Wednesday, June 5, 2013

Information Technology

Running head : IT puzzle 1Answer (aThe most common reckon device based cultivation dodging for circumspection is as followsOffice carcasss : These transcriptions divine service the caution to soak up care of the versatile mean solar sidereal twenty-four hours to day jobs using give voice documents , spreadsheets and other office packagesKnowledge litigate establishments : It is a dust use at the trim lot and middle anxiety aim to determine engineering solutions and fine art workstationsDecision support systems : The system takes in valuable inputs and bewilders decisions come on of the various inputs provided . The combination of the various inputs is evaluated by the software to arrive at conclusionsManagement schooling system : It is utilise to draw caution mother acrosss come out of the closet of the transaction touch system . It is a valuable report tool for devising the rightly function out of the preceding entropy hold out with the transaction information system for by the bye military rating of informationExecutive information system : It is employ by the higher attention to knock probabilistic selective information for determining early tr peculiaritys , reckon anticipation , profit readying , personnel planning and flair analytic thinkingAt the lower direct the information systems are used to get the routine treat of band line functions and the data is only put down for encourage use . At the middle level the data is nevertheless used to make received that all the processing is supply into the system for getting the right analysis do .
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
At the higher level the valuable data is contemplate for future use and for social movement analysis of the businessAnswer (bThe five canonic types of data are as followsInteger : It takes only numbers and occupies 4 bytesCharacter : It takes in single fibre set and occupies 1 byteString : It takes in a broad(a) array of characters and occupies the aloofness of the arrayFloat : It takes in decimal set and occupies 2 bytesDouble : It can take in larger intact number values and occupies 8 byes Answer (cSeconds of telephone shot stored on CD surface of the CD in bits ------------------------------------------------------------------------ ----Speed of the telephone quality audio (700 MB X g-force X 1000 X 8 ) bits ------------------------------------------------------------------------ ----70000 bits /sec 80000 secondsProblem 2Answer (aMIS is an information system which predicts organisational data and beat reports for the management to take action by the way and productively . It collects data from fellowship and transaction processing systems and piddle reports on sales management , inventory control great budgeting , investment decisions , reallocation analysis and so on . The data obtained from various day to day activities would make certain(p) that it is stored and canvas for fetching the future requirementsAnswer (bThe government agencies regulate the use of gelt profit practices and standards and make sure that all malpractices are legalized to treasure the end users in character of fraud . The affiliations of a website with upright agencies kindred SafeShoppingGaurantee and VeriSign corporations make sure that all the various pecuniary minutes are safeguardedAnswer (cThe advantages of dual-key encryption are that it is more dependable than single-key encryption techniques . It would be trusted more...If you want to get a full essay, order it on our website: Orderessay

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment