SlideShare a Scribd company logo
1 of 8
HEWLETT-PACKARD
[Year]
[Type the document
title]
[Type the document subtitle]
NAME
[ T Y P E T H E C O M P A N Y A D D R E S S ]
Contents
Q1. Three ways to approach systems security risk:........................................................................3
Q2. Four international business strategies in the digital world by Valacich:.....................................3
Q3: Knowledge Worker in terms of today’s business environment: ................................................. 3
Q4. Reviewing:............................................................................................................................. 4
www.informationweek.com......................................................................................................4
www.itwire.com....................................................................................................................... 4
www.delimiter.com.au.............................................................................................................. 4
www.computerworld.com.au....................................................................................................4
Q. 5 Primary and secondary storage:.............................................................................................. 4
Q.6 Four services available from a network:................................................................................... 5
Q.7 List and explain three benefits of using extranets:....................................................................5
Q.8 List and describe the five typical revenue models fore-commerce ............................................ 6
Q.9 What are the advantagesof storinginformationinarelational database usingadatabase
management system(DBMS)?.......................................................................................................6
Q.10 Contrast ‘technological safeguards’ and ‘human safeguards’in information systems security ..6
Q1. Three ways to approach systems security risk:
IT risk administration as of now plays more imperative part in very nearly all parts of
contemporary associations' usefulness. (Rot, 2008) It requires dependable and cyclical
acknowledgment of its key assignment which is risk investigation. The three ways to
approach systems security risk can be:
1. Risk Evaluation:
 Identifying the probability of it occurring. (Rot, 2008)
 Examining the consequences if it should occur. (Rot, 2008)
 Assessing the Risk. (Rot, 2008)
2. Quantitative Approach:
 where estimation of risk worth is joined with application of numerical
measures – estimation of assets is characterized in sums, the recurrence of
danger event in the quantity of cases, and vulnerability by the estimation of
likelihood of its misfortune, those strategies present results fit as a fiddle of
marker (Rot, 2008)
3. Qualitative Approach:
 Which don't work on numerical information, displaying results as depictions,
proposals. (Rot, 2008)
Q2. Four international business strategies in the digital world by Valacich:
The four international business strategies in the digital world by Valacich are:
 Outsourcing: If an association in a far off area can perform a bit of a business'
administrations better and less expensive, employ that association. As such, its no
longer judicious or important for the greater part of a business' administrations to
be performed in one area, or under one top. (Valacich and Schneider, 2010)
 Supply Chains: Find the gear and supplies expected to achieve business objectives
effectively and monetarily by utilizing worldwide, not simply nearby, sources.
(Valacich and Schneider, 2010)
 Consulting: so as to contend in a level world, it may bode well for organizations
to counsel data benefits that can exhort them on the most proficient method to end
up worldwide. For illustration, Infosys Technologies counsels with customers
inside eighteen commercial ventures, running from the aeronautic trade, to health
awareness, training, and utilities commercial ventures. (Valacich and Schneider,
2010)
 Employment: To contract the best and the brightest, look for workers from
nations around the world, or utilization the livelihood acquirement
administrations of a worldwide occupation administrations. (Valacich and
Schneider, 2010)
Q3: Knowledge Worker in terms oftoday’s business environment:
When we attempt to characterize administration, our first thought is typically of a chief who
involves a part and who has power over individuals. (McCrimmon, 2010) Be that as it may on
account of knowledge workers, who oversee themselves, administration is seen as a process, one
which can captivate everybody. (McCrimmon, 2010) Consequently, when we characterize
administration as a part, we limit it to something that alludes to supervisors just. Such a definition
is not just a restricting one, it is one that does not represent the route in which work and
obligation has changed. (McCrimmon, 2010)
Mechanical age associations were formal progressive systems that alloted particular parts to
workers. The spotlight on parts put all force in the hands of administrators, who administered
workers by arranging, sorting out and controlling their work. This is basically what made
administration a top-down, limiting capacity. (McCrimmon, 2010)
Q4. Reviewing:
www.informationweek.com
www.itwire.com
www.delimiter.com.au
www.computerworld.com.au
According to the website http://www.informationweek.com/ Cyber security seems to be the topic
of most discussions, whether it be on computers, mobiles, tablets or even cloud computing.
(http://www.informationweek.com/)
On http://www.itwire.com/ I was personally most intrigued by the launch of Windows 10
operating system, they will have a live preview of it.(http://www.itwire.com/)
The most important announcement on http://delimiter.com.au/ would have to be its closure. After
a successful stint online, the website seems to have run its course and has decided to shut shop.
(http://delimiter.com.au/)
Virtual Reality, especially the use of glasses seemed to be the burning topic in the case of
http://www.computerworld.com.au/ after Google had announced its virtual reality glasses, it
seems Microsoft is going to beat Google at this game, as it has announced its soon to be launched
HoloLens.( http://www.computerworld.com.au/)
Q. 5 Primary andsecondary storage:
 Primary memory storages are impermanent; whereas the secondary storage is
lasting. (Sagar, 2009)
 Primary memory is costly and littler, where as secondary memory is less
expensive and bigger (Sagar, 2009)
 Primary memory storages are speedier, where as secondary storages are slower.
(Sagar, 2009)
 Primary memory storages are associated through information transports to CPU,
where as the secondary storages are join through information links to CPU (Sagar,
2009)
Q.6 Four services available from a network:
There are various diverse system administrations, for example,
 directory services is an arrangement of programming that sorts out, stores and gives
availability to data inside the machine registry working frameworks
 instant messaging is a class of online talk known for offering content transmission of
ongoing through the web
 video on demand are the frameworks permitting the clients for selecting and viewing
substance of feature or listening substance of sound focused around distinctive
decisions
 Simple network management protocol is a convention of web standard for the
administration of gadget on the systems of IT.
Q.7 List and explain three benefits of using extranets:
An extranet can increase the value of your organization by helping you impart and work together
all the more successfully with customers, clients, and accomplices. (AllBusiness, n.d) Especially
in the business-to-business showcase, an extranet can give your organization an edge over the
opposition and spare you cash by streamlining conventional business capacities and cutting
overhead expenses. (AllBusiness, n.d)
Extranets offer little organizations numerous different points of interest:
Expanded profit. As you robotize forms that were generally done physically, bottlenecks will
vanish and your organization's gainfulness will increment. Basic data won't lose all sense of
direction via the post office or covered in an email inbox, and occupied workers won't miss or
overlook key occasions. An extranet can, for instance, screen business exercises and trigger
particular activities, for example, consequently submitting a request with a supplier when your
stock drops beneath a certain level. (AllBusiness, n.d)
Lessened room for give and take. An extranet can decrease your safety buffer, particularly when
you utilize it to give particular gatherings access to inner applications. This could include
something as basic as giving clients access to their request histories, or something as mind
boggling as transforming requests from merchants and suppliers. (AllBusiness, n.d)
Adaptability. When you utilize an extranet to make data and applications accessible to
accomplices, customers, and clients, everybody can work when and where its generally
advantageous. This serve toward oneself methodology liberates you from unnecessary gatherings
and telephone tag, and it eliminates the expenses connected with in-individual data trades. Case
in point, an extranet may permit you to give client administration data outside of general business
hours. (AllBusiness, n.d)
Q.8 List and describe the five typical revenue models for e-commerce
●value recommendation - how an organization's item or administration satisfies the needs of
clients. Ordinary e-trade quality recommendations incorporate personalization, customization,
accommodation, and decrease of item pursuit and value conveyance costs.
●revenue model - how the organization arrangements to profit from its operations. Real e-
business income models incorporate the publicizing model, membership model, exchange
expense model, deals model, and subsidiary model.
●market opportunity - the income potential inside an organization's expected marketspace.
●competitive environment-the immediate and aberrant contenders working together in the same
marketspace, including what number of there are and how beneficial they are.
●competitive point of interest - the elements that separate the business from its rival, empowering
it to give a predominant item.
Q.9 What are the advantages ofstoring informationin a relational
database using a database management system (DBMS)?
Emulating are a percentage of the favourable circumstances of utilizing a database over a
customary record transforming framework:
 Potential for implementing measures. (nrttechnology, n.d)
 Adaptability. (nrttechnology, n.d)
 Lessened application improvement time. (nrttechnology, n.d)
 Accessibility of progressive data to all clients. (nrttechnology, n.d)
 Economies of scale. (nrttechnology, n.d)
Q.10 Contrast ‘technological safeguards’ and ‘human safeguards’ in information
systems security
Technological safeguards are the steps implemented by associations to secure equipment and
programming parts of data frameworks. There are three noteworthy levels where this
protection is connected and this is distinguishing proof and verification, malware security and
encryption and firewalls. Recognizable proof and confirmation includes systems, for
example, utilization of biometric information, single sign-on and utilization of smartcards.
These are technological developments which are connected to secure data security in
associations. An illustration is the utilization of biometric information where human body
parts, for example, fingerprints and retina are utilized to validate clients.
Human safeguards are steps implemented by associations to protect the data framework
security, and they include control of individuals who access the data framework. Human
safeguards include different levels of managing the human asset and they incorporate
procuring and screening, position definition, scattering and implementation and end. Position
definition permits clients to have employment titles with comparing security rights while
spread and implementation guarantees that all staff are mindful of strategies took after when
getting to the framework. End includes change in representatives obligations while
contracting and screening distinguishes workers who represent a danger to the association.
Screening of workers through record verifications against law requirement organizations
when procuring is an illustration of human protect in data security.
References:
AllBusiness(n.d) Benefitsof Extranets,[Online],Available:
http://www.allbusiness.com/technology/computer-networking/1283-1.html [22January2015].
McCrimmon,M. (2010) A NEW ROLE FOR MANAGEMENTIN TODAY’SPOST-INDUSTRIAL
ORGANIZATION ,August,[Online],Available: http://iveybusinessjournal.com/topics/leadership/a-
new-role-for-management-in-todays-post-industrial-organization#.VMCnTC6pfQE[22January2015].
nrttechnology(n.d) DBMS,[Online],Available:
http://www.nrtechnology.com/education/database/lecture%201/lecture%201.htm [22January
2015].
Rot, A.(2008) 'IT Risk Assessment:QuantitativeandQualitative Approach',WorldCongresson
EngineeringandComputerScience,SanFrancisco,USA.
Sagar, V.(2009) Differencebetween Primary storageand secondary storage,30September,[Online],
Available:http://www.careerride.com/os-primary-storage-and-secondary-storage.aspx[22January
2015].
ValacichandSchneider(2010) Information SystemsToday:Managingin theDigital World, 4th
edition,Prentice Hall.

More Related Content

Similar to 50516

The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz Manufacturing
Mindi Schneider
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
International Journal of Economics and Financial Research
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud Transformation
Michael Graber
 
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
David J Rosenthal
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docx
clarebernice
 

Similar to 50516 (20)

Scr Tims
Scr TimsScr Tims
Scr Tims
 
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | QuboleO'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
O'Reilly ebook: Financial Governance for Data Processing in the Cloud | Qubole
 
Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleem
 
Economic Analysis: cloud_computing
Economic Analysis: cloud_computingEconomic Analysis: cloud_computing
Economic Analysis: cloud_computing
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
 
The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz Manufacturing
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Small Medium Enterprises Opportunities in IT
Small Medium Enterprises Opportunities in ITSmall Medium Enterprises Opportunities in IT
Small Medium Enterprises Opportunities in IT
 
Internet of Things - Enablement by Techcello
Internet of Things - Enablement by TechcelloInternet of Things - Enablement by Techcello
Internet of Things - Enablement by Techcello
 
Role and Challenges in Cloud Computing and Ecommerce in SME’s
Role and Challenges in Cloud Computing and Ecommerce in SME’sRole and Challenges in Cloud Computing and Ecommerce in SME’s
Role and Challenges in Cloud Computing and Ecommerce in SME’s
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud Transformation
 
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
Enabling Hybrid Cloud Today With Microsoft-technologies-v1-0
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docx
 
Bus 421 Research Paper
Bus 421 Research PaperBus 421 Research Paper
Bus 421 Research Paper
 
Cloud computing gartner report
Cloud computing gartner reportCloud computing gartner report
Cloud computing gartner report
 
TM Forum Frameworx Overview Course
TM Forum  Frameworx Overview CourseTM Forum  Frameworx Overview Course
TM Forum Frameworx Overview Course
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment Help
 

More from Deepak Chiripal (20)

Mg rover
Mg roverMg rover
Mg rover
 
Lcap7333 edit
Lcap7333 editLcap7333 edit
Lcap7333 edit
 
Laqu9107 feedback
Laqu9107 feedbackLaqu9107 feedback
Laqu9107 feedback
 
Laqu9107 (1) (2) (1) (1)
Laqu9107 (1) (2) (1) (1)Laqu9107 (1) (2) (1) (1)
Laqu9107 (1) (2) (1) (1)
 
Laqu8401 (1)
Laqu8401 (1)Laqu8401 (1)
Laqu8401 (1)
 
Kian hong assignment
Kian hong assignmentKian hong assignment
Kian hong assignment
 
Job # aug6206 n (1) (1) (1) (2)
Job # aug6206 n (1) (1) (1) (2)Job # aug6206 n (1) (1) (1) (2)
Job # aug6206 n (1) (1) (1) (2)
 
Iwt5419778 a
Iwt5419778 aIwt5419778 a
Iwt5419778 a
 
Hrm with ppt
Hrm with pptHrm with ppt
Hrm with ppt
 
Hrm urgent 4000 words
Hrm urgent 4000 wordsHrm urgent 4000 words
Hrm urgent 4000 words
 
Em201544 mic117om
Em201544 mic117omEm201544 mic117om
Em201544 mic117om
 
Em201544 mic117om edit
Em201544 mic117om editEm201544 mic117om edit
Em201544 mic117om edit
 
Em201432 bib1220scm
Em201432 bib1220scmEm201432 bib1220scm
Em201432 bib1220scm
 
Em2015 oma0112wr
Em2015 oma0112wrEm2015 oma0112wr
Em2015 oma0112wr
 
Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
Case study of con rod(1)
Case study of con rod(1)Case study of con rod(1)
Case study of con rod(1)
 
Arghil 4 heritage and cultural tourism management
Arghil 4 heritage and cultural tourism managementArghil 4 heritage and cultural tourism management
Arghil 4 heritage and cultural tourism management
 
51746
5174651746
51746
 
51497
5149751497
51497
 
51442
5144251442
51442
 

50516

  • 1. HEWLETT-PACKARD [Year] [Type the document title] [Type the document subtitle] NAME [ T Y P E T H E C O M P A N Y A D D R E S S ]
  • 2. Contents Q1. Three ways to approach systems security risk:........................................................................3 Q2. Four international business strategies in the digital world by Valacich:.....................................3 Q3: Knowledge Worker in terms of today’s business environment: ................................................. 3 Q4. Reviewing:............................................................................................................................. 4 www.informationweek.com......................................................................................................4 www.itwire.com....................................................................................................................... 4 www.delimiter.com.au.............................................................................................................. 4 www.computerworld.com.au....................................................................................................4 Q. 5 Primary and secondary storage:.............................................................................................. 4 Q.6 Four services available from a network:................................................................................... 5 Q.7 List and explain three benefits of using extranets:....................................................................5 Q.8 List and describe the five typical revenue models fore-commerce ............................................ 6 Q.9 What are the advantagesof storinginformationinarelational database usingadatabase management system(DBMS)?.......................................................................................................6 Q.10 Contrast ‘technological safeguards’ and ‘human safeguards’in information systems security ..6
  • 3. Q1. Three ways to approach systems security risk: IT risk administration as of now plays more imperative part in very nearly all parts of contemporary associations' usefulness. (Rot, 2008) It requires dependable and cyclical acknowledgment of its key assignment which is risk investigation. The three ways to approach systems security risk can be: 1. Risk Evaluation:  Identifying the probability of it occurring. (Rot, 2008)  Examining the consequences if it should occur. (Rot, 2008)  Assessing the Risk. (Rot, 2008) 2. Quantitative Approach:  where estimation of risk worth is joined with application of numerical measures – estimation of assets is characterized in sums, the recurrence of danger event in the quantity of cases, and vulnerability by the estimation of likelihood of its misfortune, those strategies present results fit as a fiddle of marker (Rot, 2008) 3. Qualitative Approach:  Which don't work on numerical information, displaying results as depictions, proposals. (Rot, 2008) Q2. Four international business strategies in the digital world by Valacich: The four international business strategies in the digital world by Valacich are:  Outsourcing: If an association in a far off area can perform a bit of a business' administrations better and less expensive, employ that association. As such, its no longer judicious or important for the greater part of a business' administrations to be performed in one area, or under one top. (Valacich and Schneider, 2010)  Supply Chains: Find the gear and supplies expected to achieve business objectives effectively and monetarily by utilizing worldwide, not simply nearby, sources. (Valacich and Schneider, 2010)  Consulting: so as to contend in a level world, it may bode well for organizations to counsel data benefits that can exhort them on the most proficient method to end up worldwide. For illustration, Infosys Technologies counsels with customers inside eighteen commercial ventures, running from the aeronautic trade, to health awareness, training, and utilities commercial ventures. (Valacich and Schneider, 2010)  Employment: To contract the best and the brightest, look for workers from nations around the world, or utilization the livelihood acquirement administrations of a worldwide occupation administrations. (Valacich and Schneider, 2010) Q3: Knowledge Worker in terms oftoday’s business environment:
  • 4. When we attempt to characterize administration, our first thought is typically of a chief who involves a part and who has power over individuals. (McCrimmon, 2010) Be that as it may on account of knowledge workers, who oversee themselves, administration is seen as a process, one which can captivate everybody. (McCrimmon, 2010) Consequently, when we characterize administration as a part, we limit it to something that alludes to supervisors just. Such a definition is not just a restricting one, it is one that does not represent the route in which work and obligation has changed. (McCrimmon, 2010) Mechanical age associations were formal progressive systems that alloted particular parts to workers. The spotlight on parts put all force in the hands of administrators, who administered workers by arranging, sorting out and controlling their work. This is basically what made administration a top-down, limiting capacity. (McCrimmon, 2010) Q4. Reviewing: www.informationweek.com www.itwire.com www.delimiter.com.au www.computerworld.com.au According to the website http://www.informationweek.com/ Cyber security seems to be the topic of most discussions, whether it be on computers, mobiles, tablets or even cloud computing. (http://www.informationweek.com/) On http://www.itwire.com/ I was personally most intrigued by the launch of Windows 10 operating system, they will have a live preview of it.(http://www.itwire.com/) The most important announcement on http://delimiter.com.au/ would have to be its closure. After a successful stint online, the website seems to have run its course and has decided to shut shop. (http://delimiter.com.au/) Virtual Reality, especially the use of glasses seemed to be the burning topic in the case of http://www.computerworld.com.au/ after Google had announced its virtual reality glasses, it seems Microsoft is going to beat Google at this game, as it has announced its soon to be launched HoloLens.( http://www.computerworld.com.au/) Q. 5 Primary andsecondary storage:  Primary memory storages are impermanent; whereas the secondary storage is lasting. (Sagar, 2009)  Primary memory is costly and littler, where as secondary memory is less expensive and bigger (Sagar, 2009)  Primary memory storages are speedier, where as secondary storages are slower. (Sagar, 2009)
  • 5.  Primary memory storages are associated through information transports to CPU, where as the secondary storages are join through information links to CPU (Sagar, 2009) Q.6 Four services available from a network: There are various diverse system administrations, for example,  directory services is an arrangement of programming that sorts out, stores and gives availability to data inside the machine registry working frameworks  instant messaging is a class of online talk known for offering content transmission of ongoing through the web  video on demand are the frameworks permitting the clients for selecting and viewing substance of feature or listening substance of sound focused around distinctive decisions  Simple network management protocol is a convention of web standard for the administration of gadget on the systems of IT. Q.7 List and explain three benefits of using extranets: An extranet can increase the value of your organization by helping you impart and work together all the more successfully with customers, clients, and accomplices. (AllBusiness, n.d) Especially in the business-to-business showcase, an extranet can give your organization an edge over the opposition and spare you cash by streamlining conventional business capacities and cutting overhead expenses. (AllBusiness, n.d) Extranets offer little organizations numerous different points of interest: Expanded profit. As you robotize forms that were generally done physically, bottlenecks will vanish and your organization's gainfulness will increment. Basic data won't lose all sense of direction via the post office or covered in an email inbox, and occupied workers won't miss or overlook key occasions. An extranet can, for instance, screen business exercises and trigger particular activities, for example, consequently submitting a request with a supplier when your stock drops beneath a certain level. (AllBusiness, n.d) Lessened room for give and take. An extranet can decrease your safety buffer, particularly when you utilize it to give particular gatherings access to inner applications. This could include something as basic as giving clients access to their request histories, or something as mind boggling as transforming requests from merchants and suppliers. (AllBusiness, n.d) Adaptability. When you utilize an extranet to make data and applications accessible to accomplices, customers, and clients, everybody can work when and where its generally advantageous. This serve toward oneself methodology liberates you from unnecessary gatherings and telephone tag, and it eliminates the expenses connected with in-individual data trades. Case in point, an extranet may permit you to give client administration data outside of general business hours. (AllBusiness, n.d)
  • 6. Q.8 List and describe the five typical revenue models for e-commerce ●value recommendation - how an organization's item or administration satisfies the needs of clients. Ordinary e-trade quality recommendations incorporate personalization, customization, accommodation, and decrease of item pursuit and value conveyance costs. ●revenue model - how the organization arrangements to profit from its operations. Real e- business income models incorporate the publicizing model, membership model, exchange expense model, deals model, and subsidiary model. ●market opportunity - the income potential inside an organization's expected marketspace. ●competitive environment-the immediate and aberrant contenders working together in the same marketspace, including what number of there are and how beneficial they are. ●competitive point of interest - the elements that separate the business from its rival, empowering it to give a predominant item. Q.9 What are the advantages ofstoring informationin a relational database using a database management system (DBMS)? Emulating are a percentage of the favourable circumstances of utilizing a database over a customary record transforming framework:  Potential for implementing measures. (nrttechnology, n.d)  Adaptability. (nrttechnology, n.d)  Lessened application improvement time. (nrttechnology, n.d)  Accessibility of progressive data to all clients. (nrttechnology, n.d)  Economies of scale. (nrttechnology, n.d) Q.10 Contrast ‘technological safeguards’ and ‘human safeguards’ in information systems security Technological safeguards are the steps implemented by associations to secure equipment and programming parts of data frameworks. There are three noteworthy levels where this protection is connected and this is distinguishing proof and verification, malware security and encryption and firewalls. Recognizable proof and confirmation includes systems, for example, utilization of biometric information, single sign-on and utilization of smartcards. These are technological developments which are connected to secure data security in
  • 7. associations. An illustration is the utilization of biometric information where human body parts, for example, fingerprints and retina are utilized to validate clients. Human safeguards are steps implemented by associations to protect the data framework security, and they include control of individuals who access the data framework. Human safeguards include different levels of managing the human asset and they incorporate procuring and screening, position definition, scattering and implementation and end. Position definition permits clients to have employment titles with comparing security rights while spread and implementation guarantees that all staff are mindful of strategies took after when getting to the framework. End includes change in representatives obligations while contracting and screening distinguishes workers who represent a danger to the association. Screening of workers through record verifications against law requirement organizations when procuring is an illustration of human protect in data security.
  • 8. References: AllBusiness(n.d) Benefitsof Extranets,[Online],Available: http://www.allbusiness.com/technology/computer-networking/1283-1.html [22January2015]. McCrimmon,M. (2010) A NEW ROLE FOR MANAGEMENTIN TODAY’SPOST-INDUSTRIAL ORGANIZATION ,August,[Online],Available: http://iveybusinessjournal.com/topics/leadership/a- new-role-for-management-in-todays-post-industrial-organization#.VMCnTC6pfQE[22January2015]. nrttechnology(n.d) DBMS,[Online],Available: http://www.nrtechnology.com/education/database/lecture%201/lecture%201.htm [22January 2015]. Rot, A.(2008) 'IT Risk Assessment:QuantitativeandQualitative Approach',WorldCongresson EngineeringandComputerScience,SanFrancisco,USA. Sagar, V.(2009) Differencebetween Primary storageand secondary storage,30September,[Online], Available:http://www.careerride.com/os-primary-storage-and-secondary-storage.aspx[22January 2015]. ValacichandSchneider(2010) Information SystemsToday:Managingin theDigital World, 4th edition,Prentice Hall.