Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter B, Problem B9.6MBD
Explanation of Solution
Desktop Virtualization:
- Yes. It is a better business practice to let employees to use their personal devices for company related work.
- Reasons
- Suppose when the employee is in business journeys, it will allow the employee to do the work.
- Reasons
Challenges of allowing users to port business applications to their personal devices:
- Responsibility
- The following responsibility for repair charge occurs
- If something goes wrong with personal devices or if data loss occurred then user should be responsibility for occurrences.
- The following responsibility for repair charge occurs
- Security and control
- It is more difficult to handle the security on personal devices.
- Data retrieval
- After an agreement has been ended or when a user leaves the company, it might be needed to remove the company’s private information from the user device, which could verify to be hard...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An automobile manufacturing company utilizes an information system that allows customers to design and customize their cars. Customers first log in to the company website and create a dream car project. They can then customize the car by choosing the engine, trim, paint colors, and other options. The car specifications are forwarded to a sales representative, who contacts the customer to finalize the purchase order. The production begins shortly after the contract is finalized and the car is usually delivered within a few weeks. Which type of computer-based information system provides a competitive advantage based on the described scenario?
A decision support system (DSS) that improves decision-making
A transaction processing system (TPS) that promotes product differentiation
A management information system (MIS) that enhances the customer experience
A geographic information system (GIS) that helps increase market share
A manufacturer has recently installed an enterprise resource…
When first released, operating systems and programs may have bugs. There are literally hundreds of bugs in each application. In many cases, when a software problem is discovered, the manufacturer will provide a fix (also known as patches). Criminals launch zero-day assaults the day after a security hole is disclosed to the public. While no one disputes the immorality of the criminals' actions, one can wonder what responsibility a software developer has when its ineptitude or haste to market results in damage to its clients. It is the responsibility of every computer user to install the latest security updates.
case study:Due to the aftermath of COVID-19, the college must offer its lectures and tutorials using an online platform. However, the college does not have an online platform ready and available to accommodate online teaching and learning. The Information Technology department came up with the idea of introducing a new system called “LearnEaze” that will assist students in booking tutorials with different tutors. As a business analyst, the college wants you to assist them with designing and modelling the new application.
CASE STUDY: LearnEaze System
You have been contracted as a Business Analyst for the Goldleaf College of Science, Technology, and Innovation. Due to the aftermath of COVID-19, the college must offer its lectures and tutorials using an online platform. However, the college does not have an online platform ready and available to accommodate online teaching and learning. The Information Technology department came up with the idea of introducing a new system called…
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Similar questions
- Q2:A company supplies a Tax Returns Automation process to its clients, visiting their sites andinspecting their revenues for a given year, giving advice and completing the necessary formsfor Tax Returns purposes. Once the forms have been completed, they are saved as papercopies; one is kept by the client, the other is filed locally within the company’s paper-basedarchives. The corresponding electronic copies are also saved in a word-processor format andsaved on a local computer.The company is seeking to develop a more fully automated process: the tax consultantvisiting the client's premises periodically would log-in to an on-line application (within thecompany website) and input the data to an on-line form. The data collected would be usedto keep the clients informed of the results of the consultant’s visits and the date of the nextvisit.Considering the above scenario:a) List and describe at least THREE possible risks that the company will be likely to facewhen the new more…arrow_forwardCloud: A rapidly growing company has outgrown its computing e nvironment and needs to upgrade. The choice is whether or not to buy several expensive servers for use in house or to use a cloud computing service like the ones offered by Google and Amazon.comarrow_forwardPet NannyPet owners often have difficulty locatingpet-sitters for their pets, boarding their pets,or just getting the pets to the veterinarian.Recognizing these needs, Gladys Murphy decided to open Pet Nanny, a business providing specialized pet-care services to busy petowners. The company provides a multitudeof services, including pet grooming, massage,day care, home care, aromatherapy, boarding, and pickup and delivery. The companyhas been experiencing a steady increase indemand for its services.Initially, when the company was founded,all pet-care records were kept manually. However, Gladys recognized the need to updatePet Nanny’s existing systems and hired yourconsulting firm to design the system changes.Your analyst team has just completed therequirements structuring phase and has selected an alternative design strategy. You arenow ready to begin the systems design phase.During the analysis phase, you determined that several forms and reports werenecessary, including a Pet…arrow_forward
- Why might you choose to use a database over a document or spreadsheet? Database files are smaller and more easily sent between users Databases can show connections between different sets of data. Databases offer functions and formulas, while documents and spreadsheets do not. A database is automatically encrypted so it is more secure.arrow_forwardFresh-Mart Grocery is a regional grocery chain that is developing an information system to monitor inventory levels, product sales, and merchandise turnover. As products are sold in stores, they need to be replaced by shipments from the distribution centers. The IT manager wants you to document a process called BALANCE that determines whether extra product inventory is needed in a particular store. The BALANCE process is to be used in a just-in-time inventory system that automatically orders products and routes them to various stores for sale. A store manager can override the automatic BALANCE pro- cess if he or she so desires to get more product into a store.1. Create a decision table that describes the movement of inventory.2. Draw a decision tree that describes the merchandise inventory management process.arrow_forwardOperating System IoT devices have limitations in computing capabilities, memory availability, communication, and energy limitations. However, IoT devices are required to meet the needs of cyber physical systems, including reliability, real-time behavior, and an adaptive communication stack to be able to connect and integrate with the internet without obstacles. This is a challenge in implementing an Operating System for IoT devices that must meet these needs and can work with a wide range of hardware. This challenge poses the following questions a. RIOT implements a microkernel architecture inits development. What are the advantages of implementing the microkernel.b. What are the features and advantages of RIOT so that it can be called a bridge between the OS for Wireless Sensor Network and the complete OS that generally runs on Personal Computers.c. What are the development goals and objectives of IoT OS RIOTarrow_forward
- (Computerization of Health Records) A health care issue that has been in the news lately isthe computerization of health records. This possibility is being approached cautiously because ofsensitive privacy and security concerns, among others. Computerizing health records could make iteasier for patients to share their health profiles and histories among their various health care professionals. This could improve the quality of health care, help avoid drug conflicts and erroneous drugprescriptions, reduce costs and in emergencies, could save lives. In this exercise, you’ll design a“starter” HealthProfile class for a person. The class attributes should include the person’s firstname, last name, gender, date of birth (consisting of separate attributes for the month, day and yearof birth), height (in inches) and weight (in pounds). Your class should have a constructor that receives this data. For each attribute, provide set and get functions. The class also should include functions that…arrow_forwardMany computer hardware manufacturers rely on foreign companies to provide raw materials; build computer parts; and assemble hard drives, monitors, keyboards, and other components. While there are many advantages to dealing with foreign suppliers, hardware manufacturers may find certain aspects of their business (such as quality and cost control, shipping, and communication) more complicated when dealing with a supplier in another country. In addition to these fairly common business problems, hardware manufacturers are sometimes faced with serious ethical issues relating to their foreign suppliers. Two such issues that have recently surfaced involve (1) suppliers who run their factories in a manner that is unsafe or unfair to their workers and (2) raw materials suppliers who funnel money to groups engaged in armed conflict, including some that commit crimes and human rights abuses. In February 2009, alarming information came to light about the Meitai Plastics and Electronics factory in…arrow_forwardYG Entertainment (YGE) is a company dedicated to producing and distributing video clips specializing in hip-hop music. Born in the internet era, the company has actively supported laptops and tablets, so staff can easily work remotely. They can access the company databases through the internet and provide online information to customers. This decision to support remote work has increased productivity and high morale among employees who were allowed to work up to two (2) days a week from home. Based on written procedures and a training course, employees learn security procedures to avoid the risk of unauthorized access to company data. Employees’ access to the company data includes using log-on IDs and passwords to the application server through a virtual private network (VPN). Initial passwords are assigned by the security administrator. When the employee logs on for the first time, the system forces a password change to improve confidentiality. Management is currently considering ways…arrow_forward
- case study:A newly opened university would like to develop a student registration system (SRS) that can be deployed on any operating system.The new system will allow students to register for courses and view their semester results from any type of computer device. Lecturers will be able to access the system to sign in to access the courses that have been assigned to them as well as to record grades. The system should allow allcourses offered by the university to be maintained up-to-date and can be accessible through the Internet.The registrar’s office will maintain course information and grades. At the beginning of each semester, students may request/ access a list of course offerings for the semester. Information about each course, such as lecturers, departments, and any prerequisites, will be included (byregistrar’s office) to help students make informed decisions.The university should be able to allow students to sign in to select a number of course offerings for the semester. Each…arrow_forwardAn operating system (OS) serves as a link between people and hardware. An operating system manages files, memory, processes, input/output, and peripherals like as disc drives and printers. Famous operating systems include Linux, Windows, OS/400, AIX, and z/OS. Linux will be compared to Windows.arrow_forwardTourism and Information Technology The tourism industry comprises organizations involved in the production and distribution of travel and tourism products. It can be viewed as an umbrella industry with a complex distribution chain containing a set of interrelated businesses, such as transportation companies, accommodation facilities, attractions, food and beverage enterprises, intermediaries, and providers of recreation and leisure facilities, as well as a multitude of government agencies, according to Werthner and Klein (as cited in Gretzel & Fesenmaier, 2009). Information technology (IT) is defined as the collective term given to the most recent development in the mode (electronics) and machines (computers and communication technology) used for acquisition, processing, analysis, storage, retrieval, dissemination, and application of information (Haque & Rahman, 2012). In tourism, unlike other industries, it is not a physical product but information that moves from suppliers to…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning