SlideShare a Scribd company logo
1 of 26
Muhammad Danish | www.knowledgedep.blogspot.com
1 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
MUHAMMAD DANISH
INFORMATION
MANAGEMENT SYSTEM
2ND ASSIGNMENT
BY: MUHAMMAD DANISH
ROLL # 119467
THIS ASSIGNMENT CONTAINS 10 COMPLETELY SOLVED QUESTION OF MIS AND IT’S
NOT CONTAIN IRRELEVANT ITEMS. IT IS PREPARED AFTER READ COMPLETELY.
Muhammad Danish | www.knowledgedep.blogspot.com
2 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 1- What are the main telecommunications, transmission media and
types of networks?
Answer:
TRANSMISSION MEDIA:
Transmission media is the material pathway that connects computers, different kinds of
devices and people on a network. It can be compared to a superhighway carrying lots of
information. Transmission media uses cables or electromagnetic signals to transmit data.
TELECOMMUNICATION MEDIA:
Overall though, a basic telecommunication system consists of three main parts that are
always present in some form or another: A transmitter that takes information and converts it to a
signal. A transmission medium, also called the "physical channel" that carries the signal.
TYPES OF NETWORKS:
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose. The size of a network can be expressed by
the geographic area they occupy and the number of computers that are part of the network.
Networks can cover anything from a handful of devices within a single room to millions of
devices spread across the entire globe.
Some of the different networks based on size are:
1. Personal Area Network:
A personal area network, or PAN, is a computer network organized around an
individual person within a single building. This could be inside a small office or residence. A
typical PAN would include one or more computers, telephones, peripheral devices, video
game consoles and other personal entertainment devices.
If multiple individuals use the same network within a residence, the network is
sometimes referred to as a home area network, or HAN. In a very typical setup, a residence
will have a single wired Internet connection connected to a modem. This modem then
provides both wired and wireless connections for multiple devices. The network is typically
managed from a single computer but can be accessed from any device.
This type of network provides great flexibility. For example, it allows you to:
 Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
 Upload a photo from your cell phone to your desktop computer.
Muhammad Danish | www.knowledgedep.blogspot.com
3 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
 Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house without
having called it by its name.
2. Local Area Network:
A local area network, or LAN, consists of a computer network at a single site,
typically an individual office building. A LAN is very useful for sharing resources, such as
data storage and printers. LANs can be built with relatively inexpensive hardware, such as
hubs, network adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. A LAN typically relies mostly on wired connections
for increased speed and security, but wireless connections can also be part of a LAN. High
speed and relatively low cost are the defining characteristics of LANs.
LANs are typically used for single sites where people need to share resources among
themselves but not with the rest of the outside world. Think of an office building where
everybody should be able to access files on a central server or be able to print a document to
one or more central printers. Those tasks should be easy for everybody working in the same
office, but you would not want somebody just walking outside to be able to send a document
to the printer from their cell phone! If a local area network, or LAN, is entirely wireless, it is
referred to as a wireless local area network, or WLAN.
3. Metropolitan Area Network:
A metropolitan area network, or MAN, consists of a computer network across an
entire city, college campus or small region. A MAN is larger than a LAN, which is typically
limited to a single building or site. Depending on the configuration, this type of network can
cover an area from several miles to tens of miles. A MAN is often used to connect several
LANs together to form a bigger network. When this type of network is specifically designed
for a college campus, it is sometimes referred to as a campus area network, or CAN.
4. Wide Area Network:
A wide area network, or WAN, occupies a very large area, such as an entire country
or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs.
The Internet is the best-known example of a public WAN.
Muhammad Danish | www.knowledgedep.blogspot.com
4 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 2- How does the Internet and Internet technology work, and how do
they support communication and e-business?
Answer:
INTERNET?
The Internet is a global wide area network that connects computer systems across the
world. It includes several high-bandwidth data lines that comprise the Internet "backbone."
These lines are connected to major Internet hubs that distribute data to other locations, such as
web servers and ISPs.
It’s also the world’s largest implementation of client/server computing and
internetworking, linking millions of individual networks all over the world. This global network
of networks began in the early 1970s as a U.S. Department of Defense network to link scientists
and university professors around the world.
INTERNET TECHNOLOGIES?
Internet refers to network of networks. In this network each computer is recognized by a
globally unique address known as IP address. A special computer DNS (Domain Name Server)
is used to give name to the IP Address so that user can locate a computer by a name.
HOW DO WORK INTERNET AND SUPPORT COMMUNICATION:
It depends on two models:
1. Clint / Server Model:
A client-server network is designed for end-users, called clients, to access resources such
as files, songs, video collections, or some other service from a central computer called a
server. A server's sole purpose is to do what its name implies - serve its clients! You may
have been using this configuration and not even have known it. Have you ever played Xbox
Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the
network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video,
and game demos.
How to Work:
Imagine a customer sitting at a restaurant. He is waiting for the server to come by and take
his order. The same rules apply in a client-server network; the client, which can be a laptop,
desktop, a Smartphone, or pretty much any computerized device, can make a request from
the server.
Muhammad Danish | www.knowledgedep.blogspot.com
5 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
The client uses the network as a way to connect with and speak to the server. Just as the
customer speaks to his server, the client uses the network to send and receive
communications about its order, or request. The server will take the request and make sure
that the request is valid. If everything checks out okay, then the server will fetch the request
and serve the client.
The server can make a request from the client as well. It may want to check up on the status
of the client, or ask if it has received any security patches, or if it still needs resources from
the server. If not, the server will close the connection in order to free up network traffic.
Can you imagine a server standing next to a customer who just stares at the menu without
ordering anything? After 15 minutes, it would be a good idea for the server to leave and
check on other customers. In both cases, the server moves on to other clients as needed.
2. TCP/IP Model:
The Internet works by using a protocol called TCP/IP, or Transmission Control
Protocol/Internet Protocol. TCP/IP is the underlying communication language of the Internet.
In base terms, TCP/IP allows one computer to talk to another computer via the Internet
through compiling packets of data and sending them to right location.
For those who don’t know, a packet, sometimes more formally referred to as a
network packet, is a unit of data transmitted from one location to another. Much like the atom
is the smallest unit of a cell, a packet is the smallest unit of transmitted information over the
Internet.
E-BUSINESS:
E-Business (e-Business), or Electronic Business, is the administration of conducting
business via the Internet. This would include the buying and selling of goods and services, along
with providing technical or customer support through the Internet.
Example of functionality of electronic interchange of information in retail shop:
1. Buyer prepares the electronic order in its information system (IS).
2. Buyer is sending electronic order to the supplier and supplier is obtaining the order
directly into its information system.
3. Based on the electronic order, supplier is preparing the ordered goods and the
electronic bill of delivery and is sending this document to the buyer. Electronic bill of
delivery may contain the structure of the consignment and other data on delivered goods
(date of use, number of series and lots etc.)
4. Buyer is receiving all these details in its information system. At the take over and
acceptance of the goods he is confirming the electronic delivery bill and is sending to the
supplier the electronic certificate of receipt.
5. Supplier is issuing the electronic invoice based on the received electronic certificate of
receipt.
Muhammad Danish | www.knowledgedep.blogspot.com
6 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
6. Buyer is verifying the electronic invoice with the confirmed bill of delivery and is
sending he electronic order for payment to the bank.
7. Bank is sending electronic financial statements of performed transactions to both
partners, i.e. to the buyer and to the supplier.
Muhammad Danish | www.knowledgedep.blogspot.com
7 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 3- What are the principal technologies and standards for wireless
networking, communications, and Internet Access?
Answer:
PRINCIPAL TECHNOLOGIES:
Principal Technologies is a staffing agency in Oklahoma City specializing in IT,
Accounting and Engineering recruitment. Principal Technologies has job openings of all types,
including contract or temporary jobs, contract-to-hire and direct hire permanent jobs in
Oklahoma City and across the state.
PRINCIPLE TECHNOLOGY:
Cellular networks are evolving toward
 High-speed,
 High-bandwidth,
 Digital packet-switched transmission.
Broadband 3G networks are capable of transmitting data at speeds ranging from 144 Kbps to
more than 2 Mbps. 4G networks capable of transmission speeds that could reach 1 Gbps are
starting to be rolled out.
STANDARDS FOR WIRELESS NETWORK:
Major cellular standards include
1. Code Division Multiple Access (CDMA),
Code division multiple access (CDMA) is a channel access method used by
various radio communication technologies. CDMA is an example of multiple access,
where several transmitters can send information simultaneously over a single
communication channel.
2. Global System for Mobile Communications (GSM),
GSM (Global System for Mobile Communications, originally Group Special
Mobile) is a standard developed by the European Telecommunications Standards
Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular
networks used by mobile phones, first deployed in Finland in July 1991.
Standards for wireless computer networks include:
Muhammad Danish | www.knowledgedep.blogspot.com
8 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
 Bluetooth (802.15) for small personal area networks (PANs), Bluetooth is a wireless
technology standard for exchanging data over short distances from fixed and mobile
devices, and building personal area networks
 Wi-Fi (802.11) for local area networks (LANs), Wi-Fi is the name of a popular wireless
networking technology that uses radio waves to provide wireless high-speed Internet and
network connections. A common misconception is that the term Wi-Fi is short for
"wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase
that means IEEE 802.11x.
 WiMax (802.16) for metropolitan area networks (MANs), WiMAX is a wireless
technology put forth by the WiMAX Forum that is one of the technologies that is being
used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers. Its formal name
is IEEE standard 802.16.
Muhammad Danish | www.knowledgedep.blogspot.com
9 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 4- What is the business value of security and control?
Answer:
WHAT IS BUSINESS VALUE?
Business value is an informal term that includes all forms of value that determine the
health and well-being of the firm in the long run. Business value expands concept of value of the
firm beyond economic value (also known as economic profit, economic value added, and
shareholder value) to include other forms of value such as employee value, customer value,
supplier value, channel partner value, alliance partner value, managerial value, and societal
value. Many of these forms of value are not directly measured in monetary terms.
BUSINESS VALUE OF SECURITY AND CONTROL
Lack of sound security and control can cause firms relying on computer systems for their
core business functions to lose sales and productivity. Information assets, such as confidential
employee records, trade secrets, or business plans, lose much of their value if they are revealed
to outsiders or if they expose the firm to legal liability. New laws, such as HIPAA, the Sarbanes-
Oxley Act, and the Gramm-Leach-Bliley Act, require companies to practice stringent electronic
records management and adhere to strict standards for security, privacy, and control. Legal
actions requiring electronic evidence and computer forensics also require firms to pay more
attention to security and electronic records management.
Company systems often house confidential information about individuals' taxes, financial
assets, medical records, and job performance reviews. They may contain information on
corporate operations, trade secrets, new product development plans, and marketing strategies.
Inadequate security and control may also create serious legal liability.
Businesses must protect not only their own information assets but also those of
customers, employees, and business partners. Recent U.S. government regulations mandate the
protection of data from abuse, exposure, and unauthorized access, and include:
 The Health Insurance Portability and Accountability Act (HIPAA) of 1996, which
requires members of the healthcare industry to retain patient information for six years and
ensure the confidentiality of those records
 The Gramm-Leach-Bliley Act, which requires financial institutions to ensure the
security and confidentiality of customer data
 The Sarbanes-Oxley Act, which imposes responsibility on companies and their
management to use internal controls to safeguard the accuracy and integrity of financial
information
Firms face new legal obligations for electronic records management and document retention as
well as for privacy protection. Electronic records management (ERM) consists of policies,
Muhammad Danish | www.knowledgedep.blogspot.com
10 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
procedures, and tools for managing the retention, destruction, and storage of electronic records.
Security, control, and electronic records management have become essential for responding to
legal actions. Much of the evidence today for stock fraud, embezzlement, theft of company trade
secrets, computer crime, and many civil cases is in digital form. Legal cases today increasingly
rely on evidence represented as computer data stored on portable floppy disks, CDs, and
computer hard disk drives, as well as in e-mail, instant messages, and e-commerce transactions
over the Internet. E-mail is currently the most common type of electronic evidence.
An effective electronic document retention policy ensures that electronic documents, e-mail, and
other records are well organized, accessible, and neither retained too long nor discarded too
soon.
Computer forensics is the scientific collection; examination, authentication, preservation, and
analysis of data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. Electronic evidence can reside on
computer storage media in the form of computer files and as ambient data, which are not visible
to the average user.
Muhammad Danish | www.knowledgedep.blogspot.com
11 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 5- What are the most important tools and technologies for
safeguarding information resources?
Answer:
WHAT IS SAFEGUARDING INFORMATION?
Safeguarding is the action that is taken to promote the welfare of children and protect
them from harm. Safeguarding means: protecting children from abuse and maltreatment.
Preventing harm to children's health or development. Taking action to enable all children and
young people to have the best outcomes.
TOOLS:
HSU's information security infrastructure comprises the tools and equipment the campus
employs to protect University-owned computers and networks. This infrastructure is designed to
be as unobtrusive as possible while still maintaining a high degree of protection against malware,
hackers, and data breaches:
1. Campus border firewall:
A system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in hardware, software, or a combination of both.
2. Encryption:
Encryption converts data into a secure form that can be safely moved around and
helps HSU meet its obligations under various data protection laws and policies. One of the
most effective ways to protect personally identifiable or other confidential information stored
on a computer is to encrypt it.
3. Network Access Control (NAC):
Designed to proactively prevent malware or hackers from gaining access to the
network. At HSU, this is tackled at two levels: the network perimeter, where the HSU
networks meet the Internet, and the individual system level.
4. Password management:
Every student, staff, and faculty member is provided with a unique HSU User Name
when they officially enter the university population. Each individual must also create (and
periodically change) their own secure password, which is used in combination with their
User Name to permit access to the relevant systems based on their university role.
5. Protected Information Discovery Tools:
Muhammad Danish | www.knowledgedep.blogspot.com
12 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Personally Identifiable Information (PII) is an umbrella term for information linked to
an individual's identity, such as Social Security Numbers, drivers' license data, and credit
card or bank account information and which can be used to facilitate identity theft. PII
Discovery Software is used to scan University-owned computers to assist in identifying such
data so the appropriate action can be taken to secure it.
6. Secure wireless:
Eudora is the secure wireless network used at HSU; it provides all the benefits of the
regular wireless service - anytime, anywhere access to the Internet - with additional security.
Staff, faculty, and graduate students can access more of the wired network, including
departmental file shares and wired printers, enabling them to work productively anywhere on
campus using personal or University-owned devices.
7. Virtual Private Network (VPN):
A secure communication channel that enables staff and faculty to access their office
computers from off campus via a secure web interface.
8. Virus protection tools:
Microsoft protection is installed and kept updated on all HSU-owned computers
automatically; any personally owned computer connecting to the HSU wired or wireless
networks must be protected by one of the HSU-recommended antivirus programs.
9. Vulnerability Scanning:
Vulnerability scans provide critical information to the Information Security Office
and management as part of the risk assessment process for campus systems.
TECHNOLOGY:
1. Third Party - Contract Language, Guidelines, Policies & More:
CSU policies provides for direction and support for managing third party relationship
and for granting access to various HSU resources and third party contract language.
2. Mobile Device Security:
Do's and don'ts to keep your mobile devices and the data stored on them secure
against hacking and other security issues.
3. Online Cloud Storage and Email.
Frequently Asked Questions and Answers relating to storing data in the cloud shares
and sending email and attachments securely.
Muhammad Danish | www.knowledgedep.blogspot.com
13 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
4. Information Security Training.
HSU provides Information Security Awareness online and on-campus training
materials designed to provide staff and faculty with the knowledge they need to secure
information resources.
5. Secure Disposal of Paper / Shredding and Electronic Media.
Any data storage medium - paper, computer, scanner, copier, hard drive, tablet,
Smartphone - should be treated as if it contained protected data and must be securely wiped
prior to transfer or disposal.
Muhammad Danish | www.knowledgedep.blogspot.com
14 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 6- How do supply chain management systems coordinate planning,
production, and logistics with suppliers?
Answer:
SUPPLY MANAGEMENT
A broad term describing the various acts of identifying, acquiring and managing the
products and/or resources needed to run a business or other organization. These include physical
goods as well as information, services and any other resources needed.
SUPPLY AND CHAIN MANAGEMENT:
Supply chain management (SCM) is the oversight of materials, information, and finances
as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer.
Supply chain management involves coordinating and integrating these flows both within and
among companies. It is said that the ultimate goal of any effective supply chain management
system is to reduce inventory (with the assumption that products are available when needed). As
a solution for successful supply chain management, sophisticated software systems with Web
interfaces are competing with Web-based application service providers (ASP) who promise to
provide part or all of the SCM service for companies who rent their service.
HOW DO SUPPLY CHAIN MANAGEMENT SYSTEMS COORDINATE PLANNING,
PRODUCTION, AND LOGISTICS WITH SUPPLIERS?
1. Adapt Supply Chain to Customer's Needs:
Both business people and supply chain professionals are trained to focus on the
customer's needs. In order to understand customer better, we divide customers into a different
group and we call it "segmentation". The most primitive way to segment customer is ABC
analysis that groups customer based on the sales volume or profitability. Segmentation can
also be done by product, industry and trade channel.
2. Customize Logistics Network:
When you segment a customer based on the service needs, you may have to tailor the
different logistics networks to serve different segment. However, this principle doesn't hold
true for all situations.
For example, if you were a contract manufacturer in China, you might already have
different logistics networks for different customers. Each customer in US or EU might
already control the source of raw materials, ask you to provide dedicated production lines,
nominate 3pl companies and air/sea carriers. So, logistics network design is a kind of
initiative driven mainly by customer.
Muhammad Danish | www.knowledgedep.blogspot.com
15 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
3. Align Demand Planning Across Supply Chain:
Supply chain practitioners are taught to share the demand data with trading partners
so nobody has to keep the unnecessary stock. In general, this principle holds true. But in the
reality, only Walmart is actively sharing the demand data to trading partners.
There is a very interesting paper "Top-Down Versus Bottom-Up Demand Forecasts:
The Value of Shared Point-of-Sale Data in the Retail Supply Chain" by Williams and Waller
2011, the result of research found that,
 -If you make the demand forecast based on SKU/Customer level, using your own
historical order data is more accurate than using the POS data you get from retailers
 If you make the demand forecast based on SKU/Store level, using the POS data you get
from retailers is more accurate than using your own historical order data
The implication is that the absence of demand sharing is not necessary bad. But when
you got the demand data from trading partners, you MUST use it the right way.
4. Differentiate Products Close to Customer:
Dell keeps components and assemble them only after customer places the order in
order to increase the product variety. This principle is still true, but, there is another principle
that you should consider.
"Standardization" is in the opposite polarity of "Differentiation". For example, some
cosmetics manufacturers formulate products and choose a packaging and labeling that
complies with the regulations of multiple countries in Asia. So they only make one SKU that
can be sold in 15 countries instead of 1 SKU/Country. By standardizing product
appropriately, they can drive the cost down drastically due to the economy of scale. So
standardization is something that you should also consider.
5. Outsource Strategically:
This is the principle that stands the test of time. In short, don't ever outsource your
core competency.
6. Develop IT that Support Multi-Level Decision Making:
If you search Google for the term "critical success factor erp", you'll find lots of
information about how to implement ERP successfully. My opinion is that an IT project
shouldn't be done in the isolation; business process reengineering is something that you have
to do before implementing an IT project. This will equip you with the full understanding
about process deficiencies then you can determine what kind of technology that you really
need.
Muhammad Danish | www.knowledgedep.blogspot.com
16 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
7. Adopt Both Service and Financial Metrics:
Anderson et al suggested that the activity based costing (ABC) be implemented so
you can determine customer's profitability. However, there is the interesting twist about the
ABC concept.
In 1987, Robert Kaplan and W Bruns defined the activity based costing concept in his
book "Accounting and Management: A Field Study Perspective". However, in 2003 Robert
Kaplan said that it's difficult to maintain an ABC costing model to reflect the changes in
activities, processes, products and customers. Then, he introduced the refined concept called
"Time Driven Activity Based Costing".
Muhammad Danish | www.knowledgedep.blogspot.com
17 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 7- How do customer relationship management systems help firms
achieve customer intimacy?
Answer:
MANAGEMENT SYSTEM?
A management system is the framework of policies, processes and procedures used by an
organization to ensure that it can fulfill all the tasks required to achieve its objectives
Management Systems are systematic frameworks designed to manage an organization's
policies, procedures and processes and promote continual improvement within.
HOW DO CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS HELP FIRMS
ACHIEVE CUSTOMER INTIMACY?
1. Increasing Customer Touch points:
In the digital marketing age, there are new ways to reach your customers every day.
The more opportunities to interact with customers, the better. Here are several examples of
traditional and digital touch points that will help to grow customer intimacy:
 Sale papers
 Customer service
 Call centers
 Direct mail
 Emails
 Apps
 Blogs and content
 Search engine queries
 Websites
 Blogs
 Events
 Sponsors
 Mobile messaging
 SMS
 Store or Facility appearance
 Packaging
 Employees
2. Customer Service Management:
Service is the key to earning customer loyalty. Consistent and quality service, quick
response times, and open channels of communication result in better customer experiences
and potential increases in sales exceeding 300%. When customers know they’re important, it
shows.
Muhammad Danish | www.knowledgedep.blogspot.com
18 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
3. Social Networking:
Bring that personal touch to your platform by linking your business to Face book,
Twitter, Instagram, LinkedIn, and other social media platforms. Customers can directly
respond to events and promotions, share your brand with their contacts, and generate
excitement in others about your products and services.
4. Data Integration:
As customers engage with products and services, companies can gather data to better
serve their needs. Surveys, email campaigns, and cross-promotional social events can help
fine-tune customer targeting and segmentation. The more focused a campaign becomes, the
more customers will feel connected to the brand.
5. Management Solutions and Leadership:
Your CMO has a prime spot as a leader in driving customer intimacy initiatives.
Working with strategic consultants allows for team-building across an organization. With
clearly defined roles and objectives, it’s easier to serve customers and delegate
responsibilities.
6. Rewarding Employees:
Forget the old top-down approach to marketing strategies. Highly engaged
employees at any level that are excited about your products and services should be
rewarded. Enthusiasm strategies like spiff programs, incentive programs, and bonuses not
only motivate employees, but it gets them more involved with decision making and product
familiarity. Customer intimacy revolves around employee knowledge at every touch point.
7. Customer segmentation:
In CRM, segmentation is used to categorize customers, according to some similarity,
such as industry, job or some other characteristics, into similar groups. Although these
characteristics, can be one or more attributes. It can be defined as a subdividing the
customers based on already known good discriminator.
8. Improve customer knowledge:
Firms can make and improve products and services through the information from
tracking (e.g. via website tracking) customer behaviour to customer tastes and needs. CRM
could contribute to a competitive advantage in improving firm's ability of customer
information collecting to customize products and services according to customer needs.
Muhammad Danish | www.knowledgedep.blogspot.com
19 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 8- What are the unique features of e-commerce, digital markets, and
digital goods?
Answer:
E-COMMERCE:
The buying and selling of products and services by businesses and consumers through an
electronic medium, without using any paper documents. E-commerce is widely considered the
buying and selling of products over the internet, but any transaction that is completed solely
through electronic measures can be considered e-commerce. E-commerce is subdivided into
three categories: business to business or B2B (Cisco), business to consumer or B2C (Amazon),
and consumer to consumer or C2C (eBay) also called electronic commerce.
Electronic commerce (ecommerce) is a type of business model, or segment of a larger
business model, that enables a firm or individual to conduct business over an electronic network,
typically the internet. Electronic commerce operates in all four of the major market segments:
business to business, business to consumer, consumer to consumer and consumer to business. It
can be thought of as a more advanced form of mail-order purchasing through a catalog. Almost
any product or service can be offered via ecommerce, from books and music to financial services
and plane tickets.
Digital market:
The marketing of products or services using digital channels to reach consumers. The key
objective is to promote brands through various forms of digital media. Digital marketing extends
beyond internet marketing to include channels that do not require the use of the internet.
Digital Goods:
In electronic commerce, digital goods are a general phrase used to describe any goods
that are stored, delivered and used in its electronic format. Digital goods are shipped
electronically to the consumer through email or download from the Internet.
SEVEN UNIQUE FEATURES OF E-COMMERCE:
There are some features of E-commerce, which express the importance of
electronic commerce:
1. Ubiquity:
The traditional business market is a physical place, access to treatment by means of
document circulation. For example, clothes and shoes are usually directed to encourage
customers to go somewhere to buy. E-commerce is ubiquitous meaning that it can be
Muhammad Danish | www.knowledgedep.blogspot.com
20 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
everywhere. E-commerce is the worlds reduce cognitive energy required to complete the
task.
2. Global Reach-:
E-commerce allows business transactions on the cross country bound can be more
convenient and more effective as compared with the traditional commerce. On the e-
commerce businesses potential market scale is roughly equivalent to the network the size of
the world's population.
3. Universal Standards:
E-commerce technologies is an unusual feature, is the technical standard of the
Internet, so to carry out the technical standard of e-commerce is shared by all countries
around the world standard. Standard can greatly affect the market entry cost and considering
the cost of the goods on the market. The standard can make technology business existing
become more easily, which can reduce the cost, technique of indirect costs in addition can set
the electronic commerce website 10$ / month.
4. Richness:
Advertising and branding are an important part of commerce. E-commerce can
deliver video, audio, animation, billboards, signs and etc. However, it's about as rich as
television technology.
5. Interactivity-
Twentieth Century electronic commerce business technology is called interactive, so
they allow for two-way communication between businesses and consumers.
6. Information Density-
The density of information the Internet has greatly improved, as long as the total
amount and all markets, consumers and businesses quality information. The electronic
commerce technology, reduce the information collection, storage, communication and
processing cost. At the same time, accuracy and timeliness of the information technology
increases greatly, information is more useful, more important than ever.
7. Personalization:
E-commerce technology allows for personalization. Business can be adjusted for a
name, a person's interests and past purchase message objects and marketing message to a
specific individual. The technology also allows for custom. Merchants can change the
product or service based on user preferences, or previous behavior.
Muhammad Danish | www.knowledgedep.blogspot.com
21 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 9- What is the role of m-commerce in business, and what are the most
important m-commerce applications?
Answer:
MEANT BY M COMMERCE:
M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as cellular telephone and personal digital assistants (PDAs).
Known as next-generation e-commerce, m-commerce enables users to access the Internet
without needing to find a place to plug in.
M-commerce is especially well-suited for location-based applications, such as finding
local hotels and restaurants, monitoring local traffic and weather, and providing personalized
location-based marketing. Mobile phones and handhelds are being used for mobile bill payment,
banking, securities trading; transportation schedule updates, and downloads of digital content,
such as;
Music,
Games,
Video clips.
Documents
Assignments
Articles
Lectures
Movies
Wallpapers
M-commerce requires wireless portals and special digital payment systems that can
handle micropayments. The GPS capabilities of smart phones make possible geoadvertising,
geosocial, and geoinformation services.
IMPORTANCE OF M-COMMERCE IN BUSINESS
1. Boosting retail activity:
In the context of economic difficulties, ecommerce solution with smart phones and
software applications plays an important role in retail market, creating close relationship
between consumers, retailers and brand merchandise through features, to get the success in
both earning high profit and providing great mobile shopping experience. As a result,
Investments in mobile platforms for B2C transactions are defined as strategic investment
direction in the future, as indicated in the proportion of investment in mobile platforms
accounted for 68% of the investing in research and new technology platforms.
Muhammad Danish | www.knowledgedep.blogspot.com
22 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
2. Convenience of electronic payment services on mobile:
19% of people surveyed knew about the payment services on mobile, 10% expressed
interest to learn and to use mobile payment services. By applying necessary plug-in,
payment can be transferred easier and more secure than ever. Due to the fast development,
this type of commerce also supports almost all popular payment method for customers to pay
bills electronically, purchase prepaid cards as mobile phone cards to solve transactions
complex.
3. Sales of digital content on mobile devices:
Besides retail, digital content is a rich resource that firms can use with mobile
commerce.
By strengthening the convenience function of mobile devices, sellers can sell the content and
buyers can use anytime they want. Users pay directly for each digital content or registered
user to use the service online digital content. It can't be denied that Mobile Commerce is the
very rapidly growing field in today's scenario because of unique characteristics and the
outstanding advantages of M-Commerce. There are all kind of treads such as business-to-
consumer, business-to- business and consumer-to-consumer in M-commerce.
4. Convenience:
With just a few clicks on mobile devices, customers can already do
shopping, banking, download media files...and more than that. M-commerce also benefits
retailers by many of their outstanding features compared with responsive website and mobile
site.
5. Flexible Accessibility:
User can be accessible via mobile devices and at the same time be accessible
online too through logging on to various mobile messengers and other networking platforms.
On the other hand, the user may also choose not to be accessible by shutting down
his mobile device, which at times can be a good thing.
6. Easy Connectivity:
As long as the network signal is available, mobile devices can connect and do
commerce transactions not only mobile to mobile but also mobile to other devices. No need
for modem or WI-FI connectivity set up.
7. Personalization:
Each mobile device is usually dedicated to a specific user so that it is personal. Users
can do whatever they want with their handheld devices: modify the wallpaper, change view
settings or modify contact information as you send emails or e-payments.
Muhammad Danish | www.knowledgedep.blogspot.com
23 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
8. Time Efficient:
Doing M-Commerce transactions do not require the users to plug anything like
personal computer or wait for the laptop to load.
Muhammad Danish | www.knowledgedep.blogspot.com
24 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 10- What are the business benefits of using intelligent techniques for
knowledge management?
Answer:
BUSINESS:
A business (also known as an enterprise, a company or a firm) is an organizational entity
involved in the provision of goods and services to consumers.
KNOWLEDGE MANAGEMENT:
Knowledge management (KM) is the process of creating, sharing, using and managing
the knowledge and information of an organization. It refers to a multi-disciplinary approach to
achieving organizational objectives by making the best use of knowledge.
THE BUSINESS BENEFITS OF USING INTELLIGENT TECHNIQUES FOR
KNOWLEDGE MANAGEMENT
Business benefit can be defined as an outcome of an action or decision that contributes
towards meeting business objectives. There are some benefits of using Intelligent Techniques are
following:
1. Supply of Goods and Services:
Business provides goods and services to the society. Business produces different
products, which are sold or supplied to the society. The creator created and creates things, but
processing, the individuals or business does reprocessing and preservation and ultimately
new utility is created. So business provides goods and services to the society.
2. Harnessing Capital and other Resources in Production:
Business collects the drifts of savings from different individuals, especially through
banks and financial institutions and employs those in productive activities and, thus,
harnesses capital in economic activities to utilize natural resources in utility creation or value
addition, and consequently, helps production, employment and resource utilization.
3. Self-employment and Provision of Employment:
Business provides employment to the businessman. Further, in the production,
distribution and services of business a large number of individuals are employed by the
business organization and income generation occurs for them and others.
4. Preservation of Natural Resources:
Muhammad Danish | www.knowledgedep.blogspot.com
25 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Business creates new utility to the natural resources by preservation and value
addition. Different new products are created by business operation, without which a lot of
natural resources would have been wasted.
5. Research, Development and Innovation:
Business continuously makes research on alternative uses of resources, develops new
products and methods, and makes new innovations.
6. Income Generation:
Business generates income for the individuals. Business Utilizes factors of production
like land, labor, capital and organization; and generate incomes like wage, rent, interest and
profit to the factor-owners.
7. Interesting Natural Income:
Business preserves natural resources, and creates new utility. Consequently, national
income (NI), per capita income (PCI), gross domestic products (GDP), etc, increase.
8. Contribution to Social Development:
Business contributes to the social development also. Business growth increases
national income, which contributes to social development. Profitable corporations provide a
lot of money as corporate taxes in the hand of the government, which the government uses in
the development activities of the country. Besides, modern corporate business contributes a
lot for Corporate Social Responsibility (CSR), which ultimately enhances social welfare.
9. Contribution in the Development of Education, science and Technology:
Business contributes toward the development of education, innovates new technology
and applies theory (s) of science for better production and human welfare.
10. Development of International Relations:
Business imports necessary commodities and exports new or surplus products to
foreign countries. In this way, a foreign relation develops.
Muhammad Danish | www.knowledgedep.blogspot.com
26 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH

More Related Content

What's hot

Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet WorksAnkur Jain
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]mhuntsman0002
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)maamir farooq
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet FundamentalPrithvi Raj M
 
Computer network
Computer networkComputer network
Computer networkHarry Pott
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4jashleyfaye
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks ShohanaakterKakon
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKimtiazalijoono
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYKak Yong
 

What's hot (20)

Akki
AkkiAkki
Akki
 
Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet Works
 
Networking
NetworkingNetworking
Networking
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Networks
NetworksNetworks
Networks
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet Fundamental
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Computer network
Computer networkComputer network
Computer network
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
network
networknetwork
network
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 

Similar to Mis 2nd assignment final solved

Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Basic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxBasic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxDepEd-Bataan
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfJafarHussain48
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & InternetKusai007
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01Dilan Atapattu
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptxDebaComedyClub
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptxActionForyou
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 

Similar to Mis 2nd assignment final solved (20)

Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Basic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxBasic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptx
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & Internet
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptx
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
E content network
E content networkE content network
E content network
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Networks
NetworksNetworks
Networks
 

More from Danish Saqi

Financial Management Assignment practicals
Financial Management Assignment practicalsFinancial Management Assignment practicals
Financial Management Assignment practicalsDanish Saqi
 
1st assignment of FM
1st assignment of FM1st assignment of FM
1st assignment of FMDanish Saqi
 
Organizational behaviour
Organizational behaviourOrganizational behaviour
Organizational behaviourDanish Saqi
 
Financial institution 1st assignment
Financial institution 1st assignmentFinancial institution 1st assignment
Financial institution 1st assignmentDanish Saqi
 
Fi 2st assignment
Fi 2st assignmentFi 2st assignment
Fi 2st assignmentDanish Saqi
 
2nd Assignment of Entrepreneurship
2nd  Assignment of Entrepreneurship2nd  Assignment of Entrepreneurship
2nd Assignment of EntrepreneurshipDanish Saqi
 
1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship1st Assignment of Enterpreneurship
1st Assignment of EnterpreneurshipDanish Saqi
 
1st assignment (investment)
1st assignment (investment)1st assignment (investment)
1st assignment (investment)Danish Saqi
 
1st solve assignment Management information system
1st solve assignment Management information system1st solve assignment Management information system
1st solve assignment Management information systemDanish Saqi
 
2nd assignment of OPM Free download
2nd assignment of OPM Free download 2nd assignment of OPM Free download
2nd assignment of OPM Free download Danish Saqi
 
1st assignment (opm)
1st assignment (opm)1st assignment (opm)
1st assignment (opm)Danish Saqi
 
International finance second assignment
International finance second assignmentInternational finance second assignment
International finance second assignmentDanish Saqi
 
International Finance 2nd assignment free download
International Finance 2nd assignment free download International Finance 2nd assignment free download
International Finance 2nd assignment free download Danish Saqi
 
IF 1st assignment
IF 1st assignmentIF 1st assignment
IF 1st assignmentDanish Saqi
 
Project Management 2nd assignment
Project Management 2nd assignmentProject Management 2nd assignment
Project Management 2nd assignmentDanish Saqi
 
Entrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceEntrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceDanish Saqi
 
1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com1st Enterpreneurship, M.Com
1st Enterpreneurship, M.ComDanish Saqi
 
2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com 2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com Danish Saqi
 
1st organizational behaviour
1st organizational behaviour1st organizational behaviour
1st organizational behaviourDanish Saqi
 

More from Danish Saqi (19)

Financial Management Assignment practicals
Financial Management Assignment practicalsFinancial Management Assignment practicals
Financial Management Assignment practicals
 
1st assignment of FM
1st assignment of FM1st assignment of FM
1st assignment of FM
 
Organizational behaviour
Organizational behaviourOrganizational behaviour
Organizational behaviour
 
Financial institution 1st assignment
Financial institution 1st assignmentFinancial institution 1st assignment
Financial institution 1st assignment
 
Fi 2st assignment
Fi 2st assignmentFi 2st assignment
Fi 2st assignment
 
2nd Assignment of Entrepreneurship
2nd  Assignment of Entrepreneurship2nd  Assignment of Entrepreneurship
2nd Assignment of Entrepreneurship
 
1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship1st Assignment of Enterpreneurship
1st Assignment of Enterpreneurship
 
1st assignment (investment)
1st assignment (investment)1st assignment (investment)
1st assignment (investment)
 
1st solve assignment Management information system
1st solve assignment Management information system1st solve assignment Management information system
1st solve assignment Management information system
 
2nd assignment of OPM Free download
2nd assignment of OPM Free download 2nd assignment of OPM Free download
2nd assignment of OPM Free download
 
1st assignment (opm)
1st assignment (opm)1st assignment (opm)
1st assignment (opm)
 
International finance second assignment
International finance second assignmentInternational finance second assignment
International finance second assignment
 
International Finance 2nd assignment free download
International Finance 2nd assignment free download International Finance 2nd assignment free download
International Finance 2nd assignment free download
 
IF 1st assignment
IF 1st assignmentIF 1st assignment
IF 1st assignment
 
Project Management 2nd assignment
Project Management 2nd assignmentProject Management 2nd assignment
Project Management 2nd assignment
 
Entrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, CommerceEntrepreneurship second assignment, M.Com, Commerce
Entrepreneurship second assignment, M.Com, Commerce
 
1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com1st Enterpreneurship, M.Com
1st Enterpreneurship, M.Com
 
2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com 2nd Assignment of organization Behavior, M.com
2nd Assignment of organization Behavior, M.com
 
1st organizational behaviour
1st organizational behaviour1st organizational behaviour
1st organizational behaviour
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Mis 2nd assignment final solved

  • 1. Muhammad Danish | www.knowledgedep.blogspot.com 1 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH MUHAMMAD DANISH INFORMATION MANAGEMENT SYSTEM 2ND ASSIGNMENT BY: MUHAMMAD DANISH ROLL # 119467 THIS ASSIGNMENT CONTAINS 10 COMPLETELY SOLVED QUESTION OF MIS AND IT’S NOT CONTAIN IRRELEVANT ITEMS. IT IS PREPARED AFTER READ COMPLETELY.
  • 2. Muhammad Danish | www.knowledgedep.blogspot.com 2 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 1- What are the main telecommunications, transmission media and types of networks? Answer: TRANSMISSION MEDIA: Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data. TELECOMMUNICATION MEDIA: Overall though, a basic telecommunication system consists of three main parts that are always present in some form or another: A transmitter that takes information and converts it to a signal. A transmission medium, also called the "physical channel" that carries the signal. TYPES OF NETWORKS: There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose. The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe. Some of the different networks based on size are: 1. Personal Area Network: A personal area network, or PAN, is a computer network organized around an individual person within a single building. This could be inside a small office or residence. A typical PAN would include one or more computers, telephones, peripheral devices, video game consoles and other personal entertainment devices. If multiple individuals use the same network within a residence, the network is sometimes referred to as a home area network, or HAN. In a very typical setup, a residence will have a single wired Internet connection connected to a modem. This modem then provides both wired and wireless connections for multiple devices. The network is typically managed from a single computer but can be accessed from any device. This type of network provides great flexibility. For example, it allows you to:  Send a document to the printer in the office upstairs while you are sitting on the couch with your laptop.  Upload a photo from your cell phone to your desktop computer.
  • 3. Muhammad Danish | www.knowledgedep.blogspot.com 3 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH  Watch movies from an online streaming service to your TV. If this sounds familiar to you, you likely have a PAN in your house without having called it by its name. 2. Local Area Network: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables. The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for increased speed and security, but wireless connections can also be part of a LAN. High speed and relatively low cost are the defining characteristics of LANs. LANs are typically used for single sites where people need to share resources among themselves but not with the rest of the outside world. Think of an office building where everybody should be able to access files on a central server or be able to print a document to one or more central printers. Those tasks should be easy for everybody working in the same office, but you would not want somebody just walking outside to be able to send a document to the printer from their cell phone! If a local area network, or LAN, is entirely wireless, it is referred to as a wireless local area network, or WLAN. 3. Metropolitan Area Network: A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles to tens of miles. A MAN is often used to connect several LANs together to form a bigger network. When this type of network is specifically designed for a college campus, it is sometimes referred to as a campus area network, or CAN. 4. Wide Area Network: A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN.
  • 4. Muhammad Danish | www.knowledgedep.blogspot.com 4 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 2- How does the Internet and Internet technology work, and how do they support communication and e-business? Answer: INTERNET? The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs. It’s also the world’s largest implementation of client/server computing and internetworking, linking millions of individual networks all over the world. This global network of networks began in the early 1970s as a U.S. Department of Defense network to link scientists and university professors around the world. INTERNET TECHNOLOGIES? Internet refers to network of networks. In this network each computer is recognized by a globally unique address known as IP address. A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name. HOW DO WORK INTERNET AND SUPPORT COMMUNICATION: It depends on two models: 1. Clint / Server Model: A client-server network is designed for end-users, called clients, to access resources such as files, songs, video collections, or some other service from a central computer called a server. A server's sole purpose is to do what its name implies - serve its clients! You may have been using this configuration and not even have known it. Have you ever played Xbox Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video, and game demos. How to Work: Imagine a customer sitting at a restaurant. He is waiting for the server to come by and take his order. The same rules apply in a client-server network; the client, which can be a laptop, desktop, a Smartphone, or pretty much any computerized device, can make a request from the server.
  • 5. Muhammad Danish | www.knowledgedep.blogspot.com 5 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH The client uses the network as a way to connect with and speak to the server. Just as the customer speaks to his server, the client uses the network to send and receive communications about its order, or request. The server will take the request and make sure that the request is valid. If everything checks out okay, then the server will fetch the request and serve the client. The server can make a request from the client as well. It may want to check up on the status of the client, or ask if it has received any security patches, or if it still needs resources from the server. If not, the server will close the connection in order to free up network traffic. Can you imagine a server standing next to a customer who just stares at the menu without ordering anything? After 15 minutes, it would be a good idea for the server to leave and check on other customers. In both cases, the server moves on to other clients as needed. 2. TCP/IP Model: The Internet works by using a protocol called TCP/IP, or Transmission Control Protocol/Internet Protocol. TCP/IP is the underlying communication language of the Internet. In base terms, TCP/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location. For those who don’t know, a packet, sometimes more formally referred to as a network packet, is a unit of data transmitted from one location to another. Much like the atom is the smallest unit of a cell, a packet is the smallest unit of transmitted information over the Internet. E-BUSINESS: E-Business (e-Business), or Electronic Business, is the administration of conducting business via the Internet. This would include the buying and selling of goods and services, along with providing technical or customer support through the Internet. Example of functionality of electronic interchange of information in retail shop: 1. Buyer prepares the electronic order in its information system (IS). 2. Buyer is sending electronic order to the supplier and supplier is obtaining the order directly into its information system. 3. Based on the electronic order, supplier is preparing the ordered goods and the electronic bill of delivery and is sending this document to the buyer. Electronic bill of delivery may contain the structure of the consignment and other data on delivered goods (date of use, number of series and lots etc.) 4. Buyer is receiving all these details in its information system. At the take over and acceptance of the goods he is confirming the electronic delivery bill and is sending to the supplier the electronic certificate of receipt. 5. Supplier is issuing the electronic invoice based on the received electronic certificate of receipt.
  • 6. Muhammad Danish | www.knowledgedep.blogspot.com 6 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 6. Buyer is verifying the electronic invoice with the confirmed bill of delivery and is sending he electronic order for payment to the bank. 7. Bank is sending electronic financial statements of performed transactions to both partners, i.e. to the buyer and to the supplier.
  • 7. Muhammad Danish | www.knowledgedep.blogspot.com 7 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 3- What are the principal technologies and standards for wireless networking, communications, and Internet Access? Answer: PRINCIPAL TECHNOLOGIES: Principal Technologies is a staffing agency in Oklahoma City specializing in IT, Accounting and Engineering recruitment. Principal Technologies has job openings of all types, including contract or temporary jobs, contract-to-hire and direct hire permanent jobs in Oklahoma City and across the state. PRINCIPLE TECHNOLOGY: Cellular networks are evolving toward  High-speed,  High-bandwidth,  Digital packet-switched transmission. Broadband 3G networks are capable of transmitting data at speeds ranging from 144 Kbps to more than 2 Mbps. 4G networks capable of transmission speeds that could reach 1 Gbps are starting to be rolled out. STANDARDS FOR WIRELESS NETWORK: Major cellular standards include 1. Code Division Multiple Access (CDMA), Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communication channel. 2. Global System for Mobile Communications (GSM), GSM (Global System for Mobile Communications, originally Group Special Mobile) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile phones, first deployed in Finland in July 1991. Standards for wireless computer networks include:
  • 8. Muhammad Danish | www.knowledgedep.blogspot.com 8 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH  Bluetooth (802.15) for small personal area networks (PANs), Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks  Wi-Fi (802.11) for local area networks (LANs), Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase that means IEEE 802.11x.  WiMax (802.16) for metropolitan area networks (MANs), WiMAX is a wireless technology put forth by the WiMAX Forum that is one of the technologies that is being used for 4G networks. It can be used in both point to point and the typical WAN type configurations that are also used by 2G and 3G mobile network carriers. Its formal name is IEEE standard 802.16.
  • 9. Muhammad Danish | www.knowledgedep.blogspot.com 9 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 4- What is the business value of security and control? Answer: WHAT IS BUSINESS VALUE? Business value is an informal term that includes all forms of value that determine the health and well-being of the firm in the long run. Business value expands concept of value of the firm beyond economic value (also known as economic profit, economic value added, and shareholder value) to include other forms of value such as employee value, customer value, supplier value, channel partner value, alliance partner value, managerial value, and societal value. Many of these forms of value are not directly measured in monetary terms. BUSINESS VALUE OF SECURITY AND CONTROL Lack of sound security and control can cause firms relying on computer systems for their core business functions to lose sales and productivity. Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability. New laws, such as HIPAA, the Sarbanes- Oxley Act, and the Gramm-Leach-Bliley Act, require companies to practice stringent electronic records management and adhere to strict standards for security, privacy, and control. Legal actions requiring electronic evidence and computer forensics also require firms to pay more attention to security and electronic records management. Company systems often house confidential information about individuals' taxes, financial assets, medical records, and job performance reviews. They may contain information on corporate operations, trade secrets, new product development plans, and marketing strategies. Inadequate security and control may also create serious legal liability. Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Recent U.S. government regulations mandate the protection of data from abuse, exposure, and unauthorized access, and include:  The Health Insurance Portability and Accountability Act (HIPAA) of 1996, which requires members of the healthcare industry to retain patient information for six years and ensure the confidentiality of those records  The Gramm-Leach-Bliley Act, which requires financial institutions to ensure the security and confidentiality of customer data  The Sarbanes-Oxley Act, which imposes responsibility on companies and their management to use internal controls to safeguard the accuracy and integrity of financial information Firms face new legal obligations for electronic records management and document retention as well as for privacy protection. Electronic records management (ERM) consists of policies,
  • 10. Muhammad Danish | www.knowledgedep.blogspot.com 10 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH procedures, and tools for managing the retention, destruction, and storage of electronic records. Security, control, and electronic records management have become essential for responding to legal actions. Much of the evidence today for stock fraud, embezzlement, theft of company trade secrets, computer crime, and many civil cases is in digital form. Legal cases today increasingly rely on evidence represented as computer data stored on portable floppy disks, CDs, and computer hard disk drives, as well as in e-mail, instant messages, and e-commerce transactions over the Internet. E-mail is currently the most common type of electronic evidence. An effective electronic document retention policy ensures that electronic documents, e-mail, and other records are well organized, accessible, and neither retained too long nor discarded too soon. Computer forensics is the scientific collection; examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. Electronic evidence can reside on computer storage media in the form of computer files and as ambient data, which are not visible to the average user.
  • 11. Muhammad Danish | www.knowledgedep.blogspot.com 11 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 5- What are the most important tools and technologies for safeguarding information resources? Answer: WHAT IS SAFEGUARDING INFORMATION? Safeguarding is the action that is taken to promote the welfare of children and protect them from harm. Safeguarding means: protecting children from abuse and maltreatment. Preventing harm to children's health or development. Taking action to enable all children and young people to have the best outcomes. TOOLS: HSU's information security infrastructure comprises the tools and equipment the campus employs to protect University-owned computers and networks. This infrastructure is designed to be as unobtrusive as possible while still maintaining a high degree of protection against malware, hackers, and data breaches: 1. Campus border firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in hardware, software, or a combination of both. 2. Encryption: Encryption converts data into a secure form that can be safely moved around and helps HSU meet its obligations under various data protection laws and policies. One of the most effective ways to protect personally identifiable or other confidential information stored on a computer is to encrypt it. 3. Network Access Control (NAC): Designed to proactively prevent malware or hackers from gaining access to the network. At HSU, this is tackled at two levels: the network perimeter, where the HSU networks meet the Internet, and the individual system level. 4. Password management: Every student, staff, and faculty member is provided with a unique HSU User Name when they officially enter the university population. Each individual must also create (and periodically change) their own secure password, which is used in combination with their User Name to permit access to the relevant systems based on their university role. 5. Protected Information Discovery Tools:
  • 12. Muhammad Danish | www.knowledgedep.blogspot.com 12 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Personally Identifiable Information (PII) is an umbrella term for information linked to an individual's identity, such as Social Security Numbers, drivers' license data, and credit card or bank account information and which can be used to facilitate identity theft. PII Discovery Software is used to scan University-owned computers to assist in identifying such data so the appropriate action can be taken to secure it. 6. Secure wireless: Eudora is the secure wireless network used at HSU; it provides all the benefits of the regular wireless service - anytime, anywhere access to the Internet - with additional security. Staff, faculty, and graduate students can access more of the wired network, including departmental file shares and wired printers, enabling them to work productively anywhere on campus using personal or University-owned devices. 7. Virtual Private Network (VPN): A secure communication channel that enables staff and faculty to access their office computers from off campus via a secure web interface. 8. Virus protection tools: Microsoft protection is installed and kept updated on all HSU-owned computers automatically; any personally owned computer connecting to the HSU wired or wireless networks must be protected by one of the HSU-recommended antivirus programs. 9. Vulnerability Scanning: Vulnerability scans provide critical information to the Information Security Office and management as part of the risk assessment process for campus systems. TECHNOLOGY: 1. Third Party - Contract Language, Guidelines, Policies & More: CSU policies provides for direction and support for managing third party relationship and for granting access to various HSU resources and third party contract language. 2. Mobile Device Security: Do's and don'ts to keep your mobile devices and the data stored on them secure against hacking and other security issues. 3. Online Cloud Storage and Email. Frequently Asked Questions and Answers relating to storing data in the cloud shares and sending email and attachments securely.
  • 13. Muhammad Danish | www.knowledgedep.blogspot.com 13 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 4. Information Security Training. HSU provides Information Security Awareness online and on-campus training materials designed to provide staff and faculty with the knowledge they need to secure information resources. 5. Secure Disposal of Paper / Shredding and Electronic Media. Any data storage medium - paper, computer, scanner, copier, hard drive, tablet, Smartphone - should be treated as if it contained protected data and must be securely wiped prior to transfer or disposal.
  • 14. Muhammad Danish | www.knowledgedep.blogspot.com 14 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 6- How do supply chain management systems coordinate planning, production, and logistics with suppliers? Answer: SUPPLY MANAGEMENT A broad term describing the various acts of identifying, acquiring and managing the products and/or resources needed to run a business or other organization. These include physical goods as well as information, services and any other resources needed. SUPPLY AND CHAIN MANAGEMENT: Supply chain management (SCM) is the oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. Supply chain management involves coordinating and integrating these flows both within and among companies. It is said that the ultimate goal of any effective supply chain management system is to reduce inventory (with the assumption that products are available when needed). As a solution for successful supply chain management, sophisticated software systems with Web interfaces are competing with Web-based application service providers (ASP) who promise to provide part or all of the SCM service for companies who rent their service. HOW DO SUPPLY CHAIN MANAGEMENT SYSTEMS COORDINATE PLANNING, PRODUCTION, AND LOGISTICS WITH SUPPLIERS? 1. Adapt Supply Chain to Customer's Needs: Both business people and supply chain professionals are trained to focus on the customer's needs. In order to understand customer better, we divide customers into a different group and we call it "segmentation". The most primitive way to segment customer is ABC analysis that groups customer based on the sales volume or profitability. Segmentation can also be done by product, industry and trade channel. 2. Customize Logistics Network: When you segment a customer based on the service needs, you may have to tailor the different logistics networks to serve different segment. However, this principle doesn't hold true for all situations. For example, if you were a contract manufacturer in China, you might already have different logistics networks for different customers. Each customer in US or EU might already control the source of raw materials, ask you to provide dedicated production lines, nominate 3pl companies and air/sea carriers. So, logistics network design is a kind of initiative driven mainly by customer.
  • 15. Muhammad Danish | www.knowledgedep.blogspot.com 15 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 3. Align Demand Planning Across Supply Chain: Supply chain practitioners are taught to share the demand data with trading partners so nobody has to keep the unnecessary stock. In general, this principle holds true. But in the reality, only Walmart is actively sharing the demand data to trading partners. There is a very interesting paper "Top-Down Versus Bottom-Up Demand Forecasts: The Value of Shared Point-of-Sale Data in the Retail Supply Chain" by Williams and Waller 2011, the result of research found that,  -If you make the demand forecast based on SKU/Customer level, using your own historical order data is more accurate than using the POS data you get from retailers  If you make the demand forecast based on SKU/Store level, using the POS data you get from retailers is more accurate than using your own historical order data The implication is that the absence of demand sharing is not necessary bad. But when you got the demand data from trading partners, you MUST use it the right way. 4. Differentiate Products Close to Customer: Dell keeps components and assemble them only after customer places the order in order to increase the product variety. This principle is still true, but, there is another principle that you should consider. "Standardization" is in the opposite polarity of "Differentiation". For example, some cosmetics manufacturers formulate products and choose a packaging and labeling that complies with the regulations of multiple countries in Asia. So they only make one SKU that can be sold in 15 countries instead of 1 SKU/Country. By standardizing product appropriately, they can drive the cost down drastically due to the economy of scale. So standardization is something that you should also consider. 5. Outsource Strategically: This is the principle that stands the test of time. In short, don't ever outsource your core competency. 6. Develop IT that Support Multi-Level Decision Making: If you search Google for the term "critical success factor erp", you'll find lots of information about how to implement ERP successfully. My opinion is that an IT project shouldn't be done in the isolation; business process reengineering is something that you have to do before implementing an IT project. This will equip you with the full understanding about process deficiencies then you can determine what kind of technology that you really need.
  • 16. Muhammad Danish | www.knowledgedep.blogspot.com 16 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 7. Adopt Both Service and Financial Metrics: Anderson et al suggested that the activity based costing (ABC) be implemented so you can determine customer's profitability. However, there is the interesting twist about the ABC concept. In 1987, Robert Kaplan and W Bruns defined the activity based costing concept in his book "Accounting and Management: A Field Study Perspective". However, in 2003 Robert Kaplan said that it's difficult to maintain an ABC costing model to reflect the changes in activities, processes, products and customers. Then, he introduced the refined concept called "Time Driven Activity Based Costing".
  • 17. Muhammad Danish | www.knowledgedep.blogspot.com 17 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 7- How do customer relationship management systems help firms achieve customer intimacy? Answer: MANAGEMENT SYSTEM? A management system is the framework of policies, processes and procedures used by an organization to ensure that it can fulfill all the tasks required to achieve its objectives Management Systems are systematic frameworks designed to manage an organization's policies, procedures and processes and promote continual improvement within. HOW DO CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS HELP FIRMS ACHIEVE CUSTOMER INTIMACY? 1. Increasing Customer Touch points: In the digital marketing age, there are new ways to reach your customers every day. The more opportunities to interact with customers, the better. Here are several examples of traditional and digital touch points that will help to grow customer intimacy:  Sale papers  Customer service  Call centers  Direct mail  Emails  Apps  Blogs and content  Search engine queries  Websites  Blogs  Events  Sponsors  Mobile messaging  SMS  Store or Facility appearance  Packaging  Employees 2. Customer Service Management: Service is the key to earning customer loyalty. Consistent and quality service, quick response times, and open channels of communication result in better customer experiences and potential increases in sales exceeding 300%. When customers know they’re important, it shows.
  • 18. Muhammad Danish | www.knowledgedep.blogspot.com 18 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 3. Social Networking: Bring that personal touch to your platform by linking your business to Face book, Twitter, Instagram, LinkedIn, and other social media platforms. Customers can directly respond to events and promotions, share your brand with their contacts, and generate excitement in others about your products and services. 4. Data Integration: As customers engage with products and services, companies can gather data to better serve their needs. Surveys, email campaigns, and cross-promotional social events can help fine-tune customer targeting and segmentation. The more focused a campaign becomes, the more customers will feel connected to the brand. 5. Management Solutions and Leadership: Your CMO has a prime spot as a leader in driving customer intimacy initiatives. Working with strategic consultants allows for team-building across an organization. With clearly defined roles and objectives, it’s easier to serve customers and delegate responsibilities. 6. Rewarding Employees: Forget the old top-down approach to marketing strategies. Highly engaged employees at any level that are excited about your products and services should be rewarded. Enthusiasm strategies like spiff programs, incentive programs, and bonuses not only motivate employees, but it gets them more involved with decision making and product familiarity. Customer intimacy revolves around employee knowledge at every touch point. 7. Customer segmentation: In CRM, segmentation is used to categorize customers, according to some similarity, such as industry, job or some other characteristics, into similar groups. Although these characteristics, can be one or more attributes. It can be defined as a subdividing the customers based on already known good discriminator. 8. Improve customer knowledge: Firms can make and improve products and services through the information from tracking (e.g. via website tracking) customer behaviour to customer tastes and needs. CRM could contribute to a competitive advantage in improving firm's ability of customer information collecting to customize products and services according to customer needs.
  • 19. Muhammad Danish | www.knowledgedep.blogspot.com 19 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 8- What are the unique features of e-commerce, digital markets, and digital goods? Answer: E-COMMERCE: The buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories: business to business or B2B (Cisco), business to consumer or B2C (Amazon), and consumer to consumer or C2C (eBay) also called electronic commerce. Electronic commerce (ecommerce) is a type of business model, or segment of a larger business model, that enables a firm or individual to conduct business over an electronic network, typically the internet. Electronic commerce operates in all four of the major market segments: business to business, business to consumer, consumer to consumer and consumer to business. It can be thought of as a more advanced form of mail-order purchasing through a catalog. Almost any product or service can be offered via ecommerce, from books and music to financial services and plane tickets. Digital market: The marketing of products or services using digital channels to reach consumers. The key objective is to promote brands through various forms of digital media. Digital marketing extends beyond internet marketing to include channels that do not require the use of the internet. Digital Goods: In electronic commerce, digital goods are a general phrase used to describe any goods that are stored, delivered and used in its electronic format. Digital goods are shipped electronically to the consumer through email or download from the Internet. SEVEN UNIQUE FEATURES OF E-COMMERCE: There are some features of E-commerce, which express the importance of electronic commerce: 1. Ubiquity: The traditional business market is a physical place, access to treatment by means of document circulation. For example, clothes and shoes are usually directed to encourage customers to go somewhere to buy. E-commerce is ubiquitous meaning that it can be
  • 20. Muhammad Danish | www.knowledgedep.blogspot.com 20 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH everywhere. E-commerce is the worlds reduce cognitive energy required to complete the task. 2. Global Reach-: E-commerce allows business transactions on the cross country bound can be more convenient and more effective as compared with the traditional commerce. On the e- commerce businesses potential market scale is roughly equivalent to the network the size of the world's population. 3. Universal Standards: E-commerce technologies is an unusual feature, is the technical standard of the Internet, so to carry out the technical standard of e-commerce is shared by all countries around the world standard. Standard can greatly affect the market entry cost and considering the cost of the goods on the market. The standard can make technology business existing become more easily, which can reduce the cost, technique of indirect costs in addition can set the electronic commerce website 10$ / month. 4. Richness: Advertising and branding are an important part of commerce. E-commerce can deliver video, audio, animation, billboards, signs and etc. However, it's about as rich as television technology. 5. Interactivity- Twentieth Century electronic commerce business technology is called interactive, so they allow for two-way communication between businesses and consumers. 6. Information Density- The density of information the Internet has greatly improved, as long as the total amount and all markets, consumers and businesses quality information. The electronic commerce technology, reduce the information collection, storage, communication and processing cost. At the same time, accuracy and timeliness of the information technology increases greatly, information is more useful, more important than ever. 7. Personalization: E-commerce technology allows for personalization. Business can be adjusted for a name, a person's interests and past purchase message objects and marketing message to a specific individual. The technology also allows for custom. Merchants can change the product or service based on user preferences, or previous behavior.
  • 21. Muhammad Danish | www.knowledgedep.blogspot.com 21 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 9- What is the role of m-commerce in business, and what are the most important m-commerce applications? Answer: MEANT BY M COMMERCE: M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in. M-commerce is especially well-suited for location-based applications, such as finding local hotels and restaurants, monitoring local traffic and weather, and providing personalized location-based marketing. Mobile phones and handhelds are being used for mobile bill payment, banking, securities trading; transportation schedule updates, and downloads of digital content, such as; Music, Games, Video clips. Documents Assignments Articles Lectures Movies Wallpapers M-commerce requires wireless portals and special digital payment systems that can handle micropayments. The GPS capabilities of smart phones make possible geoadvertising, geosocial, and geoinformation services. IMPORTANCE OF M-COMMERCE IN BUSINESS 1. Boosting retail activity: In the context of economic difficulties, ecommerce solution with smart phones and software applications plays an important role in retail market, creating close relationship between consumers, retailers and brand merchandise through features, to get the success in both earning high profit and providing great mobile shopping experience. As a result, Investments in mobile platforms for B2C transactions are defined as strategic investment direction in the future, as indicated in the proportion of investment in mobile platforms accounted for 68% of the investing in research and new technology platforms.
  • 22. Muhammad Danish | www.knowledgedep.blogspot.com 22 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 2. Convenience of electronic payment services on mobile: 19% of people surveyed knew about the payment services on mobile, 10% expressed interest to learn and to use mobile payment services. By applying necessary plug-in, payment can be transferred easier and more secure than ever. Due to the fast development, this type of commerce also supports almost all popular payment method for customers to pay bills electronically, purchase prepaid cards as mobile phone cards to solve transactions complex. 3. Sales of digital content on mobile devices: Besides retail, digital content is a rich resource that firms can use with mobile commerce. By strengthening the convenience function of mobile devices, sellers can sell the content and buyers can use anytime they want. Users pay directly for each digital content or registered user to use the service online digital content. It can't be denied that Mobile Commerce is the very rapidly growing field in today's scenario because of unique characteristics and the outstanding advantages of M-Commerce. There are all kind of treads such as business-to- consumer, business-to- business and consumer-to-consumer in M-commerce. 4. Convenience: With just a few clicks on mobile devices, customers can already do shopping, banking, download media files...and more than that. M-commerce also benefits retailers by many of their outstanding features compared with responsive website and mobile site. 5. Flexible Accessibility: User can be accessible via mobile devices and at the same time be accessible online too through logging on to various mobile messengers and other networking platforms. On the other hand, the user may also choose not to be accessible by shutting down his mobile device, which at times can be a good thing. 6. Easy Connectivity: As long as the network signal is available, mobile devices can connect and do commerce transactions not only mobile to mobile but also mobile to other devices. No need for modem or WI-FI connectivity set up. 7. Personalization: Each mobile device is usually dedicated to a specific user so that it is personal. Users can do whatever they want with their handheld devices: modify the wallpaper, change view settings or modify contact information as you send emails or e-payments.
  • 23. Muhammad Danish | www.knowledgedep.blogspot.com 23 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH 8. Time Efficient: Doing M-Commerce transactions do not require the users to plug anything like personal computer or wait for the laptop to load.
  • 24. Muhammad Danish | www.knowledgedep.blogspot.com 24 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Q: 10- What are the business benefits of using intelligent techniques for knowledge management? Answer: BUSINESS: A business (also known as an enterprise, a company or a firm) is an organizational entity involved in the provision of goods and services to consumers. KNOWLEDGE MANAGEMENT: Knowledge management (KM) is the process of creating, sharing, using and managing the knowledge and information of an organization. It refers to a multi-disciplinary approach to achieving organizational objectives by making the best use of knowledge. THE BUSINESS BENEFITS OF USING INTELLIGENT TECHNIQUES FOR KNOWLEDGE MANAGEMENT Business benefit can be defined as an outcome of an action or decision that contributes towards meeting business objectives. There are some benefits of using Intelligent Techniques are following: 1. Supply of Goods and Services: Business provides goods and services to the society. Business produces different products, which are sold or supplied to the society. The creator created and creates things, but processing, the individuals or business does reprocessing and preservation and ultimately new utility is created. So business provides goods and services to the society. 2. Harnessing Capital and other Resources in Production: Business collects the drifts of savings from different individuals, especially through banks and financial institutions and employs those in productive activities and, thus, harnesses capital in economic activities to utilize natural resources in utility creation or value addition, and consequently, helps production, employment and resource utilization. 3. Self-employment and Provision of Employment: Business provides employment to the businessman. Further, in the production, distribution and services of business a large number of individuals are employed by the business organization and income generation occurs for them and others. 4. Preservation of Natural Resources:
  • 25. Muhammad Danish | www.knowledgedep.blogspot.com 25 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH Business creates new utility to the natural resources by preservation and value addition. Different new products are created by business operation, without which a lot of natural resources would have been wasted. 5. Research, Development and Innovation: Business continuously makes research on alternative uses of resources, develops new products and methods, and makes new innovations. 6. Income Generation: Business generates income for the individuals. Business Utilizes factors of production like land, labor, capital and organization; and generate incomes like wage, rent, interest and profit to the factor-owners. 7. Interesting Natural Income: Business preserves natural resources, and creates new utility. Consequently, national income (NI), per capita income (PCI), gross domestic products (GDP), etc, increase. 8. Contribution to Social Development: Business contributes to the social development also. Business growth increases national income, which contributes to social development. Profitable corporations provide a lot of money as corporate taxes in the hand of the government, which the government uses in the development activities of the country. Besides, modern corporate business contributes a lot for Corporate Social Responsibility (CSR), which ultimately enhances social welfare. 9. Contribution in the Development of Education, science and Technology: Business contributes toward the development of education, innovates new technology and applies theory (s) of science for better production and human welfare. 10. Development of International Relations: Business imports necessary commodities and exports new or surplus products to foreign countries. In this way, a foreign relation develops.
  • 26. Muhammad Danish | www.knowledgedep.blogspot.com 26 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH