Business Information Systems

par Elizabeth Hardcastle
:
( 35 )
54 pages
Langue:
 English
This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.
Ceci est un eBook gratuit pour les étudiants
Inscrivez-vous gratuitement
Tous les livres pour étudiants sont gratuits, sans exception. Moins de 15% de publicités dans les livres.
 
Premier mois gratuit
Abonnement pro gratuit les 30 premiers jours, puis$5.99/mois
Dernière publication
Description
Content

This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.

  1. Defining Information Systems
    1. Defining Data and Information
    2. Defining Systems
    3. Defining Information Systems
    4. Business Information Systems
    5. Types of business information system
  2. Hardware
    1. Input devices
    2. Central Processing Unit (CPU)
    3. Internal and External Memory
    4. Output devices
    5. Major categories of computers
  3. Software
    1. Systems software
    2. Application software
  4. Database Systems
    1. Organising data in a database
    2. Database Software
    3. Retrieving Data from a Database
  5. Networks
    1. Network components
  6. The Internet and World-Wide Web
    1. Web-Enabled Business
    2. Intranets and extranets
    3. The World Wide Web
    4. Web browsers and servers
    5. E-business
    6. E-commerce
  7. Acquiring Information Systems
    1. Bespoke development
    2. Off-the-shelf software
    3. End-user-developed software
    4. Factors affecting software acquisition
  8. Developing Information Systems
    1. The traditional waterfall model
    2. The systems development lifecycle
  9. Systems Development Methodologies
    1. SSADM
    2. Rapid applications development (RAD)
    3. The Capability Maturity Model
  10. Information Systems Security
    1. Security Threats to Information Systems
    2. Reducing the Threat to Information Systems
    3. Types of controls
    4. Techniques for controlling information systems
    5. Security Threats to Internet services