Bu1410 Unit 2 Assignment 1

In: Business and Management

Submitted By Oats1313
Words 2779
Pages 12
BU1410 Management Information Systems
Unit 2 Assignment 1
Instructor: Willie Cooper Jr.









Chapter 2
1. What are the major functions of a business that are important for understanding the role of information systems?
* Define a business and describe the business functions.
* According to the book “A business is a formal organization whose aim is to produce products or provide services for a profit.”
* There are four major business functions. They are manufacturing and production, sales and marketing, human resources, and finance and accounting.
* Manufacturing and production: assembling the product, checking product quality, producing bulls of materials
* Sales and marketing: Identifying customers, making customers aware of products, selling the products
* Human resources: hiring employees, evaluating employee job performance, enrolling employees in benefits
* Finance and accounting: paying creditors and employees, creating financial statements, managing cash accounts
* Define business process and describe the role they play in organizations.
* Business process is the steps and tasks that describe how a business’ work is organized. A business process is important so that each employee follows the same steps and tasks when working for an organization.
* Identify and describe the different levels in a business firm and their information needs.
* Senior management: makes long-range strategic decisions. They need information about the overall performance of the business.
* Middle management: carries out decisions that senior management make. They need information specific to the region or department they oversee.
* Operations management: responsible for managing the daily operations of a…...

Similar Documents

Unit 1 Assignment 2

...Microsoft Environment Analysis 1. Microsoft Security Advisory (2757760). Vulnerability in Internet Explorer Could Allow Remote Code Execution. Friday, September 21, 2012 Microsoft Security Advisory (2737111). Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Tuesday, October 09, 2012. Microsoft Security Advisory (2794220). Vulnerability in Internet Explorer Could Allow Remote Code Execution. Monday, January 14, 2013. Microsoft Security Advisory (2846338). Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution. Tuesday, May 14, 2013. Microsoft Security Advisory (2719662). Vulnerabilities in Gadgets Could Allow Remote Code Execution. Wednesday, July 03, 2013. 2. Yes one, but its importance was not considered a high priority. 3. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory Number: 979352 Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe......

Words: 280 - Pages: 2

Unit 1 Assignment 2

...The integration of Active Directory & impact with the current Ken 7 Windows Limited environment is that all new users will be created within Active Directory at the Local Group Policy Object (GPO) level. They are assigned to Site GPO’s, Domain GPO’s, & an overall Organizational Unit GPO. The Organizational GPO would be “Ken 7 Windows Limited”, the Domain would be manager (level of authority), Site GPO would be location (state if national, country if international). The last level would be the Local GPO, where each users’ information is at. This is the level in which all new users are individually created or modified. One of the plus’ to Active Directory is that instead of having to manage each user account individually, you can modify the privileges of the higher level to apply the changes to all (eg. All users in the accounting department you want to now have access to something they previously did not). With the use of the levels of GPO’s described above, the lower level (user account) takes precedence over the higher level. If you want a specific manger or individual user to have privileges to something that the others in that GPO (Local, Site, or Domain) don’t, you have authorize that individual the privilege. It makes the management of privileges and security much easier to track, and not have to worry about mistakes being made. If they happen to be made, they can quickly be fixed or corrected. The last thing I want to cover is the use of SID’s......

Words: 372 - Pages: 2

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to...

Words: 436 - Pages: 2

Unit 2 Assignment 1

...Variable naming rules of Visual Basic • You must use a letter as the first character • You can’t use a space, period (.), exclamation mark (!), or the characters @,&,$,# in the name • Name Can’t exceed 255 characters in length • You shouldn’t use any names that are the same as the functions, statements and methods in Visual Basic. You end up shadowing the same keywords in the language. To use an intrinsic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Variable naming rules of Python • Must begin with a letter (a-z, A-B) or underscore (_) • Other characters can be letters, numbers or _ • Case sensitive • Can be any reasonable length • There are some reserved words, which you cannot use as variable name because Python uses them for other things Variable naming rules of Java • All names must begin with a letter of the alphabet, an underscore, or (_) or a dollar sign ($). The convention is to always use a letter of the alphabet. The dollar sign and underscore are discouraged • After the first initial letter, variable names may also contain letters and the digits 0 to 9. No spaces or special characters are allowed. • The name can be any length • Uppercase characters are distinct from lowercase characters. Using ALL uppercase letters are primarily used to identify constant variables. Similarities and differences between the three programming languages 1. They must begin with a letter of a......

Words: 260 - Pages: 2

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This...

Words: 480 - Pages: 2

Unit 2 Assignment 1 Trace

...Review Questions 1. The five elements in the rhetorical situation are text, reader, author, constraints and exigence. 2. TRACE Chart a) A reader can use rhetorical situation to analyze an argument essay by knowing what kind of text it is, what the special qualities and features are and what the text is about. A reader can also use rhetorical situation to figure out if the writer anticipated a specific type of reader. It also can be used to know who the author is as well as finding out what the beliefs, attitudes, habits, affiliations or traditions will influence the way the reader and the author view an argument. The reader can also use this method to find out the cause of the argument b) A viewer can use rhetorical situation to analyze an image in order to figure out what kind of message is being portrayed in the image. The viewer can find out who the targeted audience is. The viewer should also look at what is exactly is going on in the picture in order to figure out who caused the argument or where the illustrator’s stance is. c) A writer can use the rhetorical situation in the planning phase of writing a paper by knowing what the assignment is. The reader must know who the audience is going to be and what side have they taken or what side are they going to take after reading the paper. It is also good to consider if there can be any common ground between the opposing forces. A reader needs to know why they are presenting their...

Words: 751 - Pages: 4

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to...

Words: 414 - Pages: 2

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that......

Words: 289 - Pages: 2

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Unit 2 Assignment 1

...Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. Windows Server 2012 Active Directory achieves C-I-A for departmental LANs, departmental folders and data through the two-way authentication and Global Policy Management for secure networking within domains. 2. Is it a good practice to include the account or user name in the password? Why or why not? It is never a good idea to include the account or user name in the password because it jeopardizes the security of the user and network. 3. What are some of the best practices to enhance the strength of user passwords in order to maximize confidentiality? Some of the best practices to enhance the strength of user passwords includes using upper and lower case characters, symbols and non-repeating letters or numbers with a minimum of 8 characters. 4. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain? No, a user who is defined in Active Directory but not part of the domain cannot access a shared drive since the shared drive on the server is not part of the domain. 5. Does Windows Server 2012 R2 require a user’s logon/password credentials prior to accessing shared drives? Windows Server 2012 R2 does require a user's logon/password prior to accessing...

Words: 559 - Pages: 3

Unit 2 Assignment 1

...Course GS1145 06/28/2015 6:00PM Dear Mrs. Phifer, As a returning student to college I have very few if any questions. I know you are thinking if that is the case then why you haven’t graduated from a college or university. But the reason for so little questions and concerns is because I’ve realized my mistakes and I’ve come to terms with those mistakes and I’m currently in the process of making corrections to those mistakes. Anyways some of the few questions that I do have are as follows: 1. What if I want to go ahead on assignments am I allowed to? 2. How will this course assist me with my goals of obtaining an associate’s degree? 3. How will this course benefit me? Along with these questions and concerns I also have a few challenges that I need to overcome, one of those being time management with having to work all day attend school after gives me a very limited amount of time to finish and complete assignments. That’s one thing that be fixing this semester because procrastination has been my friend for far too long. Another challenge I would say is a big factor would be as previously mentioned procrastination I put tasks off for long periods of time, school being one of those tasks and it has caused some pretty good opportunities to slip away from me. Even though I have some challenges I still possess some good strengths a couple of them being persistence and motivation, both of them are essential qualities that are needed to finish and complete school...

Words: 464 - Pages: 2

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because......

Words: 314 - Pages: 2

Bu1410 Unit 2 Assignment 1

...BU1410 Management Information Systems Unit 2 Assignment 1 Instructor: Willie Cooper Jr. Chapter 2 1. What are the major functions of a business that are important for understanding the role of information systems? * Define a business and describe the business functions. * According to the book “A business is a formal organization whose aim is to produce products or provide services for a profit.” * There are four major business functions. They are manufacturing and production, sales and marketing, human resources, and finance and accounting. * Manufacturing and production: assembling the product, checking product quality, producing bulls of materials * Sales and marketing: Identifying customers, making customers aware of products, selling the products * Human resources: hiring employees, evaluating employee job performance, enrolling employees in benefits * Finance and accounting: paying creditors and employees, creating financial statements, managing cash accounts * Define business process and describe the role they play in organizations. * Business process is the steps and tasks that describe how a business’ work is organized. A business process is important so that each employee follows the same steps and tasks when working for an organization. * Identify and describe the different levels in a business firm and their...

Words: 2779 - Pages: 12

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 1 DHCP troubleshooting Hello Junior Administrator, Let me clarify your parameters and intent… You have stated that you were tasked with changing the DHCP scope to match you IP addressing scheme. The IP address range you are using is 192.168.0.200 through 192.168.0.225. I have come up with a couple solutions and approaches to help you with your problem. First of all make sure you have typed all your numbers correctly. At times, a simple number incorrectly typed can throw the entire scheme off. Perform the same check for your subnet inputs as any slight number mistype will negate everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there is connectivity between your user machines and the network. Make sure your network interface cards are all up to date and functioning. The other approach I will suggest can be involved if you’re not used to working with your command prompt however it’s doable with a detailed memo to your employees. I would have them release their IP addresses and renew them to through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If you still encounter issues, please feel free to contact me and we can walk......

Words: 265 - Pages: 2

Unit 1 Assignment 2

...In this assignment seven stakeholders of the two businesses chosen will be explained in terms of their interests in the businesses and to evaluate the influences that they have over the businesses in terms of the business running. The two companies in this case are Tesco and Children in Need. The stakeholders for Tesco that will be assessed in this assignment are: Customers Shareholders Suppliers Employees Local Community Competition Sponsors The stakeholders for Children in Need that will be assessed in this assignment are: Owners Trustees Media Donators Volunteers Accountants The Cause Tesco The customers of Tesco are the people who buy goods and pay for the services from Tesco and Tesco try to persuade them to be lifetime customers and not just one time by offering special deals and bargains for long-time customers and new customers, so they can beat the other supermarkets and be the best. They are an external stakeholder as they are not employees and are outside of the business. In return the customers would want low prices and good quality items, great customer service and for Tesco to listen to the community and change in favour of them so that it is more suited, for example changing packaging so it is more environmentally friendly. The customers probably have the highest influence in terms of Tesco as they are needed for Tesco to increase revenue and earn a profit. They also provide as a motivator for Tesco to improve and expand as they...

Words: 2675 - Pages: 11