What are the types of software applications

Assignment Help Management Information Sys
Reference no: EM131395922

Assignment

This assessment addresses the following course outcomes:

• Assess common hardware and software issues by logically applying fundamental IT tools and methods
• Determine basic hardware and software options that meet general technology needs for organizations
• Illustrate appropriate network and multi-user operating system methods that support key business objectives
• Identify information security procedures that reflect best practices for managing access and reducing risk to digital information stores

Scenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising company called MilleniAds. As a start-up, your client's company is relatively small and has a limited budget. There are only 10 employees, including a few creative directors, graphic designers, sales staff, a financial accountant, and an office administrator, with the entrepreneur acting as CEO. The current IT budget cannot exceed $25,000 and ideally should come in as far under that number as possible. MilleniAds will produce customized sales flyers, brochures, and other branded items, such as letterhead and business cards, that apply a youthful, fresh perspective targeting millennial demographics. Therefore, the company needs the ability to store and manipulate digital images and to produce physical copies of their products for their clients. The CEO wants to keep track of inventory, sales, and expenses digitally, but she does not anticipate having very complex records for the first year. She projects having only a dozen or so accounts but hopes to scale up in the coming years. It would be ideal to have a simple and user-friendly system for sharing information and files between employees. Many of the employees are millennials themselves who have indicated that their current desktop PCs are limiting their capabilities and that they prefer using their phones and other mobile devices for their professional and personal responsibilities. Two of the ten employees will operate primarily outside of the office, soliciting business from regional firms, and they will need to access company information while on the road, in their home offices, and at customer sites.

Beyond the specific information given above, you have the ability to fill in the gaps with assumptions or additional details that will make your final project unique and meaningful to you. If you have any questions, reach out to your instructor for guidance, and use the milestone assignments to ensure that you are completing your project within reasonable parameters for the course.

Prompt

Given the scenario above, what are the best hardware, software, networking, and information security options for addressing your client's business needs?

Specifically, the following critical elements must be addressed:

I. Business Needs: In this section, list and describe all of the business needs that you have been able to determine given the information in the provided scenario and your own choices for filling in the gaps. Be sure that you provide enough detail to fully support the rest of your report.

II. Hardware Components

a. Examine the business's issues to determine specific hardware requirements. Based on these issues, what are the major categories and components of hardware that should be considered? Identify each of the applicable requirements (hard drive storage, video cards, etc.), being sure to cite specific examples wherever appropriate.

b. Then, compare and contrast the various options for meeting the requirements. Be sure to cite specific evidence from the component specification fact sheets to support your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of cost and maintainability?

c. Compose a final list detailing all of your specific hardware recommendations for your client. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.

III. Software Applications

a. Examine the business's issues to determine specific software requirements. What are the types of software applications that should be considered? Identify multiple possible options within each category, being sure to cite specific examples wherever appropriate.

b. Then, compare and contrast the options you have listed. Be sure to cite specific evidence that supports your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of cost, vendor credibility, multi-user access, technical support, and integration?

c. Compose a final list detailing all of your specific software recommendations for your client. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.

IV. Networking Options

a. Examine the business's issues to determine network requirements. Illustrate your response with specific examples. For example, to what extent should there be access inside the business for mobile devices and remote personnel?

b. Then, compare and contrast the options for meeting the requirements. Be sure to cite specific evidence that supports your conclusions. How would you ensure security of information over the network? Which type of network connection is preferable?

c. Make final recommendations for network solutions based on your evaluation of the options. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.

V. Maintenance and Security

a. Interpret the business's needs to determine specific information regarding security requirements. Illustrate your response with specific examples. To what extent should unauthorized individuals be prevented from making changes, copying, or deleting files or data on the system?

Is there sensitive data for which access must be controlled? What sort of information should be backed up?

b. Then, compare and contrast the options for managing user access to company information. Evaluate each option for its strengths and weaknesses, citing specific evidence that supports your conclusions. Is there a need to have password setups for files? What type of naming conventions should the client use for files and directories? Should individual computer accounts be created? Should everyone have read access to all files?

c. Finally, compare and contrast the options for backing up and storing information, including how often to back up information, storage location, and who should have access to backing up the data. Evaluate each option for its strengths and weaknesses, citing specific evidence that supports your evaluation.

Reference no: EM131395922

Questions Cloud

In each definition identify the genus term : The following exercises involve constructing definitions:- Construct definitions by genus and difference for the given terms. In each definition identify the genus term.
Commonly debated issue in macroeconomic policy : A commonly debated issue in macroeconomic policy is whether or not the government should balance its budget. What is your stance on this issue and why? (If you can cite a study that supports your stance, it would be helpful.)
Money supply shifts : Explain why "money supply shifts" are important in macro-economics.
Discuss whether this admissions policy is justifiable : In the past few decades, women have been applying to college at a significantly higher rate than men. To achieve gender balance, some liberal arts colleges are favoring male applicants, defending the practice on the grounds that colleges where the..
What are the types of software applications : Examine the business's issues to determine specific software requirements. What are the types of software applications that should be considered? Identify multiple possible options within each category.
Find the etymological roots of the given words : Consult a dictionary to find the etymological roots of the given words, and then explain how they relate to the conventional meaning of these words.
Euro should appreciate or depreciate : Suppose prices are equal in Europe (in euros) and the US (in dollars) at the end of 2006. In 2007, prices increase by 3% in Europe (in euros) and 1% in the US (in dollars). According to PPP, the euro should appreciate or depreciate? By how much?
Depreciation of the dollar : Suppose that there is a 9 percent depreciation of the dollar. Will foreigners experience a net capital gain or loss? By how much (as a percent of U.S. GDP)? Show your work.
Forecast for the next five years : Analyze the history of changes in GDP, savings, investment, real interest rates, and unemployment and compare to forecast for the next five years.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Watch the video titled-agile soft skills

Consider the manner in which you usually react to conflict and determine your native conflict response behavior. Provide one (1) example that supports your conclusion. Note: This is a safe environment for everyone to share his / her personal exper..

  How technologies can bring value to business or organization

Explain why an Internet systems developer might choose one technology over another technology. Explain how these technologies can bring value to the business or organization.

  Specify the nature structure and types of products of apple

Specify the nature, structure, and types of products or services of Apple, and identify two (2) key factors in the organization's external environment that can affect its success. Provide explanation to support the rationale

  Describe the data flow process for a mobile order

Recently, a major hot beverage retail competitor established an order entry system whereby customers can place orders on a mobile app in advance of arriving at the retail outlet. Describe the data flow process for a mobile order that will be picked..

  Describe why you believe it is state or federal

How have various branches of the government influence the way we run our health facilities today and Is this primarily a federal or state role? Please explain why you believe it is state or federal

  Explain how does the selection of sap modules change

How does the selection of SAP modules change the overall implementation project as defined in the ASAP methodology?

  How to deploy and configure intranet and web applications

Propose the best way to plan, deploy, and configure the file servers. Determine how to deploy and configure the intranet and Web applications

  Define criteria for success for your application

Define criteria for success for your application. Assess how likely your application is to achieve success. Compare the potential benefit of your social networking application to the facilities management and scheduling application.

  Describe how information systems can support

Describe how information systems can support each of the following competitive strategies and identify the major type/types of information system/systems that exists/exist in the organisation you are working in, or any other organization you are de..

  Design and development for accountants

Update customer form created and update project form created - Information Systems Design and Development for Accountants

  Develop strategies that can give them comparative advantage

Perhaps it is true to state that advances in IT have been a stepping stone to organizations attempt to develop strategies that can give them a comparative advantage

  The vulnerability of transmitted information

The personnel manager has read an article about the vulnerability of transmitted information/data over a company network operating system. She is now somewhat concerned over the safeguarding of organizational data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd