1. Explain the difference between batch processing and transaction (real time) p
ID: 673952 • Letter: 1
Question
1. Explain the difference between batch processing and transaction (real time) processing. Describe a company (real or imagined) that uses batch processing (3-5 sentences). Do the same for a company that uses transactional processing.
2. Explain what an ERP system is and what it does for a business. Elaborate on the advantages and disadvantages of an ERP system in a manufacturing business.
3. What are the two types of knowledge discussed in this course? Explain each and provide an example.
4. Name and describe the function of at least three participants in a Systems Development team. Be sure to mention how they work collaboratively to accomplish their goal.
5. Name at least three project management tools and briefly describe the function they perform
6. Privacy at work is defined in company policies and procedures, describe one example of when a worker does something that could be a breach of these rules.
7. Many mistakes are blamed on computer error, list and describe at least three common errors that are actual caused by human error.
8. Name 5 ways that a computer can be the object of a crime.
9. Two computer-related scams are phishing and vishing. Describe each one, pointing out the difference.
10. What are the phases of the Systems Development Life Cycle? Name each phase and describe what happens to the project at that time.
Explanation / Answer
1. Batch processing means your sales team or other employees would gather information throughout the day or a specified period of time and all that information would be entered into the system all at once. This process works for payment processing and printing shipping labels and packing slips. However, this method also means waiting to do everything at once and relying on the ability of your system to handle it all.
Real-time processing, on the other hand, processes each of the transactions and enters the information into your system immediately. This means your salespeople and other employees must be connected at all times to ensure all information is integrated and synced at the exact time it is entered
Online processing is just like live processing in that case if user input some data by filling input form on any site then it get processed and data fetch from the database online at the same time. The online processing involves database servers, files on hosting and browser to communicate effectively and do fast work to be responsive. As the name suggests it is online so that mean it is live to action. The processing just on time.
In batch systems the data enter at any time may get processed days later. For example data collected about salaries and other transactions about customers get processed later at the date when reports are generated. Similarly inventories and salary distributed is processed later. So this batch processing is schedule based in which processing get time schedule of when to process data
2. ERP or Enterprise Resource Planning is an important enterprise application that integrates all the individual department functions into a single software application.
ERP Systems make it easier to track the workflow across various departments. They reduce the operational costs involved in manually tracking and (perhaps) duplicating data using individual & disparate systems. In this article, let us have a look at the advantages and dis-advantages of implementing ERP (Enterprise Resource Management) Software Systems.
Advantages of ERP (Enterprise Resource Planning) System:
1. Complete visibility into all the important processes, across various departments of an organization (especially for senior management personnel).
2. Automatic and coherent workflow from one department/function to another, to ensure a smooth transition and quicker completion of processes. This also ensures that all the inter-departmental activities are properly tracked and none of them is ‘missed out’.
3. A unified and single reporting system to analyze the statistics/status etc. in real-time, across all functions/departments.
4. Since same (ERP) software is now used across all departments, individual departments having to buy and maintain their own software systems is no longer necessary.
5. Certain ERP vendors can extend their ERP systems to provide Business Intelligence functionalities, that can give overall insights on business processes and identify potential areas of problems/improvements.
6. Advanced e-commerce integration is possible with ERP systems – most of them can handle web-based order tracking/ processing.
7. There are various modules in an ERP system like Finance/Accounts, Human Resource Management, Manufacturing, Marketing/Sales, Supply Chain/Warehouse Management, CRM, Project Management, etc.
8. Since ERP is a modular software system, its possible to implement either a few modules (or) many modules based on the requirements of an organization. If more modules implemented, the integration between various departments may be better.
Disadvantages of ERP
1. The cost of ERP Software, planning, customization, configuration, testing, implementation, etc. is too high.
2. ERP deployments are highly time-consuming – projects may take 1-3 years (or more) to get completed and fully functional.
3. Too little customization may not integrate the ERP system with the business process & too much customization may slow down the project and make it difficult to upgrade.
4. The cost savings/payback may not be realized immediately after the ERP implementation & it is quite difficult to measure the same.
5. The participation of users is very important for successful implementation of ERP projects – hence, exhaustive user training and simple user interface might be critical. But ERP systems are generally difficult to learn (and use).
6. There maybe additional indirect costs due to ERP implementation – like new IT infrastructure, upgrading the WAN links, etc.
7. Migration of existing data to the new ERP systems is difficult (or impossible) to achieve. Integrating ERP systems with other stand alone software systems is equally difficult (if possible). These activities may consume a lot of time, money & resources, if attempted.
8. ERP implementations are difficult to achieve in decentralized organizations with disparate business processes and systems.
4
A project manager is responsible for coordinating the various team members and the resources to complete a project on time. Project managers need a number of different skills, including technical, business and people skills. They need to be up-to-date on different approaches to system development but are not likely to do any programming themselves.
A project manager is responsible for controlling the quality of the system being developed, bringing personnel on board and training them, facilitating communications among team members and acquiring the various resources needed to support the activities of the various members of the development team. If you think of system development as building a house, a project manager has similar tasks to a construction manager or construction superintendent.
A system analyst is a professional with expertise in analyzing and designing business systems. A system analyst plays a critical role in understanding how the current systems operate and developing new systems that meet specific objectives. In the analogy of building a house, the system analyst is like the architect. A design for a new system is very much like a blueprint for a house and provides detailed specifications for what the final system is supposed to look like and how it is supposed to work.
A programmer is a technical specialist responsible for developing specific computer programs that meet the specifications. This includes writing the actual code that makes the program work. Like a contractor working on a building by following the blueprint from the architect, a programmer implements the system design specified by the system analyst. Writing code is often one of the more time consuming parts of system development, in particular if many components have to be custom build. A system design developed by a single system analyst may require a number of different programmers to develop.
5.
1 - Time
A project's activities can either take shorter or longer amount of time to complete. Completion of tasks depends on a number of factors such as the number of people working on the project, experience, skills, etc.
Time is a crucial factor which is uncontrollable. On the other hand, failure to meet the deadlines in a project can create adverse effects. Most often, the main reason for organizations to fail in terms of time is due to lack of resources.
2 - Cost
It's imperative for both the project manager and the organization to have an estimated cost when undertaking a project. Budgets will ensure that project is developed or implemented below a certain cost.
Sometimes, project managers have to allocate additional resources in order to meet the deadlines with a penalty of additional project costs.
3 - Scope
Scope looks at the outcome of the project undertaken. This consists of a list of deliverables, which need to be addressed by the project team.
A successful project manager will know to manage both the scope of the project and any change in scope which impacts time and cost.
Planning Projects
Sharing and collaborating on documents
Managing Tasks
6. When a person breaches a legal obligation, or falls short of fulfilling an obligation, it is considered negligence. In some cases, a person is considered criminally negligent. For example:
When a person is negligent or careless in a way that causes harm to someone else, the victim of the negligence can sue. This is called civil liability or civil negligence.
There are lots of examples of negligence that can lead to a civil lawsuit. For example:
7.
Human error happens for many reasons, but in the end it almost always comes down to a mismatch between a human operator’s mental model of the IT environment and the environment’s actual state. Sometimes this confusion arises from poorly designed status feedback mechanisms, such as the perplexing error messages that Paul Maglio and Eser Kandogan discuss elsewhere in this issue (see “Error Messages: What’s the Problem?” on page 50), but other times the mismatch simply arises from a lack of experience on the operator’s part, or worse, to quirks of human cognitive processing that can obstinately steer even an experienced operator toward the wrong conclusion.1 Regardless of the source, however, psychology tells us that mental-model mismatches, and thus human error, are inevitable in the rapidly changing environments characteristic of IT systems
Many advances have been made in our understanding of the hardware and software of information processing systems, but one major gap remains: the inclusion of the human operator into the system analysis. The behavior of an information processing system is not a product of the design specifications: it is a product of the interaction between the human and the system. The designer must consider the properties of all the system components -- including the humans -- as well as their interactions. The various technical publications of the field attest to a concern with software and hardware, but emphasis on human functionality and capability is lacking. Many failures of information systems are attributed to human error rather than to the design. We are going to suffer continued failures until we learn to change our approach.
8. Crimes that use computer networks or devices to advance other ends include:
The unsolicited sending of bulk email for commercial purposes (spam) is unlawful in some jurisdictions.
Phishing is mostly propagated via email. Phishing emails may contain links to other websites that are affected by malware.[13] Or, they may contain links to fake online banking or other websites used to steal private account information.
Obscene or offensive conten
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be legal.
The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs
Harassment
Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Any comment that may be found derogatory or offensive is considered harassment. Harassment targeting women and children in the internet also includes revenge pornography whereby the perpetrator satisfies his anger and frustration for a broken relationship through publicising false, sexually provocative portrayal of his/her victim, by misusing the information that he may have known naturally, and that he may have stored in his personal computer, or may have been conveyed to his electronic device by the victim herself, or may have been stored in the device with the consent of the victim herself; and which may essentially have been done to publicly defame the victim.".
9.
Phishing
On the Internet, "phishing" refers to criminal activity that attempts to fraudulently obtain sensitive information. There are several ways a scam artist will try to obtain sensitive information such as your social security number, driver's license, credit card information, or bank account information. Sometimes a scam artist will first send you a benign email (think of this as the bait) to lure you into a conversation and then follow that up with a phishing email. At other times, the scam artist will just send one phishing email.
Here are some questions to ask if you think you have received a phishing attack:
Vishing
Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
To avoid being fooled by a vishing attempt:
10
Conduct the preliminary analysis: in this step, you need to find out the organization's objectives and the nature and scope of the problem under study.
Systems analysis, requirements definition: Defines project goals into defined functions and operation of the intended application. It is the process of gathering and interpreting facts, diagnosing problems and recommending improvements to the system. Analyzes end-user information needs and also removes any inconsistencies and incompleteness in these requirements.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.