Introduction to information systems for an example

Assignment Help Basic Computer Science
Reference no: EM131348913

Review Figure 2.1 in Introduction to Information Systems for an example of a flowchart.

Scenario:

Mary Smith, a former student at the local college, has been expanding her online business, Mary's MediBracelets, in the local college's incubator.

Mary has determined that her product, a specialized medical ID bracelet, is nearly ready to be sold and she needs someone to set up her initial website and business systems. Mary wants to include a charitable component to her business and is considering using a sales model in which her business will provide one free bracelet to a low-income senior citizen for every bracelet purchased.

Mary has hired your small business, IT Business Services Consultants, to develop her website and business systems.

Write a 2- to 3-page report for the client including the following:

  • A description of the relationship between business processes and information systems
  • A flowchart for handling an online order
  • Areas for Information Systems (IS) use and security concerns
  • A list of areas of concern for ethical handling of customers' private information

Reference no: EM131348913

Questions Cloud

Develop an educational activity based around the nhpa : NURS13137 Written Assessment - Task Description. For this assessment you will plan and develop an educational activity based around the NHPA of diabetes mellitus
Advantages and disadvantages of electronic communication : Discuss the advantages and disadvantages of electronic communication in one specific situation. Make sure you identify the situation.
What role government can play in making healthy choices easy : English 1020- Write a research paper about What role the government can play in making healthy choices easier in America.
Create a rural response plan to the health condition : create a rural response plan to the health condition. Be adapted from the urban response.- Consider the differences in geography, culture, and so forth.
Introduction to information systems for an example : Mary Smith, a former student at the local college, has been expanding her online business, Mary's MediBracelets, in the local college's incubator.
Common security threats against wired and wireless devices : Describe at least two common security threats against wired and wireless devices and typical countermeasures used by corporate security teams Describe at least two Identity & Access Management tools needed to measure and monitor security risks acr..
Analyse the article or case study from ethical theories : Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well-reasoned arguments for your assessments and recommendations
Differences between virtualisation architecture : Research virtualisation architecture and explain how it is different from client/server architecture. focus on virtualisation architecture and client/server architecture. Reflect on the differences between virtualisation architecture and client/ser..
Should be a different standard of behavior in workplace : Discuss how a court should determine what constitutes sexual harassment and what does not. Should culture play any part in that determination?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Swapping the processes

What are conditions on which deadlock can occur while swapping the processes?

  Evolution of imperative programming languages

In the evolution of imperative programming languages, features have been introduced, whilst other features have been removed or deprecated in 'successor' languages.

  What are the primary components of a wlan

Why does implementing RTS/CTS help speed data transmission?

  Identify people to interview to learn new training activity

Draft a project scope statement for the TIMS system and describe the constraints. She said be specific. Need to identify the people want to interview to learn more about the new training activity, and prepare a list of the questions I will ask.

  Describe the network configuration and network appliances

Describe the network configuration and network appliances

  16-bit 2''s complement numbers

Convert the following numbers to 16-bit 2's complement numbers (display results in hexadecimal)

  Ospf setting on the neighboring routers

You mentioned in a previous question of mine that one of the reasons why OSPF routers won't form adjacencies is that because it's possible that the OSPF setting on the neighboring routers don't match. What settings exactly?

  Does the ap need to have two mac addresses in this case

An AP may connect a wireless network to a wired network. Does the AP need to have two MAC addresses in this case

  Vulnerabilities the terms threat

Topic 1: Threats, Risks, and Vulnerabilities The terms threat, risk, and vulnerability are sometimes used interchangeability. However, these terms have distinct meanings and must be used properly when conducting risk assessments and protecting sys..

  Discuss ways to prevent node capture in sensor networks

Encryption is very difficult to implement in sensor networks. However, there have been several papers exploring limited ways of doing this. Look for one or two papers and discuss what approaches are being used.

  Briefly describe what the notion

Briefly describe what the notion of "normal operation" means to an executing computer program

  Explain company-s business intelligence products and service

Go to IBM.COM discover all company's business intelligence (BI) products and services Explain their process in minimum of half page to full page.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd