ImageVerifierCode 换一换
格式:DOC , 页数:12 ,大小:203.78KB ,
资源ID:3900377      下载积分:20 文钱
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,省得不是一点点
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wenke99.com/d-3900377.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(HND商务信息与通讯技术OUTCOME1.doc)为本站会员(hw****26)主动上传,文客久久仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知文客久久(发送邮件至hr@wenke99.com或直接QQ联系客服),我们立即给予删除!

HND商务信息与通讯技术OUTCOME1.doc

1、Mengjie Infonnation and Communications Technology in Business 16/ 10/ 2013Part 1: Identify and evaluate the role of business information in decision-making.Question 1:Strategic ManagementStrategic management is responsible for making decisions that affect whole company. These decisions are generally

2、 very complex and unstructured .They make long-term decisions.Internal: The market trends. If the company can observe the index, it willunderstand the needs of the company , so as to decide it will produce the products to gain more profit.External: the staffing needs. If the mpany can improve employ

3、ee benefits,increase their rewards , it will make employees have more power.Tactical ManagementTactical managers are the middle management. They make medium-term decisions a忏 ecting budgets, monitoring operations, developing policies, obtaining resources. Tactical managers develop tactics to achieve

4、 the overall strategic aims and objectives set by the strategic manager.Internal: The budgets. If the company has a budget process, it will be able to control the budget and control the companys cash position. And the enterprisecapital will become more flexible .External: If the enterprise has the f

5、ixed suppliers, it will guarantee the quality of enterprise products and save operating time, thus enhances the enterprise the competitive ability and increase more profits.Operational ManagementThe operational manager is the first line manager or supervisor. They areInformation and Commurucations T

6、echnology in Business 16/ 10/ 2013Mengjie2responsible for the day-to-day opera甘 ons of the business.Internal: If the enterprise sta仔 attendance record eve叩 day, it can work out a plan for a more perfect plan according to the information, so that employees work more e仔 iciently.External: The customer

7、 needs. If the enterp川 se understand customer needs, its products to attract customers and increase income.Senior ManagementStrategicTacticalMiddle ManagementOperationalQuestion 2:“Enterprise resource planning is a cross-functional enterprise system driven by an integrated suite of so仕 ware modules

8、that supports the basic internalbusiness prosses of a mpany.“ ERP gives a company an integratedreal-time view of i怡 core business processes such as production, order processing, and inventory management, tied together by ERP applications software and a common database maintained by a database manage

9、ment system. ERP systems track business resources (such as cash, raw materials,Mengjie Infonnation and Communications Technology in Business 16/ 10/ 20133and production capacity) and the status of commitments made by the business (such as customer orders, purchase orders, and employee payroll), no m

10、atter which department (manufacturing , purchasing , sales, accounting , and so on) has entered the data into the system. ERP facilitates information f10w between all business functions inside the organization, and manages connections to outside stakeholders. (Wikipedia , 2013)This information syste

11、m would support decision-making at strategic levels. ERP provides support to upper level management to provide them with critical decision making informatio n.This decision support allows the upper level management to make managerial choices that enhance the businessdown the road. ERP also creates a

12、 more agile mpany that better adapts to change. ERPmakes a company more f1exible and less 时 gidly structured so organization components operate more cohesively, enhancing the business-斗 nternallyand externa11y. ERP can greatly improve the quality and efficiency of a busines s. By keeping a companys

13、internal business process running smoothly , ERP can lead to better outputs that benefit the company such as customer service, and manufactu ring.“Customer relationship management is a model for managing a compan ysinteractions with current and future customers.“ It involves using technology to orga

14、nize , automate , and synchronize sales, marketing , customer service , and technical suppo凡 (Wikipedia , 2013)This information system would support decision-making at operational levels. Access control is crucial for the SCM tool. On the one hand, since this is team development , may need to limit

15、certain members of the authority;The sub-project of the especially big projects tend to be involved inoutsourcing , at the end of the alignment stage will involve a lot of different units, need more rights management. Access control , on the other hand,Mengjie Infonnation and Communications Technolo

16、gy in Business 16/ 10/ 20134also reduced the possibility of wrong operation, indirect improve the availability of the SCM tool. SCM tools record programs and files modified tr司 ectory, track change information, make the software development work completed in Baseline (Baseline) gradual wa弘 avoiding

17、the uncontrolled software developme nt situation , make development status in order.“Supply chain management is the management of the flow of goods. It includes the movement and storage of raw materials , work-in-process inventory, and finished goods from point of origin to point of consumption .“ I

18、nterconnected or interlinked networks, channels and node businesses areinvolved in the provision of products and services required by end customers in a supply chain . Supply chain management has been defined as the “design, planning, execution, control , and monito时 ng of supply chain activities wi

19、th the objective of creating net value, building a competitive infrastructure , leveraging worldwide logistics, synchronizing supply with demand and measuring performance globally.“ (Wikipedia , 2013)This information system would support decision-making at operationa川 evels. CRM is not only one in t

20、he face of customer marketing and service department, also is a business departments can share information and resources pla仔o rm for the automation work, in order to maximize the mining and coordination of enterprise resources , expand the survival space and potential. CRM is customer information i

21、nto positive customer relationship and the working process of the cycle. Through the CRM can more trulycomprehensive collection, analysis of customer information , to providecustomers with multi-angle, all-round service.Mengjie Infonnation and Communications Technology in Business 16/ 10/ 20135Quest

22、ion 3:“The Data Protection Act 1998 is a United Kingdom Act of Parliament whichdefines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act itself does not mention privacy, it was

23、enacted to bring UK lawinto line with the EU data protection directive of 1995 which required Member States to protect peoples fundamental rights and freedoms and in particular their right to privacy with respect to the processing of personal data.“(Wikipedia , 2013)1 think it necessa叩 for enterpris

24、es to use the Act.It can better protect corporatedata and information, to reduce a lot of business risk.“The Copyright, Designs and Patents Act 1988 (c. 48), also known as theCDPA, is an Act of the Parliament of the United Kingdom which received Royal Assent on 15 November 1988. It reformulates almo

25、st completely the statutory basis of copyright law (including pe斤。 rming rights) in the United Kingdom, which had, until then, been governed by the Copyright Act 1956 (c. 74). It alsocreates an unregistered design right, and contains a number of modificatons to the law of the United Kingdom on Regis

26、tered Designs and patents.“ (Wikipedia , 2013)1 suggest it necessary for enterprises to use the Act. It can help enterp川 ses tobetter protect and increase their own interests.Mengjie Infonnation and Communications Technology in Business 16/ 10/ 20136Part 2: Describe and evaluate data communication s

27、ystems and new ICT innovations.Question 1: Compare and contrast three data communication systems.A local area network (LAN) is a network that connects computers within a limited geographical district, usually within an independent office or building.Wide Area Network (WAN) , also called Remote Compu

28、ter Network, the scope of its largest, generally can be from a few tens of kilometers to tens of thousands of miles. Established a national or international network is a widearea network. In a wide area network, used for the transmission of communications devices and transmission medium can be provi

29、ded by the telecom sector.(NWPU, 2013)“The Internet is a global system of interconnected computer networks that useMengjie Infonnation and Communications Technology in Business 16/ 10/ 2013the standard Internet protocol suite (TCA斤 P) to serve several billion users worldwide. It is a nefwork of nefw

30、orks that consists of millions of private, public, academic , business, and government networks, of local to global scope, that are linked by a broad array of electronic , wireless and optical networkingtechnologies. The Internet carries an extensive range of information resourcesand services, such

31、as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to suppo时 email , and peer-to-peer networks.“ For example , Microsoft Service Network and Email passed through the Internet.(Wikipedia , 2013)Compare: A local area network is a network within a limited distance u

32、suallyon one geographical site. The Wide Area Network is larger than local areanetwork. The Internet is global, the most wide range.(IT168, 2011)The three data communication systems have themselves advantages , so it should be combined with each other, the development of enterprises will be better.Q

33、uestion 2: Describe two benefits for each of the three data communication systems for BW.Local area networ k: Low-Ievel proto 1 is Simple. In the local area network (LAN), due to theMengjie Infonnation and Communications Technology in Business 16/ 10/ 20138short distance and time delay is small, low

34、 cost, high transmission rate, high reliability, so the channel utilization has not considered the main factors, so the low-Ievel protocol is simple. Because of the close range transmission , so the error rate is ve叩 low.Wide Area Network: Its transmission speed is betler and transmits large amounts

35、 of data. Its transmission range is wider.Internet: The Internet provides abundant information resources and application services.Not only it can transmit the information such as text, voice, image, and thousands of miles away, people can car叩 out real-time conversations over the Intemet, online, et

36、c. The Intemet is the worlds most open computer network. Every computer as long as the suppo时 ofTCPIlP protocol 臼 n be connected to the Internet, to realize information resources sharing , etc. (100XUEXI, 2010)Question 3: Identify and evaluate three threats to security of networked information and t

37、he securityprocedures that would be appropriate for BW to adopt. Fire: Fire is to point to in time and space caused by the burning out of control. Among various kinds of disaster, fire is the most often, the most common threat to public safety and social development of one of the majordisasters.Ente

38、rprises should be installed in the indoor fire water spray nozzle; policy formulation about Smoking is prohibited and set up evacuation passageway.Mengjie Infonnation and Communications Technology in Business 16/ 10/ 20139This can better reduthe possibility of fire. Theft: In common usage, theft is

39、the taking of another persons propertywithout that persons permission or consent with the intent to deprive therigh町 ul owner of it.Enterprises should hire security guards and install cameras at indoors, so that we can better avoid the threat of the thief. Viruses : A computer virus is a type of mal

40、ware that, when execute d, replicates by inserting copies of itself (possibly modified) into other computer program s, data files, or the boot sector of the hard drive; whenthis replication succeeds , the a仔 ected areas are then said to be “infected“Enterprises should employ network security enginee

41、r and set up the firewall to prevent virus intrusion.Questio 4: Identify and evaluate three ! ITC innovations in terms of their relevance to the needs ofBW, their managers and staff.Voice over Internet Protocol: “Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the

42、delivery of voice communications and multimedia sessions over Internet Protocol (IP) network s, such as the Internet. Other terms commonly associated with VolP are IP telephony , Internet telephony , voice over broadband (VoBB), broadband telephony , IP communications , and broadband phone service .

43、“ (Wikipedi a,2013) The greatest benefit of Voice over Internet Protocol is ve叩 cheap. This will save money for the company. Voice over Internet Protocol services is varied. Voice over Internet Protocol transmission media is diversification .Mengjie Infonnation and Communications Technology in Busin

44、ess 16/ 10/ 201310Cloud computing: “Cloud, or something being in the cloud, is an expressionused to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.“ (Wikipedia , 2013) Secur

45、it y, cloud computing provides the most reliable and secure datastorage center; users dont have to worry about data loss, such as virus invasion of trouble. Convenience , cloud computing equipment requirements for clients is thelowest, is the most convenient for you to use.Tencent QQ: Tencent QQ is

46、tencent developed internet-based instant messaging (1M) software. Support tencent QQ online chat, video phone,point-to-point breakpoint continuingly files, share files, network hard disk,custom panel, QQ, E-mail and other functions , and can be connected to the mobile communication terminal and other communication methods. Enterprises can use QQ to communicate with staff , other enterprises . Information transfer fast, Sending and receiving message immediately. Enterprises can use voice and video chat face to face, the function is very comprehensive. And these are free .

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。