Business Information Systems

kirjoittanut Elizabeth Hardcastle
:
( 35 )
54 pages
Kieli:
 English
This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.
Tämä on ilmainen eKirja opiskelijoille
Rekisteröidy ja käytä ilmaiseksi
Kaikki oppikirjat ilmaiseksi, aina. Alle 15 % mainoksia
 
Ilmainen 30 päivän kokeilujakso
Yritystilaus ilmainen ensimmäisen 30 päivän ajan, ja sen jälkeen $5.99/kk.
Viimeisin lisäys
Description
Content

This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.

  1. Defining Information Systems
    1. Defining Data and Information
    2. Defining Systems
    3. Defining Information Systems
    4. Business Information Systems
    5. Types of business information system
  2. Hardware
    1. Input devices
    2. Central Processing Unit (CPU)
    3. Internal and External Memory
    4. Output devices
    5. Major categories of computers
  3. Software
    1. Systems software
    2. Application software
  4. Database Systems
    1. Organising data in a database
    2. Database Software
    3. Retrieving Data from a Database
  5. Networks
    1. Network components
  6. The Internet and World-Wide Web
    1. Web-Enabled Business
    2. Intranets and extranets
    3. The World Wide Web
    4. Web browsers and servers
    5. E-business
    6. E-commerce
  7. Acquiring Information Systems
    1. Bespoke development
    2. Off-the-shelf software
    3. End-user-developed software
    4. Factors affecting software acquisition
  8. Developing Information Systems
    1. The traditional waterfall model
    2. The systems development lifecycle
  9. Systems Development Methodologies
    1. SSADM
    2. Rapid applications development (RAD)
    3. The Capability Maturity Model
  10. Information Systems Security
    1. Security Threats to Information Systems
    2. Reducing the Threat to Information Systems
    3. Types of controls
    4. Techniques for controlling information systems
    5. Security Threats to Internet services