B3700 Information Systems Winter 2021 Final Assignment Please answer all questions to demonstrate your understanding of the course material from the second half of this course. Question responses...

1 answer below »
do 6 questions


B3700 Information Systems Winter 2021 Final Assignment Please answer all questions to demonstrate your understanding of the course material from the second half of this course. Question responses should be in your own words. Plagiarism will not be tolerated (i.e. automatic grade of 0%). Here are some guidelines as you complete the assignment: · The assignment should take you 3-4 hours to complete · Each question response should be between 250-350 words. Please organize your thoughts and be concise. · Please form your answers in the context of the textbook readings, lectures and weekly activities. Consider using direct references to course materials and activities in your answers. Unless indicated, do not use external sources. · Please look at the grading rubric for each question to understand how you will be graded and what is expected. · Please incorporate your own lived experiences into your answers as much as possible. You interact with a variety of information systems in your academic and personal life – use examples to demonstrate understanding. · Each question is worth 10 marks (60 marks total). Questions 1. Identify an organization that would benefit from an ERP system and briefly explain why. a. Consider the five components of an information system from Chapter 1 and consider how each factors into a successful ERP implementation. Give examples specific to the organization where possible. b. Identify what you believe is the most important component for a successful ERP implementation and explain why. Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 2. Describe market-basket analysis by explaining how a business of your choice would approach the technique. What does it mean if the lift of Item A and Item B is 2.3? (In your answer, replace Item A and Item B with two items that could be purchased from the business you selected.) Describe two possible ways the business could use this information. Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 3. Name a company or organization for which you would like to work. Describe, as specifically as you can, how that company could use social media in each of the value chain activities listed below. For each example, provide potential risk that would need to be managed. Be specific. a. Sales and marketing b. Customer service c. Manufacturing and operations d. Human resources Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 4. Provide an example of an information system that would be used to support the operations of a business of your choosing. a. Briefly describe the SDLC by applying it to the development of the information system you selected for the business. b. What role (if any) do you think do end-users have at each stage of the lifecycle? Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 5. Describe a situation you believe is unethical behaviour involving information systems in the workplace. Why do you consider it to be unethical? Ensure you consider the difference between illegal and unethical behaviour, and include your beliefs about proper conduct when faced with the situation you describe. Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 6. Watch the video SANS Security Awareness: Email and Phishing at https://www.youtube.com/watch?v=sEMrBKmUTPE. a. Reflect upon your personal experience with phishing threats. What is the most important thing you learned from the video? b. What is the potential impact of a successful phishing attempt to a business or organization? Give two examples. c. What recommendations would you make to limit the impact of phishing threats in the workplace? Excellent Good Needs improvement Poor Depth of understanding of course material (8 marks) Demonstrates a thorough understanding of the concept Demonstrates a good understanding of the concept Demonstrates an incomplete understanding of the concept Demonstrates a poor understanding of the concept Presentation (2 marks) An occasional grammatical or stylistic error Few grammatical or stylistic errors Obvious grammatical or stylistic errors; errors interfere with content Obvious grammatical or stylistic errors; errors make content very difficult to read 5
Answered 2 days AfterApr 08, 2021

Answer To: B3700 Information Systems Winter 2021 Final Assignment Please answer all questions to demonstrate...

Shubham answered on Apr 11 2021
150 Votes
Question 1
a. Five components of an information system
Microsoft is an organization that uses an ERP system and it is required for understanding the company’s biggest goals and challenges in the area.
Computer Hardware: it is the physical technology that is used for information and it includes the use of peripheral de
vices that works with a computer system. It includes the ability to transmission and receiving the data with the use of a sensor that interacts with the computer system.
Computer Software: The software can be divided into application and system software. The primary piece of the system software is the operating system that is used for managing the operations of hardware (Shakya & Gupta, 2017). It is designed for specific tasks like handling spreadsheets and the creation of documents.
Telecommunication: Telecommunication is the component that is used for connecting hardware to develop a network.
Database and data warehouse: It is the place that is used by the company for the collection of the data.
Human resources: Human elements are required for running the system and it can help in learning for interpreting the information.
b. A most important component of ERP
Telecommunication is an important component of the information system and it provides with the ability for connecting. It provides the crucial infrastructure and allows the development and growth of the organization. It is the components that are used for providing the platform for data that can be exchanged. It is also required for building better relationships with clients and prospects for increasing retention.
Question 2
Market-based analysis has used a technique for the identification of strength of association between products. The analysis is used for the analysis of the purchase that happens together. It provides the relationship between items in the target of the analysis. It is used for cross-selling products. It is the process that is used for looking at relationships with entities and it includes a collection of items (Mayer & Feltus, 2017). This is used for the analysis of examination collection of items for identification that are relevant in different contexts of customer touchpoints.
Two possible ways the business could use this information
1. Market analysis is a useful tool for undertaking the relationship between products that are used for analysis for setting support and confidence. It is used for measuring rules in terms of summarizing the interest. It includes uses visualization techniques for the development of formal multivariate statistics.
2. It is required for understanding the need of the customer and increases the overall spend. It is the key technique that is used for uncovering associations between products with the combination of products. It allows the identification of the relationship between products that people buy (Mayer & Feltus, 2017). It includes the probability for a transaction that contains items for the rule. It can be used for setting a larger set of rules for providing a greater chance for the generation of relevant rules. It can be used as a visualization technique that is used for inspecting the set of rules for the identification of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here