Assignment week 1

Assignmentweek 1

  1. What is the &quotpost-PC era&quot?

Thepost-PC era is the period where people are currently using morewireless devices in accessing information other than theirpersonal computers. These devices have been introduced with an aim ofimproving access of information regardless of the geographicallocation. Example of devices developed by Apple include I-pads,I-phones, which enable the user to access information without thehassle of having to sit next to their personal computers (Ellen,2012).

3.Define the term &quotknowledgeworker.&quotWho coinedtheterm?

Theterm knowledge worker was coined by Peter Drucker in 1959. Hedescribed knowledge workers as people who are able to create, modify,and synthesize knowledge as part of their profession. Druckerdescribed them as people who are trained under formal education andare paid more than their counterparts in other sectors (Ellen,2012).

4.Describeandcontrasttheeconomic,cultural,andtechnologicalchanges occurring in the digitalworld.

Thereare various economic, cultural, and technological changes occurringin the digital world. The digital world has led to an increase ininternational trade, development of international financial models,and labor outsourcing. Due to the digital world, the world has becomea global village where different cultures can mingle, lading tomulticulturalism. The digital world has also led to effectivetechnological changes, which prove low-cost computing frameworks thatenhance communication infrastructure and enhance innovation. The mostcommon feature among these changes is that they have improved howpeople live and made the world a better place. However, too muchinformation has also negatively influenced upcoming generations sincethey can easily get information over the various communicationplatforms from the digital world (Ellen,2012).

6.List and describe severalreasonswhycompaniesarechoosingto outsource businessactivities.

Thereare various reasons that lead to companies having to outsource theiroperations.

Thesereasons include:-

  • Control of costs

  • Freeing internal resources

  • Gaining access to global capabilities

  • Increase probability of revenue increase

  • Reduction of time used for marketing

  • Increasing efficiency

  • Increasing focus on essential activities

  • Compensation for lack of specific skills

Allthese activities are aimed at increasing the operations of anorganization and increase its revenue capabilities.

7.List and contrastseveral challenges ofoperating inthedigitalworld.

Thereare various challenges associated with operating in the digitalworld. These challenges can be broadly categorized intogovernmental, geo-economics, and cultural challenges.

Governmentalchallenges include:-

-Differencesin the political systems of countries

-Regulatory policies such as tariffs and taxes

-Data on protection policies

-differencein the standards used by different countries

-Restriction on personal freedom and internet access

Geo-economicschallenges:-

-differencesin time zones

-differencein infrastructure

-Economicalinstabilities between countries

-Populationdifferences among countries

-salarydifferences and availability of labor

Culturalchallenges:-

-Differencesamong people

-challengesin offer of products between countries

Thesechallenges differ depending on countries and the various policiesthat the country has enacted on the selling of products by foreigncompanies (Ellen,2012).

8.Definetheterm&quotinformationsystems&quotandexplainitsdata,technology, people, andorganizationalcomponents.

Informationsystems refers to a combination of software, hardware, andtelecommunications networks that are built by people in creation,collection, and distribution of useful data. Hardware refers to thephysical components of the computer such as monitor, CPU, or keyboardwhile the software are the programs that are set that command thecomputer to perform certain tasks. A telecommunication network is agroup of several computer systems linked with the equipment forcommunication (Ellen,2012).

9.Define and contrast data, information, andknowledge.

Datais described as raw symbols that have not been formatted and includenumbers and words. Once these numbers and symbols have beenprocessed, they become information and can be represented as reality.In order to use the information presented, it is important to haveknowledge. Knowledge is the capability to understand information andmake informed decisions about the information (Ellen,2012).

10.Describe three or four types of jobs and careeropportunitiesin information systemsandin relatedfields.

Thefollowing list provides the various career opportunities ininformation systems

Systemsanalyst- This is the person responsible in analysis of therequirements in business and selection of systems that attain theneeds.

Programmer-Theperson responsible for testing, debugging, installation, andinstallation of programs.

Databaseadministrator- The person who is responsible for the management ofdatabases and the software used in database management (Ellen,2012).

12.Listanddefinefourbusinessknowledgeand/orskillscorecompetencies.

Systemsanalyst- A business analyst should be able to understand businessprocesses, integration of the various functional areas of anorganization.

Programmer-A programmer should be able to manage projects through planning andcontrolling.

Systemsadministrator- A systems administrator should also be able tounderstand the business processes and the functional areas of theirdepartment (Ellen,2012).

14.List anddefinefive types of information systemsusedinorganizations.

Thefollowing is a list of five types of information systems

Transactionprocessing system- this IS processes daily business events of anorganization

Managementinformation system- Gives detailed information that helps inmanagement of a firm.

Decisionsupport system- Provides analytical tools that help access databasesin support of numerical decision making (Ellen,2012).

16.Discusstheissuessurroundinginformationprivacy,andhowyoucanprotectyourself.

Issuessurrounding information privacy include email privacy andintellectual property. Some users are able to track online users anduse their emails in marketing. Additionally, most users have beenable to download and share digital information without the consent ofthe owner. To protect oneself, one should be able to publish theirprivacy policies on their websites in ensuring that users haveknowledge of the implications of their actions (Ellen,2012).

References

Ellen,M, Joseph, B, &amp Gerrard, C. (2012). ProblemSolving Cases in Microsoft Access and Excel. Boston, Mass: PearsonEducation/Cengage