efficiently with their suppliers. The two system strategy constraints that AC palace limited may face. The information strategy is an essential feature in IT to provide them with better bargaining power. One of the strategies that can be used in the company is Short term: It enables stability and quick wins, as well as more frequent target achievement and achievement of goals. However, on the long run, it can result with massive problems. Existences only of a short-term focus will lead to a long-term deceive or death of the company. It is like running with your head down and your sight on just couple of meters in front of you. For example, Nokia, A world market leader producing mobile phones known for their reliability, hardware, battery etc. won all the battery against other productions but lost the war with heavy casualties. They did not predict that mobile software such as android. Lack of awareness on the impact of IS: The impact of IS on today’s organizations are huge. IS are everywhere, IS enables efficiency and control and transparency in business, due to the IS organization can produce. -custom data to help with a specific task or decision making. -custom format which can be tailored to the user’s need. -real time data, particularly useful where fast action is needed. And many more operations efficiencies, cost reduction, better customer service. Due to the different pandemic such as disaster, the company revenue is being affecting on the market share. It has to redefine business the strategy that been concluded is to improvise the long term business for organization to produce more product to serve the AC more sufficient product with lowering the cost as well so that they would not want to switch to other supplier for the products. Moreover, the focus of the organization should not be left in short term as they need to grow and expand the business to reach the expected target of revenue and sales in a year to sustain the business throughout. Question B) Data mining is a process of segregating informational data from a vast ocean of data in a company, resulting in obtaining of valuable information that helps the organization to optimize its performance. Data mining can be done using several tools such as R-Programing, WEKA, Data Melt, etc. The information obtained from data mining can be used for management analysis, risk management, corporate analysis, and customer management. Therefore, given AC’s current situation, data mining process could be used to obtain data to estimate possible risks that they could face due to the pandemic – such as reduced revenue and loss of customer engagement. Therefore, AS’s could use the data obtained via data mining, collaborate with delivery partners to venture in online delivery systems – to encourage customers to continue purchasing their goods although they are unable to physically go to the stores. Therefore, an element of business intelligence is at place here, helping the company to analyze the risks that could challenge their revenue increase and strategize contingency plans that will help them redefine their business. Expert systems: combination of computer equipment and software to resemble human reasoning. Expert systems are a form of artificial intelligence that could provide organizations with specific, focused explanations to users including facts, numbers, cases, and models. Systems like these are often used in the pharma field, sales, and finance. Expert systems help companies in solving problems that had or may arise given the market situation. The expert systems have four main roles – diagnosing, interpreting, predicting, and instructing. Therefore, AC’s may use and expert system that could collect data on possible problems the company might face and generate adequate solutions and suggestions that could help the company to keep its business afloat and obtain revenue. The advantage of using an expert system is that the diagnosis and solutions are based on human logic, hence it is assured that the initiatives and decision made by AS’s would be effective. Question c) Supply chain uncertainty factors are known as decision making process that helps to make decision when a decision cannot be decide due to the lack of transparency in the supply chain towards the impact of possible action. The uncertainty factors that AC may experience by all the suppliers due to this pandemic is late deliveries. Late deliveries may happen by receiving the stocks from all the supplier may be late because of the lockdown areas that the partners are not allowed to send the products out on the current date. Thus, the prices might fluctuate and the discounts from the suppliers might be affected to since the price can be vary despite shipping and this may cause AC to invest more money towards the product and stock they been receiving. Due to this, it may cause inaccurate demand forecasting towards the suppliers and inflated orders might increase the prices of the due to the demand of the product and stocks that needs by the company which is AC. Inaccurate demand forecasting: Inaccurate demand forecasting can lead to the accumulation of excess stock or, the reverse – issues with product availability. Both are unwelcome problems for inventory planners! Customers have zero tolerance for out of stock scenarios. Ensuring stock availability keeps positive reviews flowing. The information technology that can be recommended to overcome the uncertainty factors Information technology could help AC in ensuring effective tracking and delivery services. Technology plays a vital role in increasing product delivery service, which could increase customer retention and encourage them to repeat business with AC. IT could develop mechanisms where customers could interact with delivery partners to track their packages – increasing customer’s sense of control leading to a sense of fulfilment. When customers perceive effective communication with delivery partners and are satisfied with the customer service facilities, they are more likely to repeat orders and continue being in business with AC. Moreover, IT could help companies by providing increased visibility over the production process. A vital component to production processes is having a clear sight on the manufacturing activities. Technology helps companies to oversee the production in stage – providing opportunity to predict any delays they might face and align schedules accordingly. The use of technology could help AC to experience transparency of the whole production and manufacturing process – having more control on the product and information flow across the supply chain. Question D) i. Increased Employee Productivity: A disaster recovery will have to be executed by the right people. When specific roles and responsibilities are assigned in advance, effectiveness and productivity will both increase. Disaster recovery can mean having at least two people that are capable of handling the same task. Such redundancies can prove to be incredibly beneficial in the long run. When multiple employees are capable of handling a given task, organizations can benefit from peace of mind relating to overall the integrity of the network. Greater Customer Retention: Clients today expect nothing short of perfection and reliability. They are not forgiving in the case of failures or downtime. When a certain business cannot meet their expectations, clients will simply move on to another service provider. Disaster recovery enables businesses to maintain a high service quality, regardless of the circumstances. Reacquiring an old customer in the result of an IT disaster can be nearly. It is especially true for B2B service providers. The integrity of your business will affect the integrity of client enterprises. ii. The backup Location that is suitable for AC is Hot Site for CIO. It is a backup which is up and running continuously. A hot sites allows a company to continue normal business operations with every short period of time after a disaster. A Hot Site can be defined as a backup site, which is up and running continuously. A Hot Site allows a company to continue normal business operations, within a very short period of time after a disaster. Hot Site can be configured in a branch office, data center or even in cloud. Hot Site must be online and must be available immediately. Hot site must be equipped with all the necessary hardware, software, network, and Internet connectivity. Data is regularly backed up or replicated to the hot site so that it can be made fully operational in a minimal amount of time in the event of a disaster at the original site. Hot Site must be located far away from the original site, in order to prevent the disaster affecting the hot site also. Fully redundant equipment, zero data loss, near real time data synchronization, Although hot site is expensive, but it keeps running continuously and update. Hot site allows a company to work in a very short period of time after a disaster whereby this can be configured from any location and the data is also regularly backup or replicated to the hot site so that it can be made fully operational in a very minimal amount of time. Moreover, this must be located distance away from the current site to prevent disaster to happen. iii. Malicious Attack means intentional hacking, damaging, corrupting or misusing the Insured’s Computer Systems, including Unauthorized Access or the insertion of Malicious Code by a third party or an employee. A Malicious Attack does not include hacking or the insertion of Malicious Code by a Senior Executive if such insertion of Malicious Code by a Senior Executive is intentional and with intent to cause harm. The malicious software that can be used in the AC is Firewall. It is meant to provide protection against external damages. When talking about computers, it means providing protection against threats lurking on the internet or other networks. One example of such a threat is malicious software known as malware. Malware is a virus or spyware that infects or infiltrates your computer to collect or modify sensitive data or to disrupt certain system functions. In extreme situations, it can completely cripple the operating system. A firewall can prevent this from happening. By definition, a firewall acts as a kind of checkpoint positioned between the internet or another network and the local computer. It checks the access rights of programs and remote computers in both directions. The firewall’s configuration thus determines whether programs installed on your computer can access the internet and vice versa. The firewall also controls communication between your computer and other computers within a network. It is important to understand that a firewall does not recognize whether something is malicious or harmless. All it does is monitor access between your computer and a network in both directions. The firewall uses a set of previously defined rules to determine whether it is malicious or not.