You are on page 1of 3

Source: https://www.youtube.com/watch?

v=dRXNhpwp5Vw
Source: https://www.youtube.com/watch?v=Nykwgpmrly0
 How does end-user computing help in optimizing end-users in an organization or
business?

End-user computing helps in optimizing end-user in an organization in such a way that they
can maximize productivity, efficiency, improved work/life balance, and complete flexibility. Also,
end-user computing can lower prices by experimenting with different utilization modeling
techniques and utilizing cloud-based solutions that would also want more control over how
end-user adapt to business needs to collaborate more effectively. Hence, it enables alternative
business models to enter markets ahead of rivals while also assisting end-users in becoming
more skilled, and it can result in a new environment that meets the needs of the business. It's
the flexibility of business processes delivered on the device of choice, no matter where the tasks
are performed, that stimulates the modernization workspace transformation, enabling end-
users to access information and applications they have to perform great even though they are
using mobile, ensuring a richer incorporate complex between people in the organization.

 What aspects of end-user computing and development would use consider if you are
to make an information system for end-users?
The aspects of user-developed applications, systems development practices, continuous
improvement methods, and policies and practices for end-user development were investigated
in organizations with various information systems strategies. The results revealed that the
companies' information systems strategies had little impact on end-user computing activities.
End-user computing was developed by functional specialists in the majority of these companies,
implying that they served as catalysts for developing integrated uses of information technology
in user departments where computing had previously been mainly valuable for production
excellence. Enhancing the end-user productivity and efficiency, end-user mobilization, reducing
irrelevant attributes in business operations, providing user-friendly and fast information
systems, lack of DP practitioner, and facing software challenges in the implementation by
moving processes to end-users that are viable.

 What possible applications for end-user computing can you think of for a specific
organization or business?
Microsoft Office is the general concept for the business's suite of personal and enterprise
programming interfaces. Microsoft Word is a word processor; Microsoft Excel is a software
package; Microsoft PowerPoint is used to create animated presentations; Microsoft Outlook is
used to manage email and calendars; Microsoft Access is used to manage databases, and
Microsoft OneNote is a point of clarification software. After establishing Office Mobile, which
offered financial versions of Office applications for mobile devices, Microsoft Office has become
available for mobile. Microsoft also offers Office Online, which is a web-based version of the
core Office apps that comes with a Microsoft account. Microsoft Office was also available with

This study source was downloaded by 100000845931553 from CourseHero.com on 04-28-2022 10:44:12 GMT -05:00

https://www.coursehero.com/file/87815194/04-ACTIVITY-1docx/
Apple's macOS, a move that was initially questioned due to Apple and Microsoft's feud but has
proved to be beneficial for both businesses.
Source: https://www.youtube.com/watch?v=XlcolUHMnh0
 How do the concepts/aspects/components from electronic communication systems
improve upon a management information system?
The concepts/aspects/components from electronic communication systems improve upon a
management information system in terms that it can provide a fast and inexpensive channel of
communication which means that they maximize the resources in communication. Thus, it can
be used in the availability like the network, internet, computing hardware, and telephony. Since
the MIS is the backbone of the organization’s operations, the aspects and components of the
electronic communication system are vital for the operation and business. Synchronous and
Asynchronous as the types, they can be a massive way to communicate in many ways that are
available anytime. Additionally, the Electronic Discussion is about an information system that
allows users to have textual or nontextual discussions to use an electronic medium. It makes use
of the same tools and information as other digital consulting organizations, but also in a unique
manner and for a specific goal. Lastly, Electronic Publishing refers to a possible aspect that
facilitates digital publication for textual and other forms that is readable.
 Can the discussed concepts/aspects/components for electronic communication
systems be implemented across all possible businesses and/or organizations? How?
These concepts/aspects/components for electronic communication systems can be freely
implemented across all possible businesses and/organizations. Especially the types in which
these concepts, the communication between the organizations makes it easier and convenient
for the users. The use of Synchronous and Asynchronous can be categorized by time and
availability. The Synchronous requires the users to be available at a certain time for
communication and interaction, like chat rooms, audio/video conferencing that needs a specific
communication platform. On the other hand, the Asynchronous is more on receiving emails,
forums, and also checking the online bulletin which comes with the flexibility of the availability
of the associate.
 Are there possible risks and/or limitations to consider before implementing electronic
communication system concepts/aspects/components?
There are possible risk and limitations to consider before implementing an electronic
communication system, they can be security issues that the data privacy might be the problem,
Plagiarism means that someone can steal and copy the inputted data and Public Opinion on
Business Model means that information on the internet is entirely free. Thus, Phishing can be a
risk that could be used in happens when an attacker poses as a trustworthy entity and convinces
a victim to open an email, instant message, or text message.
Source: https://www.youtube.com/watch?v=9kQ-66LWrnM
 How do the concepts/aspects/components from business telecommunications improve
upon a management information system?
Since companies and businesses depend on management information systems, it discovers
that telecommunication and networking are required as part of the implementation process. In

This study source was downloaded by 100000845931553 from CourseHero.com on 04-28-2022 10:44:12 GMT -05:00

https://www.coursehero.com/file/87815194/04-ACTIVITY-1docx/
the business sense, telecommunication entails exchanging information over a long distance,
allowing companies and organizations to have a wide, potentially global presence. Telephony,
fax, e-mail, and the Internet are examples of electronic and/or digital resources.
 Can the discussed concepts/aspects/components for business telecommunications be
implemented across all possible businesses and/or organizations? How?
In a business or organizational context, communicating connectivity refers to a company's or
organization's ability to communicate with other entities such as potential customers, branches,
and departments to simplify various processes or activities. The initial software applications
were available for processing. They are primarily responsible for recording, processing,
validating, and storing transactions that occur in different functional departments area of
business retrieval and use. It can keep track of business transactions and process data that
arises as a result of those transactions.
 Are there possible risks and/or limitations to consider before implementing business
telecommunications concepts/aspects/components?

There is a possible risk to consider before implementing business telecommunications concepts, in


terms of security issues. The sharpening and changing of their skills to take advantage of software
threats To combat these threats, business telecommunications will need to approach the issue of
operations and acquisitions with a thorough approach to data assets, wiretapping, and security flaws.
Also, phishing is often used to steal sensitive information from users, such as login credentials. It
happens when an attacker poses as a trustworthy entity and convinces a victim to open an email, instant
message, fax.

This study source was downloaded by 100000845931553 from CourseHero.com on 04-28-2022 10:44:12 GMT -05:00

https://www.coursehero.com/file/87815194/04-ACTIVITY-1docx/
Powered by TCPDF (www.tcpdf.org)

You might also like