Explain functional roles of information system, Computer Engineering

Assignment Help:

Q. Explain Functional Roles of Information System?

Functional Roles of Information System

1 Lower Costs -

a) Use IT to significantly reduce the cost of business processes.

b) Use IT to lesser the costs of customers or suppliers.

2 Differentiate

a) Develop new IT features to distinguish products and services.

b) Use IT characteristics to reduce the differentiation advantages of competitors.

c) Use IT characteristics to focus products and services at selected market.

3. Innovate

a) Create new products as well as services that include IT components.

b) Make radical transformation to business processes with IT.

c) Develop exclusive new markets with the help of IT.

4. Promote growth

a) Use IT to control regional and global business expansion.

b) Use IT to diversity as well as integrate into other products and services

5. Develop alliances

a) Use IT to create effective organizations of business partners.

b) Develop inter-enterprise information system correlated by the Internet and Entrants that support strategic business relationship with suppliers, customers, sub contractors and others.

6. Improve quality and efficiency

a) Use IT to dramatically get better the quality of products and services.

b) Use IT to make constant improvements to the efficiency of business processes.

c) Use IT to substantially shorten the time essential to produce, develop and deliver products and services.

7. Other strategies

a) Utilize inter-organizational information systems to create switching costs that locks in customers and suppliers.

b) Utilize investment in IT to build barriers to entry against industry outsiders.

c) Utilize IT components to make substitution of competing products unattractive.

d) Utilize IT to help share, create and manage business knowledge.


Related Discussions:- Explain functional roles of information system

Explain excess-3 and gray code using four binary digitis, Give the details ...

Give the details of excess 3 codes and gray code using four binary digits. Ans: Table of excess 3 codes and gray code using four binary digits Binary

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Explain is cgi a script or a program, The distinction is semantic. Traditio...

The distinction is semantic. Traditionally, compiled executables (binaries) are known as programs, and interpreted programs are usually known as scripts. In the context of CGI, the

What are the ways to truncate guard bits, What are the ways to truncate gua...

What are the ways to truncate guard bits? 1. Chopping 2. Von Neumann rounding 3. Rounding procedure.

Explain level of a node, Level of a node The root is at level zero and ...

Level of a node The root is at level zero and the level of the node is 1 more than the level of its parent

Describe buffer of receiving process, Q. Describe buffer of receiving proce...

Q. Describe buffer of receiving process? MPI_Gather (Sendaddr, Scount, Sdatatype, Receiveaddr, Rcount, Rdatatype,Rank, Comm): 'Using this function process with rank' rank

Survey of advanced applications, 1. Conduct a literature survey of advanced...

1. Conduct a literature survey of advanced applications of the finite element method for engineering design and analysis. 2. Identify at least one application, which interests y

First-order models -artificial intelligence, First-Order Models - Artificia...

First-Order Models - Artificial intelligence: We proposed first-order logic like good knowledge representation language rather than propositional logic because it is more expre

Designing e-cash based system, How can it be achieved in designing e-cash b...

How can it be achieved in designing e-cash based system? E-cash is essentially an online solution.  The buyer must validate the coins by the issuer in order to get the purchase

Carry look-ahead adder and booth''s algorithm, Describe carry look-ahead ad...

Describe carry look-ahead adder? Ans: The input carry required by a stage is directly computed from carry signals obtained from all of the preceding stages i-1,i-2,.....0, rat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd