform a task. 1.2 Hardware is all of the physical devices, or components, that a computer is made of. 1.3 The central processing unit (CPU), main memory, secondary storage devices, input devices, and output devices. 1.4 The CPU 1.5 Main memory 1.6 Secondary storage 1.7 Input device 1.8 Output device 1.9 One byte 1.10 A bit 1.11 The binary numbering system. 1.12 It is an encoding scheme that uses a set of 128 numeric codes to represent the English letters, various punctuation marks, and other characters. These numeric codes are used to store characters in a computer's memory. (ASCII stands for the American Standard Code for Information Interchange.) 1.13 Unicode 1.14 Digital data is data that is stored in binary, and a digital device is any device that works with binary data. 1.15 Machine language 1.16 Main memory, or RAM 1.17 The fetch-decode-execute cycle. 1.18 It is an alternative to machine language. Instead of using binary numbers for instructions, assembly language uses short words that are known as mnemonics. 1.19 A high-level language 1.20 Syntax 1.21 A compiler 1.22 An interpreter 1.23 A syntax error 1.24 The operating system 1.25 A utility program 1.26 Application software Chapter 2 2.1 Any person, group, or organization that is asking you to write a program. 2.2 A single function that the program...

Words: 5516 - Pages: 23

Free Essay

Computer Memory

...The Deadlock Problem Law passed by the Kansas Legislature in early 20th century: “When two trains approach each other at a crossing, both shall come to a full stop and neither shall start upon again until the other has gone.” Neil Groundwater has the following to say about working with Unix at Bell Labs in 1972: ... the terminals on the development machine were in a common room ... when one wanted to use the line printer. There was no spooling or lockout. pr myfile > /dev/lp was how you sent your listing to the printer. If two users sent output to the printer at the same time, their outputs were interspersed. Whoever shouted. “line printer!” first owned the queue. 1 Deadlock or Deadly Embrace  Permanent blocking of a set of processes that either compete for system resources or communicate with each other – Several processes may compete for a finite set of resources – Processes request resources and if a resource is not available, enter a wait state – Requested resources may be held by other waiting processes – Require divine intervention to get out of this problem  A significant problem in real systems, because there is no efficient solution in the general case  Deadlock problem is more important because of increasing use of multiprocessing systems (like real-time, life support, vehicle monitoring, multicore utilization, grid processing)  Important in answering the question about the completion of a process  Deadlocks can occur with – Serially reusable...

Words: 282 - Pages: 2

Free Essay

Script

...sADOBE® INTRODUCTION TO SCRIPTING © Copyright 2007 Adobe Systems Incorporated. All rights reserved. Introduction to Scripting for Windows® and Macintosh®. NOTICE: All information contained herein is the property of Adobe Systems Incorporated. No part of this publication (whether in hardcopy or electronic form) may be reproduced or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written consent of Adobe Systems Incorporated. The software described in this document is furnished under license and may only be used or copied in accordance with the terms of such license. This publication and the information herein is furnished AS IS, is subject to change without notice, and should not be construed as a commitment by Adobe Systems Incorporated. Adobe Systems Incorporated assumes no responsibility or liability for any errors or inaccuracies, makes no warranty of any kind (express, implied, or statutory) with respect to this publication, and expressly disclaims any and all warranties of merchantability, fitness for particular purposes, and noninfringement of third party rights. Any references to company names in sample templates are for demonstration purposes only and are not intended to refer to any actual organization. Adobe®, the Adobe logo, Illustrator®, InDesign®, and Photoshop® are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple®...

Words: 14237 - Pages: 57

Free Essay

Hacking

...ngA Basic UNIX Overview Asriel UNIX FOR DOS ADDICTED WaReZ PuPPieZ AND THEIR PETS Introduction ------------ One of the most common operating systems in existance is Unix. Unix exists in many different flavors, from Berkeley BSD to AT&T System V to SunOs. Basic working knowledge of Unix is almost essential to a hacker, as it is the system a hacker is most likely to come across. If you intend to use the internet at all, or to do any serious exploration of Telenet, the ability to navigate through Unix is a necessity. (Unix is also the single most interesting system in existance: it's just fun to fuck with). Unix Logins ----------- Most Unix logins look essentially the same. A general Unix login prompt looks something like this: connected to five.finger.com login: That first line is the system identifier. Although it's not at all essential to what you are doing, it's good to know what system you are attempting to log on to. The second line is what typically identifies the system you are on as Unix. Almost all Unix systems greet a user with the same prompt: login:. Well, there's not much to do in Unix from the outside, and Unix systems are typically fairly secure at this point. You may be able to obtain a list of users, or current users, by logging in as 'who', but other than that there are few functions available here. Unless you are on the internet, or have accounts specifically...

Words: 3455 - Pages: 14

Free Essay

Unit 2 Assignment Nt1430

...list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access permission on the file. It lets you tell the system how much (or little) access it should permit to a file. 2.) Owner can read, write and execute a file; group and others can read and execute file. 10. If I needed to change a user’s username from kcarter to kparker, what command would I use? usermod 11. What does grep do? Used to search text for patterns specified by the user. 12....

Words: 529 - Pages: 3