Business Information Systems

door Elizabeth Hardcastle
Beoordeling :
( 35 )
54 pages
Taal:
 English
This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.
Dit is een e-boek voor studenten
Meld je aan voor gratis toegang
Titels voor studenten zijn altijd gratis. Minder dan 15% advertenties
 
Gratis 30 dagen uitproberen
Het zakelijk abonnement is gratis voor de eerste 30 dagen, daarna$5.99/maand
Recente aanwinst
Description
Content

This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.

  1. Defining Information Systems
    1. Defining Data and Information
    2. Defining Systems
    3. Defining Information Systems
    4. Business Information Systems
    5. Types of business information system
  2. Hardware
    1. Input devices
    2. Central Processing Unit (CPU)
    3. Internal and External Memory
    4. Output devices
    5. Major categories of computers
  3. Software
    1. Systems software
    2. Application software
  4. Database Systems
    1. Organising data in a database
    2. Database Software
    3. Retrieving Data from a Database
  5. Networks
    1. Network components
  6. The Internet and World-Wide Web
    1. Web-Enabled Business
    2. Intranets and extranets
    3. The World Wide Web
    4. Web browsers and servers
    5. E-business
    6. E-commerce
  7. Acquiring Information Systems
    1. Bespoke development
    2. Off-the-shelf software
    3. End-user-developed software
    4. Factors affecting software acquisition
  8. Developing Information Systems
    1. The traditional waterfall model
    2. The systems development lifecycle
  9. Systems Development Methodologies
    1. SSADM
    2. Rapid applications development (RAD)
    3. The Capability Maturity Model
  10. Information Systems Security
    1. Security Threats to Information Systems
    2. Reducing the Threat to Information Systems
    3. Types of controls
    4. Techniques for controlling information systems
    5. Security Threats to Internet services