Wednesday, July 15, 2015

Chapter 4 Summary

Q1: What Do Business Professionals Need to Know About Computer Hardware?
 
Hardware consists of electronic components and related gadgetry that input, process output and store data according to instructions from software. Basic components are: input hardware (keyboard, mouse), CPU, dual/quad processors, memory, RAM, special function cards, output hardware (video, printers, speakers) and storage hardware. Computer data is represented using binary digits called bits. Bytes of data are stored in the following from smallest to largest: byte, kilobyte, megabyte, gigabyte, terabyte.
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 kilobytes = 1 megabyte
ect.
Managers need to know how a computer works so information systems works better. Cache and memory are volatile, they are wiped when power is lost.  Magnetic and optical disks are non volatile.
 
Q2: What Do Business Professionals Need to Know About Software?
 
 The four major operating systems are Windows, Mac OS, Linux and Unix.  Computer programs are licensed to use by the creators of the software.  Application software are programs such as Microsoft Word or Excel. Horizontal-Market Application are programs such as Word, Excel, and PowerPoint.  Vertical Market Application is that serves the need of a specific industry such as programs used by dental offices. One of a kind application is software that serves only one unique need such as IRS software. In terms of buying software, there are off the shelf software, off the shelf software with alterations, and custom developed software. Firmware is software that is installed in a piece of hardware.
 
Q3: Is Open Source Software a Viable Alternative?
 
A GNU is a set of tools for creating free Unix-like operating system. Open source is used quite often and is a powerful asset in conjunction with the internet. Open source means that the source code is available to everyone on the internet. Machine code uses source code but it cannot be altered. Closed source means the source code is highly protective.  According to “The Economist”, open source is entirely viable as long as some proprietary content is used.
 
Q4:  What Are the Differences Between Native and Thin-Client Applications?
 
Mac OS and iOS applications are constructed using Objective-C, Linux applications using Java, and Windows applications are constructed using C#, VB.NET, C++ and others.  All these languages are object-oriented which means they can be used to create difficult, complex applications, and if used properly, will result in high-performance code that is easy to alter when requirements change.  Thin-client applications run inside a browser such as Firefox, Chrome, Opera, or Internet Explorer.  The browser handles the idiosyncrasies of the operating system and underlying hardware.  Thin-client applications can be written by professional programmers and most are.  However, it's possible for technically oriented Web developers and business professionals to develop them as well.
 
Q5:  Why Are Mobile Systems Increasingly Important?
 
Mobile systems are information systems that support users in motion.  Mobile systems users access the system from any place.  A mobile device is a small, light-weight, power-conserving, computing device that is capable of wireless connectivity.  Almost all mobile devices have a display and some means for data entry.  They include smartphones, tablets, personal digital assistants, and small light laptops.
 
Q6:  What Characteristics Quality Mobile User Experiences?
 
A user interface is the presentation format of an application  It consists of windows, menus, icons, dialog boxes, toolbars, and so on as well as user content.  A user experience is a newer term that refers not only to the UI but also to the way the application affects the user's emotions and motivation to continue to use the interface.  Direct interaction is using content to drive application behavior.  Charms are icons that slide in from the right of the display which is common in things like Windows 8.  Roaming occurs when users move their activities, especially long-running transactions across devices.
 
Q7:  What Are the Challenges of Personal Mobile Devices at Work?
 
Since employees are already using mobile devices for their own purposes, they need less training and can be more productive.  All of this means reduced support costs.  However, there is the real danger of lost or damaged data.  When data is brought into employee-owned computing devices, the organization loses control over where it goes or what happens to it.  Also, if an employee loses their device, the data goes with it and when the employees leave the organization, the data on their personal devices needs to be deleted somehow.  Organizations also lose control over the updating of software and the applications that users employ.  This control loss leads to compatibility problems.  A BYOD is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business.

No comments:

Post a Comment