Thursday, May 21, 2009

final question # 5

1.Describe or define VO.

- Virtual Office is a kind of work that you can make with in or without your office. Mobile or remote work-environment equipped with telecommunication links and basic office furniture, but without a fixed office space.

2.Distinguish VO from MIS.

- VO is a kind of job for self or you can do it when your in a vacation or out door even if your at home and you cant do your job at your office you can do send your meetings or business proposal via email. MIS focus its plan about making activities to promote your company or making plans and strategies.

3. Illustrate (give examples) how can improve company's competitive advantage and organizational performance.

- By using this kind of strategy which is VO you can make a meeting through computer programs such as SKYPE or YM we can communicate by using this even if your in vacation. Example if i were the manager of a big company and im in a business trip and i have to make a meeting with my staff at our company i will meet them through computer and make plans with them. By this i can do my responsilbilities with my work and i can even monitor my subordinates.

reference: self understanding and notes, yahoo.com, google.com

Tuesday, May 19, 2009

Final Question #4

1. Describe or define DSS.

- Decision support systems constitute a class of computer-based info including knowledge base system that support decision making activities. Decision support systems are a specific class of computerized information systems that supports business and organizational decision-making activities. A properly-designed DSS is an interactive software-based system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions.

2. Distinguish DSS from MIS.

- DSS always support the MIS, why? Because MIS implied specific allocation, proposed activities and complement schedules while DSS assist the managers in making decisions to solve semi structure problems, support the managers judgement rather than try to replace it. For short DSS always support the managers to have a better and more advance strategues and styles and DSS keeps on supporting MIS.

3. Illustrate (give examples) how can improve company's competitive advantage and organizational performance.

- To have a competitive advantage we should apply the DSS and the MIS becausr by the help of this systens we can make plans and unnovation by developing it and making activities to compete to the other competitors.

Finals Question#3

Identify and describe one company that adopts an MIS. Include in your discussion, how MIS helps and supports the company, its managers and other employees, in their problem solving and decision-making.

- MIS
A computer system designed to help managers plan and direct business and organizational operations. MIS helps the mangers by solving the problems or solving the business problem rather such as the costing problem of a product, service or a business strategy.

- Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization.



Reference: yahoo.com and google.com

Wednesday, May 13, 2009

Finals Question#2

A company may adopt specific computerized database system according to their unique needs after thorough MIS planning. However, it has to be noted that MIS if properly planned, and implemented, benefits can be immeasurable on the other hand, if this is misused, then it may mean information or financial losses and opportunity and resources wasted.

From this, answer the following.

1.0.a Research one international company from the Internet and describe their MIS strategic plan in 1-2 paragraphs.

- There
program trains you to become a business professional who can use computers and other technology to manage information within an organization and enable business success. You will also develop the skills necessary to design information systems that support all the functions and processes of business.

1.0.b Discuss too the impact of this strategic plan on the company's management,
competitors, customers and the company as a whole.

- The impact of this plan is to give the subordinates the skills to use computers and make programs that can make the work or job easily to be done.
Expertise in managing information systems is recognized as critical to ensuring business-value.


2.0.a Evaluate how can this strategic plan be applied to any local company in the Philippines.

- This kind of plan can be applied in the Philippines in the company that needs a high tech strategies that can make there operation faster than before, And
Innovative use of information technology helps organizations gain strategic advantage in different functional areas and apply these technologies to solve business problems in profit and non-profit organizations

2.0.b Discuss too the possible effect on the company.

- The possible effect of this to the company is there job will be more easier and safe to the workers, they will know the procedure and strategies to innovate there company.

3.0.a What is an Accounting Information System?

-
is the system of records a business keeps to maintain its accounting information system. This includes the purchase, sales, and other financial processes of the business. The purpose of an accounting information system is to accumulate data and provide decision makers (investors, creditors, and managers) with information.


3.0.b Identify or list down different accounting information systems used.

-

3.0.c What are the benefits by the management, users and customers derived from these AIS?

-the benefits of AIS is to accumulate data and provide decision makers and it includes the sakes and other financial process. The benefits of this to the users they will know the use of it by the data gathered by ais .

3.0.d Cite any threat or misuse of these AIS by a specific company. How were the threats addressed? What were the damages?

- the damages are about the records and financial processes of your company it can manipulate by a person or a person can change the amounts of your sales and they can destroy the relevant and reliability of financial information.


reference: http://search.yahoo.com

Monday, May 11, 2009

Midterm question #2

1. Research of Philippine company and 1 international company that have employed E-Commerce.

= KCC mall of gensan.

2. Describe how e-commerce operate these companies.

= Kcc mall use e-commerce, by using computer through internet connection, and the payment is on the bank. It is also use as a portal of comments about the problems that they encountered in their company.

3. Identify the benefits, constraints derived by these companies from e-commerce.

= The benefits and constraints derived by these companies from e-commerce are the safety of the customer, fast services, and less time to consume of ordering the products, and etc.It is also costly but the customer will satisfy their needs and wants.

reference: Caballero same explanation one web site google

Sunday, May 10, 2009

Midterm question #3

Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:

1. Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.

- When hackers recently targeted the backbone of the Internet, they caused little damage. But the attempt underscores the risks associated with our reliance on the Web. A virus is a man-made computer program that infects a file or program on our computers. Each time the infected program is run, the virus is also triggered. It spreads itself by infecting other programs on the same computer.

viruses and worm, trojan horses, rootkits, crackers and hackers, spam, Web bugs, child security, Pop-up

2. Case research and analysis:

-
Over a decade of work on the computer virus problem has resulted in a number of useful scientific and technological achievements. The study of biological epidemiology has been extended to help us understand when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus problems of the near future. The goal of this paper is to encourage clever people to work on these problems. To this end, we examine several open research problems in the area of protection from computer viruses. For each problem, we review the work that has been done to date, and suggest possible approaches. There is clearly enough work, even in the near term, to keep researchers busy for quite a while. There is every reason to believe that, as software technology evolves over the next century or so, there will plenty of important and interesting new problems that must be solved in this field.

a. Identify one company that had experienced an attacked from the internet.

- On Thursday, Microsoft blamed a two-hour outage of its major Web sites on network attackers who apparently flooded key systems with extraneous requests for data. The previous day, the giant pointed to a technical error as the cause of a nearly 24-hour blackout of the same sites--sites that have made Microsoft the No. 3 powerhouse of Web content.

-A denial-of-service attack overloads a site's servers with a flood of data, effectively blocking legitimate Web surfers from accessing the site. In this case, the attack was aimed not at the servers, but at the hardware switches that route data to the Web sites--the "single point of failure" pointed out by experts. By flooding these routers with bogus requests for Web pages, the hacker ensured that legitimate requests for pages could not be processed by Microsoft's servers.

b. Describe the attack


The attack - by what is known as a computer "worm" - has interfered with web browsing and e-mail delivery.

-it will slowdown the internet
-it will automatically shut downs your computer
-it will breakdown your PC

c. Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.

-the damages that might cause by the viruses of a computer or the risk and threats.
- The files of the computer might be automatically deleted by the virus or worst all the files of the computer will no longer exist in your P.C. and sometimes you cannot detect the virus it will simly shut downs your computer without touching it, the possible solution in this kind of problem is by putting a licensed anti virus in ur P.C or making a back-up for your files so that if the computer will break down you can reformat it and you will have no worries about your files because you have a back up files or memory disk.

Cite your reference. Google and own explanation

Tuesday, May 5, 2009

Midterm question #1

MNC's are complex organizations however, they dominate the worldwide market. Knowing the background and nature of MNC's, answer the following:

1. Identify the benefits and disadvantages of MNC's.

-the benefits of MNC is to avail low cost of labor or materials to produce, to take advantages of the low wages to produce certain parts, to gain access to any other market areas for which the phil. offers peculiar advantages in view of international political reason, and also to avail the trademark of the company. The disadvantages of the MNC are they can't order products to the other suppliers, slow response of repairing equipments and machineries, and difficult to control.


2. Identify one MNC company and describe its operation.

-the company that uses MNC is the honda motors company because they operate their business not only in local areas but also in international areas globaly.

3. Describe how the parent control/coordinates with its subsidiaries in other countries or region.

-By using this startedies which is the Global Business Strategies accdg. to Jahangir Karimi and Bean Konsynski like multinational strategy, global, international and transnational strategy by acquiring computer of each members.

4. How is IT maximized or used by this MNC?

-IT is maximizing or used by this MNC by communicating and gathering question by the use of computer and internet and by putting MIS,ESS,TPS, and ect.

5. WHat were the weaknesses/problems encountered by this MNC from its environment and global setup?

-the problem that the MNC encountered is by having the manegerial degree loss
the problem to look for and environment and location if its accesible to the people and the loss of equity and the last is the problem of the attitudes and behavior of your environment.

Cite your reference: own explanation and understanding

by: Kenjie John Dabon BSBA