Free Essay

Itm - Computer

In:

Submitted By ritmraz
Words 1977
Pages 8
ITM 309—Business Information Systems and Technology
Michigan State University - Spring 2014

Instructor Information:

Name: Dr. Frederick A. Rodammer Office: N236 North Business Complex Office Hours: Monday: 10:15-11:30 Wednesday: 10:15-11:30 By appointment Office Phone: 355-0309 Office Fax: 432-1101 E-mail: Course: Faculty Through ANGEL Direct to Dr. Rodammer: rodammer@broad.msu.edu

Required Textbook:

1) ITM 309 - Business Driven Systems and Technology, 4th Edition, 2014 Copyright; MSU Custom Green Textbook - (Required) 2) Course Content in Angel. We will use everyday in class. Web page: http://angel.msu.edu

Statement on Academic Integrity and Honor Code:

It is assumed that all work done for credit will be the result of the individual’s or authorized group’s unaided effort. Your signature or personal submittal on any piece of submitted work will provide assurance that you have neither given nor received any unauthorized help in its preparation. Anyone who either gives or receives unauthorized assistance in the preparation of work at home or during exams in class will be subject to disciplinary action under the provisions and policies set forth by Michigan State University. The instructor will file an academic dishonesty report for each student who commits an academic integrity violation.

Honor Code: A committee representing undergraduates has authored our Broad School Honor Code. This Honor Code will serve as our ethical guideline for ITM 309. Any evidence of violation of the Honor Code will be reported and will show up on your MSU student record. The full text for the Undergraduate Student Honor Code can be found at the following url: http://uas.broad.msu.edu/academics/honor-code/

Course Overview and Course Objectives

Organizations are increasingly complex as they transact and collaborate with a diverse set of customers and vendors. Products and services are created with shorter life cycles using a distributed workforce where employees, customers, vendors all may be located anywhere around the globe.

Information technology plays a critical role in ensuring that the information needed to support such complex enterprises is available and can be effectively used. This course will help you develop systems thinking—the ability to understand the complexity of a business enterprise by systematically examining the business processes underlying the enterprise and the flow of information within and between such processes. Specifically, the ITM 309 course objectives are:

1. Learn about the role of information systems in improving business performance. 2. Understand the different types of information technologies and how they are used in business organizations. 3. Understand the principles of effective information technology management and use by individuals and organizations.

Information Technology Skills

Information Technology skills taught in ITM 309 will enable students to:

1. Be able to model business processes and simulate financial and operational effects of a technological change on a company’s business process. 2. Be adept at extracting and analyzing data from a database to enhance managerial decision making. 3. Be adept at organizing and analyzing data for business decisions using business intelligence and data analytics tools. 4. Develop stronger skills in learning how to understand emerging information technologies.

Special Needs

Students with special needs should feel free to speak with the instructor at the beginning of the semester so that any special needs can be accommodated. It is important to maximize everyone’s learning opportunities and experiences during the semester. The instructor is committed to doing his part in making each student experience a pleasant and productive one.

Grading

Your final course grade will be determined as follows:

|Exams (3) |495 points |
|Assignments (5) |300 points |
|Team Project |205 points |
|Total |1000 points = 100% |

Grading Scale

Final grades will be based on the following scale:

|100-92.0% |4.0 | |74.9-70.0% |2.0 |
|(1000 – 920 points) | | |(749 – 700 points) | |
|91.9-87.0% |3.5 | |69.9-65.0% |1.5 |
|(919 – 870 points) | | |(699 – 650 points) | |
|86.9-80.0% |3.0 | |64.9-60.0% |1.0 |
|(869 – 800 points) | | |(649 – 600 points) | |
|79.9-75.0% |2.5 | |59.9 and below |0.0 |
|(799 – 750 points) | | |(599 points and below) | |

Exams Scoring

There will be three written multiple choice exams. Each exam is worth 165 points. Students who submit an approved and signed excused absence to the Instructor two days prior to the Exam may have the opportunity to take an Essay Make-Up Exam, pending Instructor approval.

Assignments Scoring

We will have several technology skill assignments that focus on integrating Information Technology and business skills development. Business Process Modeling using Arena, Decision Support using Excel, Business Intelligence using Microsoft Access, and Data Analytics using Cognos Insights are several of the technologies we will learn during the assignments. Any assignment handed in late, but within 24 hours of the due date will receive, at best, a low pass for the assignment grade. It is assumed that all work done for credit will be the result of the individual’s or authorized group’s unaided effort. Consequences associated with a student academic integrity violation are explained on Page 1 of the ITM 309 Syllabus.

|ASSIGNMENT |TOPIC |POINTS |
|#1 |Arena – Simulation |90 |
|#2 |Excel – Cost Benefit Analysis |15 |
|#3 |Cognos Insights – Data Analytics |90 |
|#4 |Access - BI |90 |
|#5 |IT Research Survey |15 |
|TOTAL |300 |

Team Project Scoring

We will have a comprehensive team project, which focuses on the many aspects of how Information Technology is used to improve business performance. The Team Project will be based on an integrative case which will be used to tie together the different concepts studied in class and will be worked on by teams as the semester progresses. The Instructor and TAs will provide guidance to teams as the team project assignments are given during lectures.

Teams will be assigned in your Recitation Section for the team project. We have set aside some recitation sessions to work on the Team Project as a team with your TA providing guidance. Grading for the team project will be determined by both quality of project results and participation by individual team members on the team. Any team project handed in late, but within 24 hours of the due date will receive, at best, a low pass for the grade. It is assumed that all work done for credit will be the result of the individual’s or authorized group’s unaided effort. Consequences associated with a student or team member academic integrity violation are explained on Page 1 of the ITM 309 Syllabus.

Attendance

Lecture and recitation attendance is expected and is essential to do well in the class. Many lectures will provide insights regarding assignments and exams and therefore attendance during lectures is highly recommended to succeed with the class. For recitation, you must attend the recitation section for which you are registered.

Attendance will be taken electronically (using ID scanners in the lecture hall) on Mondays and Wednesdays in lecture. Please be certain your current MSU ID works in the card reader and scan in between the time period of 20 minutes prior to class to 5 minutes after class begins. If you don’t hear a beep or if your Student ID is defective or worn, then a new MSU ID can be obtained from MSU. Attendance will ONLY be tracked electronically using the card scanner. Scanning another student’s ID for them when they do not personally attend class and/or scanning your ID without attending class are violations of Academic Integrity. Consequences associated with a student academic integrity violation are explained on Page 1 of the ITM 309 Syllabus.

Attendance is not factored into your grade directly; however, students achieving excellent attendance of over 90% of classes will be rewarded if their course grade is a borderline case within 10 points or 1.0% of the next higher grade. Student attendance records from MSU’s electronic attendance system will be posted in ANGEL on a periodic basis for students to view their individual attendance status. The instructor will notify students when student attendance records in ANGEL are updated.

| |Date |Topic |Reading |Assignment/Project |
| | | | | |
|1 |1/6 |Course Introduction – IT in Business and ITM 309 Success Criteria | | |
|2 |1/8 |Business Driven Management | Baltzan: Chapter 1 | |
| | |Information Systems | | |
| |REC#1 |Introduction to Recitation and Tutorial for Arena Process Modeling Software | | |
|3 |1/13 |Business Processes Overview |Supplemental Reading | |
|4 |1/15 |Decisions and Processes | Baltzan: Chapter 2 | |
| |REC#2 |Arena Process Modeling | | |
| |1/20 |NO CLASS: Martin Luther King, Jr. Day | | |
|5 |1/22 |Guest Speaker – IBM and the Watson Solutions Technology | |Team Project – Business Strategy |
| |REC#3 |Arena Process Modeling | | |
|6 |1/27 |Decisions and Processes | | |
|7 |1/29 |Ebusiness | Baltzan: Chapter 3 |Team Project – IT Enablers |
| |REC#4 |Arena Process Modeling | | |
|8 |2/3 |Ebusiness | | |
|9 |2/5 |Exam 1 Review Session | | |
| |REC#5 |Excel Lab and Team Project Session | |ASSIGN 1 (Arena) DUE at 8:00 a.m. on day of |
| | | | |recitation |
|10 |2/10 |Exam 1 | |EXAM 1 |
| | | | | |
| |Date |Topic |Reading |Assignment/Project |
|11 |2/12 |Ethics and Information Security | Baltzan: Chapter 4 | |
| | | |Supplemental Reading | |
| |REC#6 |Cognos Insights | | |
|12 |2/17 |Ethics and Information Security | |Team Project – Customer Security |
|13 |2/19 |Infrastructures: Sustainable Technologies | Baltzan: Chapter 5 | |
| |REC#7 |Cognos Insights | | ASSIGN 2 (Excel) DUE at 8:00 a.m. on day of |
| | | | |recitation |
|14 |2/24 |Guest Speaker – Sparrow Health Systems Information Technology | | |
|15 |2/26 |Data: Business Intelligence | Baltzan: Chapter 6 |Team Project – Business Analytics |
| |REC#8 |Cognos Insights | | |
| | |Have a Great SPRING BREAK! | | |
|16 |3/10 |Data: Business Intelligence | | |
|17 |3/12 |Guest Speaker – General Electric Information Technology | | |
| |REC#9 |Cognos Insights | | |
|18 |3/17 |Networks: Mobile Business | Baltzan: Chapter 7 and Appendix B | |
|19 |3/19 |Exam 2 Review Session | | |
| |REC#10 |Access Lab | |ASSIGN 3 (Cognos) DUE at 8:00 a.m. on day of |
| | | | |recitation |
|20 |3/24 |Exam 2 | |EXAM 2 |
| |Date |Topic |Reading |Assignment/Project |
| | | | | |
|21 |3/26 |Enterprise Applications: Supply Chain Management (SCM) | Baltzan: Chapter 8 | |
| |REC#11 |Access Lab and Team Project Session | | |
|22 |3/31 |Guest Speaker – Optime’ Supply Chain, Inc. | | |
| | |Information Technology | | |
|23 |4/2 |Enterprise Applications: Customer Relationship Management (CRM) | | |
| |REC#12 |Access Lab | |ASSIGN 4 (Access) DUE at 8:00 a.m. on April 12 |
|24 |4/7 |Enterprise Applications: Enterprise Resource Planning (ERP) | | |
|25 |4/9 |Enterprise Applications: ERP | | |
| |REC#13 |Team Project Presentations in Recitation | |TEAM PROJECT DUE at 8:00 a.m. on day of recitation |
|26 |4/14 |Systems Development and Project Mgmt. | Baltzan: Chapter 9 | |
|27 |4/16 |Systems Development and Project Mgmt. | | |
| |REC#14 |Team Project Presentations in Recitation | | |
|28 |4/21 |Change Management | | |
|29 |4/23 |Exam 3 Review Session | | |
| |REC#15 |IT Research Survey and Wrap-Up | |ASSIGN 5 (IT Survey) COMPLETED in Recitation |
|30 |5/1 |Exam 3 7:45 a.m.-9:45 am | |EXAM 3 in n130 BCC |
| | | | | |

|Assignments = 300 Points |Focus Area |Date Assigned |Date Due |Points |
|#1: Arena – Simulation |Process Modeling |1/15, 1/16 |2/5, 2/6 |90 |
|#2: Excel – C/B Analysis |Team Project |2/5, 2/6 |2/19, 2/20 |15 |
|#3: Cognos Insights - DA |Data Analytics |2/12, 2/13 |3/19, 3/20 |90 |
|#4: Access – BI |Business Intelligence |3/19, 3/20 |4/12 |90 |
|#5: IT Research Survey |Trust with IT |4/23, 4/24 |4/23, 4/24 |15 |
| | | | | |
|Team Project = 205 Points |Focus Area |Date Assigned |Date Due |Points |
|Business Strategy |Team Project Component |1/22 | | |
|IT Enablers |Team Project Component |1/29 | | |
|Customer Security |Team Project Component |2/17 | | |
|Business Analytics |Team Project Component |2/26 | | |
|Report and Presentation |Team Member Teamwork | |4/9, 4/10 |205 |
| | | | | |
|Exams = 495 Points |Focus Area |Date Assigned |Date Due |Points |
|Exam 1 |1/6 through 2/10 | |2/10 |165 |
|Exam 2 |2/12 through 3/24 | |3/24 |165 |
|Exam 3 |3/26 through 4/23 | |5/1 |165 |
| | | | | |
|TOTAL = 1000 POINTS | | | | |

Similar Documents

Free Essay

Why Do We Care About Human-Computer Interaction?

...Trident University International ITM 433 Module 1 Case   ITM 433 – Computer-Human Interaction Module 1: Why do we care about human-computer interaction? Case Assignment: Discuss the application of speech recognition as a tool for Human Computer Interaction Definitions Before getting too far into detail, here are some definitions this paper is based on. Human-Computer Interaction (HCI) is summarily, and loosly, defined as the interaction between people (users) and computers and can be referred to in several different manners. For instance; Computer-Human Interaction (CHI) or Human-Machine Interaction (HMI) are both virtually interchangeable with HCI. The phrase “speech recognition” is rarely, if ever, used outside the context of computer science. Speech recognition refers to the ability of computer-based software to convert spoken words into written (typed/digital) text. Together – HCI/CHI/HMI, etc., insert your acronym of choice but HCI will be used throughout this paper – HCI and speech recognition represent the present and rising future of end-user functionality. The next big thing will be the ability of computers or machines to read your mind instead of verbally instructing it to carry out your bidding… that is sarcasm, of course. However, this current reality of speech recognition software was not stumbled upon and did not happen by chance.   A Short History The lever is widely regarded as the first “machine” “invented” and implemented by...

Words: 806 - Pages: 4

Premium Essay

Guidance and Councelling

...ASSIGNMENT COVER SHEET COURSE : ITM 352; SOFTWARE PROJECT MANAGEMENT NAME OF LECTURER: CASMIR MAAZURE START DATE : 7TH NOV 2013 DUE DATE: 28TH NOV 2013 STUDENTS INDEX NO_: NAMES SIGNATURE 1. …………………….. 2. …………………….. 3. ……………………… 4. …………………….. 5. ……………………… Key Areas | Marks / Grade | | Excellent | Very Good | Satisfactory | Needs More Work | Understanding of task/ identification of problem | | | | | Appropriate Solution response | | | | | Logical development and argument | | | | | Evaluation and critical analysis | | | | | Research and fact finding | | | | | Style/ Referencing | | | | | NB: MAKE A CLEAN PHOTOCOPY OF THIS FOR YOUR COVER PAGE. USE PEN TO WRITE YOUR NAMES, INDEX NUMBERS AND SIGN. DO NOT REPRODUCE THIS COVER PAGE. VERY IMPORTANT ASSIGNMENT REQUIREMENTS In group of five, prepare a project plan and a report as a consultant for submission to the company. Make sure that you demonstrate the use of systematic analysis and project management methodology. You must adopt a standard framework/ format for your report. THE PROJECT CASE STUDY You have been appointed software Project Manager for the development for the new ITE Computer group Mobile Personal Communicator. Your job is to ensure that the software and associated documentation is delivered to the highest quality...

Words: 1130 - Pages: 5

Free Essay

Itm 5000 Term Paper

...The Four Categories of Computers Anthony Johnson ITM 5000 Information Technology Management Ms. Brenda K. Britt 04 October 2011 The Four Categories of Computers Today computers are divided into four categories Super computers, Mainframe computers, Mini computers and Micro-computers more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld. A super computer is the fastest computer mostly used by scientist and engineers who work with huge amounts of data usually on more than one central processing unit (CPU) working simultaneously. Supercomputers have the ability to store huge amounts of data and the capability to deliver very fast input/output of information. The military branches, Universities, and science research facilities use the super computers mostly. Scientific computing is the ability of a CPU to accomplish huge mathematical computations at an extremely fast rate this created the demand for the super computer. Extremely large mathematical computations are processes most needed in fields such as physics, mechanical engineering, meteorology, and aerodynamics. A common technique is to compute an approximate numerical solution to a set of partial differential equations which mathematically describe the physical process of interest but are too complex to be solved by formal mathematical methods. (McGraw-Hill, 2005) Personal computers have a single processor. The supercomputers have thousands of...

Words: 961 - Pages: 4

Premium Essay

Binary Information

...data while analysis is done to obtain information. 2. Discuss how computer represents data and basic units of measuring information (up to GB): Computer represents data using binary numeral system: - bit= binary unit (to 256) - bute- 8 bits - kb= 1024 byrtes - mb= 1024 Kb - gb= 1024 mb 3. Compare ASCII, EBCDIC and Unicode: ASCII- American Standard Code for Information Interchange ASCII is a 7 digit (7- bit) code EBCDIC-Extended Binary- Coded Decimal Interchange Code (INM mainframes) EBCDIC- represents each character as a unique combination of 8 bits 8 bites=256 unique combinations Unicode- Universal International coding standard design to represent text based data. Unicode identifies each character using, 0s and 1s. It’s a larger code, consisting of 1 to 4 bytes 4. Discuss the difference between computers: Mainframe-used by large organizations (hospital, university, bank, government offices) -manages a large amount of fertilized data. - located in climate-controlled data centers and connect to the rest of the company computers .via computer network Supercomputer: -$2 mil -\220 million - 50 – 50000 times faster than PC. - A large number of processors interconnected by a network. Small (microcomputers or pc) -$500- $7000 - Desktop computers and work stations - Laptop Computers - Notebook Computers - Palmtop Computers • Server is a computer program running to serve the request of other programs • Workstation ...

Words: 2445 - Pages: 10

Free Essay

Nt2580 Research Project Part 2

...their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. Richman Investments Computer users’ policy: Although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources...

Words: 1544 - Pages: 7

Premium Essay

Malicious Code Attack

...Karen Barber ITM – 5600 – Information and Communications Security Assignment: Summary Report on a Malicious Code Attack Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. Upon entering the system, there are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. The Spamhaus Project is a cyber attack that is described as the largest in history apparently starting over an argument over spam. The prolonged denial-of-service assault is targeting The Spamhaus Project; a nonprofit European filtering service that helps organizations to fight spam by weeding out unwanted emails has gone after CyberBunker, a Dutch data-storage company that offers hosting to any websites/content "except child porn and anything related to terrorism." On March 18, 2013, Spamhaus added CyberBunker (whose servers shows “cb3rob...

Words: 728 - Pages: 3

Free Essay

Disaster Plan

...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...

Words: 1273 - Pages: 6

Premium Essay

How a New Strategy Saved and Created a Bright Future for Ibm in 90s.

...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...

Words: 319 - Pages: 2

Free Essay

Technology Emergence Papaer

... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...

Words: 1786 - Pages: 8

Premium Essay

Computer as a Catalyst for Change

...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...

Words: 9206 - Pages: 37

Premium Essay

Capstone Wbs Dictionary

...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...

Words: 655 - Pages: 3

Free Essay

Information Technology

...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...

Words: 679 - Pages: 3

Free Essay

Lg Michael Ahn on Becoming a Global Player in the Consumer Electronics

...LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market: Knowledge@Wharton ( http://knowledge.wharton.upenn.edu/article.cfm?articleid=2667) LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market Published : January 06, 2011 in Knowledge@Wharton In 2000, executives at South Korea-based LG Electronics set the goal of becoming a top-three player globally by the close of the decade. One year early, in 2009, the company achieved its goal. Meanwhile, revenue has jumped from $5.6 billion in 2004 to more than $13 billion in 2010. Michael Ahn guided the branding effort for LG Electronics North America before stepping down as regional president and CEO last year to become a senior adviser at LG Electronics USA. In a recent conversation with Knowledge@Wharton, Ahn -- who was visiting the University of Pennsylvania to make a speech as part of the Wharton Leadership Lecture series -- named patience, consumer-targeted marketing and achieving synergy among the firm's different divisions as the factors catapulting LG Electronics from a relatively obscure maker of commodity goods to a premium global brand. An edited version of the conversation appears below. This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407. Knowledge@Wharton I would love to start by talking about the consumer electronics...

Words: 1692 - Pages: 7

Free Essay

A Horror Story

...Theme: Horror/Suspense Setting: A typical boy’s room- dirty and messy. The only light source would be the computer. Most used part would be the computer table/desktop. Characters: Gio- The main character, a slouchy procrastinator student who was writing and cramming a paper. Stranger- No fact was known other than he is implied to be a ghost or spirit a hint of it’s appearance. • Page 1 Panel 1: Paneling- 1/3 of the page horizontally (most of computer screens are horizontally oriented) A close up shot of a computer monitor, Microsoft word is the open application with only his name on it and a title “A Horror Story” Panel 2: Paneling- 1/3 of the page horizontally Gio leaning on his palm looking bored/thinking (shot from monitor’s POV), with a gleam of the only light source which is the monitor on his face. Thought Bubble: Ahhh, damn. I’ve been doing this for two days now. Panel 3: Paneling- 1/3 of the page horizontally A zoom up shot of the computer clock with “11:11pm” on it. Thought Bubble(top right side): 11:11 do you work, please send me a spirit and have him type his story! • Page 2 Panel 1: Paneling- 1/3 horizontally, 2/3 of the first tier. Gio face palming, same shot from page 1, panel 2. Thought Bubble(bottom left part): Who am I kidding? Wake up kid! Panel 2: inset, remaining of the first tier Gio reaching to the right for the coffee mug in the study table, back shot with him on the center. Thought Bubble(left side of the...

Words: 541 - Pages: 3

Premium Essay

Inventory Management

...KB Corporation PROPOSAL For Inventory Management System Table of Contents 1 Overview 2 Problem Situations Proposed and Purpose 3 Record methods 3.1 Recommendation for the forms design principles are: 3.2 Computer assisted-retrieval system (CAR) 3.3 Data Retrieval methods by Information Technologies 3.4 Policies for record storage 4 Organizing the record and the classification system. 5 Implementation. 6 Conclusion: Strategically Managing Inventory for Future Growth 1. Overview As the company are expecting to establish another 20 shops in the next 2 years, we have realized how important for the document system for different department. And our products are almost imported from Europe and Asia. We cannot keep to using the manual record for the document record system. This document will explain the requirement for management, inventory, provisioning, customer support, sales support, and book-to-bank systems. Where possible recommendations are given to understand and plan for interconnection, correlation, and data warehousing requirements. Emphasis is given to ensuring all databases will have a capability to provide input to decision support systems needed by both senior management, as well as operational levels of the business. 2 . Problem Situations Our company current operation has shown that the inventory document record is obvious inefficiency. In the aspect of inventory control, more and more errors were found...

Words: 1430 - Pages: 6