BuyFindarrow_forward

Principles of Information Systems ...

13th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305971776

Solutions

Chapter
Section
BuyFindarrow_forward

Principles of Information Systems ...

13th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305971776
Chapter 4, Problem 3CE
Textbook Problem
1 views

Think of your ideal job. Identify two existing software applications for each sphere of influence that you would likely use in this career.

Program Plan Intro

Software sphere of influence:

  • The best way to find the problems scope and opportunity that software addresses using the sphere of influence.

Three spheres of influence:

Three spheres of influence are personal, workgroup, and enterprise which are used in most of the companies.

  • Personal sphere of influence:
    • This sphere of influence help the needs of single users.
    • It also help the users to increase their individual effectiveness, improving the amount and quality of work they are able do.
    • This sphere of influence is also known as personal productivity software.
      • Example for personal productivity software is VIP organizer.
      • This software help users develop to do lists, categorize tasks, save notes and records in a single database.
    • The following operating systems are supported by personal sphere of influence,
      • Microsoft windows.
      • Mac OS X, iOS.
      • Linux.
      • Google Android, chrome OS.
      • HP webOS.
  • Workgroup sphere of influence:
    • This sphere of influence helps the workgroup members to achieve their common objectives.
    • Example for this influence is Microsoft Outlook application.
      • This application can use to schedule meeting and organize activities.
    • The following operating systems are supported by workgroup sphere of influence,
      • Microsoft windows server and Mac OS X Server.
      • Linux and UNIX.
      • IBM i and z/OS.
      • HP-UX.
  • Enterprise sphere of influence:
    • This sphere of influence helps the organization to communicate with its location.
    • Various organizations use the SAP (Systems Applications and Products) enterprise resource planning software.
      • Using this software, organization is able to capture customer orders, control inventory, bill customers and controls payment process.
    • The following operating systems are supported by enterprise sphere of influence,
      • Microsoft Windows Server.
      • Linux and UNIX.
      • IBM i and z/OS.
      • HP-UX.

Explanation of Solution

Existing software application for personal sphere of influence:

The two existing software applications for personal sphere of influence are

  • VIP Organizer
    • This software help users develop to do lists, categorize tasks, save notes and records in a single database.
    • This application is task management software for home and office organizing.
    • It is a powerful organizer tool which helps user to establish everything in to-do-list and track improvement of user personal and business tasks.
    • Features of VIP organizer:
      • It contains multiple database management.
      • It is based on the tree-structured category system.
      • It provides flexible grouping of tasks.
      • It offers advanced remainder for message, sound and e-mail.
  • Microsoft Excel
    • It is a spreadsheet application which is developed by Microsoft.
    • This application is used for calculations, producing charts and recording data about all sorts of business processes.
    • Benefits of Microsoft Excel:
      • These applications are easy to store data.
      • Analysis of large amount of data
        • These applications enhance user ability to analyze large amounts of data.
      • It provides many formulas that help user to solve both simple and difficult calculations.
      • User can use a password for security.

Existing software application for workgroup sphere of influence:

The two existing software applications for workgroup sphere of influence are

  • Microsoft Outlook
    • This application can use to schedule meeting and organize activities.
    • Attachment with remainder feature.
      • Using this application, user can send any of their documents and data in an attachment...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 4 Solutions

Principles of Information Systems (MindTap Course List)
Show all chapter solutions
add
Ch. 4.3 - What special issues and considerations are likely...Ch. 4.3 - Given the business criticality of this system,...Ch. 4.4 - What is the primary difference between purchasing...Ch. 4.4 - What are the pros and cons of using open-source...Ch. 4.4 - What risks and start-up issues are associated with...Ch. 4.4 - What actions can be taken to reduce these risks?Ch. 4 - The two main categories of software are ______. a....Ch. 4 - Application software that enables users to develop...Ch. 4 - The heart of the operating system that controls...Ch. 4 - Software applications use the OS by requesting...Ch. 4 - ______ is an operating system that can run in all...Ch. 4 - A(n) ______ server simulates a computers hardware...Ch. 4 - ______ software is one-of-a-kind software designed...Ch. 4 - _________ computing refers to the use of computing...Ch. 4 - Software that enables users to improve their...Ch. 4 - Each programming language has its own set of...Ch. 4 - ______ is software that makes its source code...Ch. 4 - Software ______ are an important source of...Ch. 4 - Identify and briefly discuss the three spheres of...Ch. 4 - What is the role of the computer operating system?...Ch. 4 - What is an application programming interface...Ch. 4 - What is the kernel of the operating system?Ch. 4 - Identify and briefly discuss five types of...Ch. 4 - Identify and briefly describe the five basic...Ch. 4 - What role does a Linux distributor play?Ch. 4 - The Mac OS X supports dual booting. What is this,...Ch. 4 - What is an embedded system? Give three examples of...Ch. 4 - Distinguish between proprietary software and...Ch. 4 - What is middleware?Ch. 4 - What is software as a service (SaaS)?Ch. 4 - What is cloud computing? What are some pros and...Ch. 4 - What is open-source software? What are the...Ch. 4 - Briefly discuss the advantages and disadvantages...Ch. 4 - What is the difference between freeware and...Ch. 4 - How does Microsoft envision the future for Windows...Ch. 4 - Assume that you must take a computer-programming...Ch. 4 - Assume you are going to buy a personal computer....Ch. 4 - You have been asked to develop a user interface...Ch. 4 - You are using a new release of an application...Ch. 4 - What are some of the advantages and disadvantages...Ch. 4 - If you were the IS manager for a large...Ch. 4 - Identify four types of frequently used software...Ch. 4 - How have software development kits (SDKs)...Ch. 4 - How can virtualization save an organization money?Ch. 4 - Do research to compare the costs and features as...Ch. 4 - Use graphics software to develop a chart showing...Ch. 4 - Do research to identify the embedded operating...Ch. 4 - You and your team must make a recommendation to...Ch. 4 - The Google Android operating system has over an 80...Ch. 4 - Do research on the Web to learn which programming...Ch. 4 - Use the Internet to search for information on...Ch. 4 - Think of your ideal job. Would it help you to...Ch. 4 - Identify three specific smartphone applications...Ch. 4 - Think of your ideal job. Identify two existing...Ch. 4 - Identify four success criteria for the STM Merci...Ch. 4 - Do you believe that the database design will...Ch. 4 - How might STM Merci pilot project members identify...Ch. 4 - How important do you think it is for FIMC and...Ch. 4 - A recent survey by IBM of 585 mobile application...Ch. 4 - When developing the FIMC app, PointSource used an...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What view of a drawing usually shows the most detail?

Precision Machining Technology (MindTap Course List)

Convert the ERD from Problem 10 into a corresponding UML class diagram.

Database Systems: Design, Implementation, & Management

What five strategies for controlling risk are described in this chapter?

Principles of Information Security (MindTap Course List)

Present Example 7.4 in Chapter 7 using the format discussed in Section 4.2. Divide the example problem into Giv...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What is the clipboard?

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

What is the purpose of a reverse flow valve?

Welding: Principles and Applications (MindTap Course List)