You are on page 1of 3

NAME : AWIL MAALIM ABDULLAI

REG NO: BIT-1-9952-3-2018

UNIT CODE :BBIT 438

a) Enumerate the key driving forces behind the widespread use of information systems within
organizations. [5 Marks]
 Easier Decision Making - Without an information system, a company can take a lot of
time and energy in the decision-making process. However, with the use of IS, it’s easier
to deliver all the necessary information and model the results and this can help you make
better decisions. The management team can use the information system to choose the best
course of action and carry out the tasks.
 Behavioral Change - Employers and employees can communicate rapidly and more
effectively with an information system. While emails are quick and effective, the use of
Information systems is more efficient since documents are stored in folders that can be
shared and accessed by employees.
 Information Storage - Every organization needs records of its activities to find the cause
of problems and proper solutions. Information systems come in handy when it comes to
storing operational data, communication records, documents, and revision histories.
Manual data storage will cost the company lots of time, especially when it comes to
searching for specific data.
 Company Record-Keeping - Your company needs records of its activities for financial
and regulatory purposes as well as for finding the causes of problems and taking
corrective action. The information system stores documents and revision histories,
communication records and operational data.
 Perspective on Your Business Future -Any company manager who’s aiming to
improve has to establish a broader perspective with the help of a great MIS. Therefore, an
MIS can track the complete organisation within your company and enable an easier
method for analysing independent processes.
 Avoiding Crisis - Some time ago, companies weren’t able to analyze the share market and
their organisation at the highest level, which resulted in a devastating business crisis.
Using a high-quality information system, your company can analyze stocks and see their
past performance in order to predict a potential crisis.

b) Outline five key attributes of a good system analyst. [5 Marks]


 Analytical Skills
 Understanding
 Creativity

MISC322/BBIT 438/CISY 421/BSIS 316 Page 1 of 3


 Problem Solving Skills
 Systems Evaluation
c) Explain the various activities carried out during the system analysis phase. [5 Marks]
 Gather Detailed Information - This activity enforces system analysts to have a great
detail information from people who are working with or people who will be using the
system, either by conducting interview or watching them work and do such tasks.
Planning documents and policy statements are mostly reviewed to obtain additional
information.
 Define Requirements - After the information gathered, system analysts define
requirements for the new or upgraded system based on this information.
 Prioritize Requirements - Users and system analysts have to discuss to determine which
functions are truly important and which are fairly important but not really required.
 Develop User-Interface Dialogs-system analysts need to develop user-interface
prototypes on the actual devices which users will use and go on a demo to the users in
later stages.
 Evaluate Requirements with Users-Requirements models and prototypes are complete
and accurate by conducting the processes of eliciting requirements, building models and
prototypes, and evaluating them with users in many times.

d) Highlight the advantages of databases over file-based systems. [5 Marks]


 Data sharing – File system does not allow sharing of data or sharing is too complex.
Whereas in DBMS, data can be shared easily due to centralized system.
 Data concurrency – Concurrent access to data means more than one user is accessing
the same data at the same time. Anomalies occur when changes made by one user gets
lost because of changes made by other user. File system does not provide any procedure
to stop anomalies.
 Data searching – For every search operation performed on file system, a different
application program has to be written. While DBMS provides inbuilt searching
operations. User only have to write a small query to retrieve data from database.
 Data integrity – DBMS maintains data integrity by enforcing user defined constraints on
data by itself.
 Data security – A file system provides a password mechanism to protect the database
e) Discuss the key causes of system failure within organizations? [5 Marks]
 Failure to load software upgrades – Computer software often comes with various bugs,
or vulnerabilities. These are simply programming mistakes, but they can make the
software susceptible to viruses and glitches. When an error is discovered, the software
designer sends out a “patch” that requires
 Faulty hardware - Faulty hardware is a problem that can cause severe system failure. It is
also one that is hard to guard against. This factor is however an important one that should
be given due consideration along with the more common software errors

MISC322/BBIT 438/CISY 421/BSIS 316 Page 2 of 3


 Inadequate user training/ user error- This factor is an important contributor to system
failure. If a user is improperly trained then the likelihood of them making serious errors is
increased due to their lack of knowledge of the system.
 Poor fit between systems and organization. - A poor fit between the system and the
organization can lead to various problems. A poor fit between a system and an
organization occurs when either the software developers or the entity requesting the
software solution, do not grasp the full spectrum of tasks the new system will need to
deal with.
 Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during
normal operation, so it’s a good practice to back up stored data on a regular basis
f) Explain five types of E-commerce. [5
Marks]
 Business-to-Business (B2B) e-commerce encompasses all electronic transactions of
goods or services conducted between companies. Producers and traditional commerce
wholesalers typically operate with this type of electronic commerce.
 The Business-to-Consumer type of e-commerce is distinguished by the establishment of
electronic business relationships between businesses and final consumers. It corresponds
to the retail section of e-commerce, where traditional retail trade normally operates.
 Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions
of goods or services conducted between consumers. Generally, these transactions are
conducted through a third party, which provides the online platform where the
transactions are actually carried out.
 C2B there is a complete reversal of the traditional sense of exchanging goods. This type
of e-commerce is very common in crowdsourcing-based projects. A large number of
individuals make their services or products available for purchase for companies seeking
precisely these types of services or products.
 Consumer-to-Administration (C2A) - The Consumer-to-Administration model
encompasses all electronic transactions conducted between individuals and public
administration.

MISC322/BBIT 438/CISY 421/BSIS 316 Page 3 of 3

You might also like