• No results found

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

N/A
N/A
Protected

Academic year: 2021

Share "Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Unit Title: Information Systems Applications for Business

Unit Reference Number: H/601/3904

Guided Learning Hours: 160

Level: Level 5

Number of Credits: 18

Learning Outcome 1

The learner will: Understand the functions and operating modes of different business information systems.

Assessment Criteria

The learner can:

Indicative Content

1.1 Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current examples.

1.1.1 Categorise computer systems according to their primary business functions.

1.1.2 Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current business examples.

1.2 Relate each type of system to the information needs of different levels of management.

1.2.1 Show how the separate levels of management require different types of information.

1.2.2 Relate the information needs of each level of management to particular categories of computer system.

1.3 Distinguish between batch, online and real-time operating modes.

1.3.1 Distinguish between batch, online and real-time operating modes.

1.3.2 Choose appropriate operating modes for common business processes and justify their selection.

Learning Outcome 2

The learner will: Understand the features and business benefits of Local Area Networks (LANs).

Assessment Criteria

The learner can:

Indicative Content

2.1 Compare the commonly used LAN topologies, using diagrams where appropriate.

2.1.1 Explain the concept of a local area network (LAN). 2.1.2 Compare the commonly used LAN topologies, and, with the aid of diagrams, illustrate their components and

(2)

2.2 Assess the benefits and drawbacks of employing LANs in business applications.

2.2.1 Describe the potential benefits of using a LAN in a typical business setting.

2.2.2 Assess the possible pitfalls of the use of LANs.

Learning Outcome 3

The learner will: Understand the features of Wide Area Networks (WANs) and the various communication technologies needed for their support.

Assessment Criteria

The learner can:

Indicative Content

3.1 Distinguish between LANs, WANs and Metropolitan Area

Networks (MANs) in terms of their major components and applications.

3.1.1 Distinguish between LANs, WANs and MANs in terms of their configuration and applications.

3.1.2 Identify, and explain the function of, each of the layers of Open Systems Interconnection (OSI) 7 layer model.

3.2 Compare the main communication

technologies in terms of media and channel capacities.

3.2.1 Identify the main media used for data transmission and compare their properties.

3.2.2 Describe, with the aid of diagrams, the media and devices used in typical LANs and WANs.

3.3 Explain the term Distributed Information System (DIS) and construct diagrams to compare alternative DIS structures.

3.3.1 Explain the term Distributed Information System (DIS), and justify the separation of a business application across several tiers.

3.3.2 Provide examples of DIS applications and construct diagrams to compare alternative DIS structures.

Learning Outcome 4

The learner will: Understand the impact of the internet and other technologies on business models and commercial activities.

Assessment Criteria

The learner can:

Indicative Content

4.1 Distinguish between the common e-commerce business models

employed on the internet, using examples.

4.1.1 Explain the term e-commerce and name the common business models supported by the internet.

4.1.2 Discuss, using a practical example, the features of each e-commerce business model.

(3)

4.2 Explain the use of mobile and m-Commerce by describing current practical applications.

4.2.1 Explain how wireless technologies and modern hand-held devices have fostered the growth of mobile business

applications.

4.2.2 Describe, in outline, the facilities and operation of current m-commerce applications.

4.3 Explain the business benefits of intranet and extranet applications such as supply chain

management.

4.3.1 Distinguish between intranets and extranets by describing typical application areas.

4.3.2 Explain the business benefits of intranet and extranet applications such as supply chain management.

4.4 Describe the difficulties and drawbacks of

implementing a

commercial application on the internet.

4.4.1 Recognise the complexity, in terms of technologies and components, needed for the support of an e-commerce application.

4.4.2 Explain the practical difficulties and potential drawbacks of implementing a commercial application on the internet.

Learning Outcome 5

The learner will: Understand the stages in the procurement of a computer system from suppliers.

Assessment Criteria

The learner can:

Indicative Content

5.1 Describe the essential preliminary work in project definition, risk analysis, budgeting and scheduling.

5.1.1 Recognise the many necessary technical, commercial and practical activities in the supply of an effective computer

system.

5.1.2 Outline the essential preliminary work in project definition, risk analysis, budgeting and scheduling.

5.2 Explain how to create a system specification and invite proposals from suppliers.

5.2.1 Explain the need for a precise requirements specification and summarise its typical contents.

5.2.2 Outline the tendering process, in practical and legal terms, when inviting proposals from suppliers.

5.3 Explain how to shortlist proposals and proceed to a final selection based on agreed criteria.

5.3.1 Discuss the factors to be considered when evaluating tenders.

5.3.2 Describe a method of shortlisting proposals and reaching a final choice of supplier.

(4)

the typical sections in a contract for the supply and maintenance of a complete computer system.

for the supply and maintenance of a complete computer system.

5.4.2 Identify and compare the different methods of defining cost and ownership in a contract.

Learning Outcome 6

The learner will: Understand the options available in acquiring the requisite hardware, software and services for an information system.

Assessment Criteria

The learner can:

Indicative Content

6.1 Compare direct purchase, leasing and renting as methods of obtaining hardware.

6.1.1 Outline the main methods of obtaining hardware such as direct purchase, leasing and renting.

6.1.2 Assess, from the user’s viewpoint, the different methods of obtaining hardware.

6.2 Assess the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach.

6.2.1 Describe the different methods of obtaining software for a business application.

6.2.2 Summarise the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach.

6.3 Evaluate the use of employees, contract staff, consultants and

outsourcing in the provision of information system services.

6.3.1 Describe the main staffing choices available when providing information system services.

6.3.2 Compare direct employment, contract staff, consultants and outsourcing as methods of obtaining information system services.

Learning Outcome 7

The learner will: Understand the importance of observing legislation in managing information systems.

Assessment Criteria

The learner can:

Indicative Content

7.1 Explain how to ensure that general legislation covering the workplace is complied with in areas such as health and safety.

7.1.1 Recognise that many areas of legislation affect the supply and operation of computer systems.

7.1.2 Summarise the employer’s responsibilities to conform to health and safety legislation.

(5)

7.2 Explain information laws covering copyright, data protection and computer misuse.

7.2.1 Explain briefly how the UK Copyright, Designs and Patents Acts aim to protect intellectual property rights. 7.2.2 Summarise the eight principles of the UK Data Protection Act 1998 and explain the rights given to private individuals.

7.2.3 Outline the offences created under the UK Computer Misuse Act 1990.

Learning Outcome 8

The learner will: Know how to devise effective plans for implementing a security policy.

Assessment Criteria

The learner can:

Indicative Content

8.1 Explain how to apply a comprehensive risk assessment and analysis method.

8.1.1 Describe the risk management approach used to achieve an adequate level of security.

8.1.2 Explain how risk identification and risk analysis can reveal the required levels of security protection.

8.2 Explain how to evaluate strategies for handling risks.

8.2.1 Describe the common methods of handling risk such as risk avoidance, retention, reduction and transfer.

8.3 Recommend procedures and practices in order to achieve the desired level of protection.

8.3.1 Emphasise the importance of implementing a board level policy for security throughout the organisation with regular reviews.

8.3.2 Recommend procedures and practices in order to achieve the desired level of protection against both accidental and deliberate threats to security.

Assessment:

 Assessment method: written examination (unless otherwise stated).

 Written examinations are of three hours’ duration.

 All learning outcomes will be assessed.

Recommended Reading:

Please refer to the Tuition Resources section of the Members Area of the ABE website (www.abeuk.com) for the recommended reading for this subject.

References

Related documents

This section compares NoiseVC with FastVC using real-world massive graphs, since FastVC outperforms other existing local search algorithms on finding vertex covers in massive

PERCEPTIONS OF INTERNATIONAL TRADE BARRIERS: EMPIRICAL STUDY OF SMALL APPAREL

Figure 3 shows the effect of visible light irradiation time on the spectrum of RhB in the silica and titania gels, In the silica gel film, the absorption peak at approximately 559

You can read Ancient Alexandria: The History and Legacy of Egypt's Most Famous City online by Charles River Editors either download. Moreover, on our site you may read manuals

A few months before the start of my thesis year, I conceived of my idea to use personified camera characters to explain the complex issue of attachments and happiness, and how

signal which disappears upon flash illumination is similar in the 3 samples. This indicates that 1) as in PsbA3-PSII, there is a proportion of centers with an oxidized non-heme iron

If the external power is disconnected, automatically a battery placed inside allows keeping the probe working and stores the level changes in a non-volatile

[r]