CIS_105 BUSINESS INFORMATION TECHNOLOGY.pdf | CIS 105 - Computer Applications and Information Technology

***: this is important will be on test

  • Study
  • Design
  • Implementation
  • Support
  • Management

…of a computer-based information system, particularly software and hardware.

***Consider the following inf Business Information Systems:

  • People: great attitude about computing
  • Competency
  • Attitude
  • Critical Thinking
  • Best Practice

Moore’s Law, 1965: computer processing power will double every 18 months or so, including the internet size. Imagine a car maker manufacturing a vehicle that double its gas mileage every eighteen month. Why is this law important in business computing? Ex: in charge of choosing a phone plan. Iphones? Google phones? Voip phones? If you get it wrong you affect your business profoundly. Leader - buy the newest technology and maybe you get an edge Follower -

BUSINESS COMPUTING HARDWARE

Tangible and physical aspects of computing hardware.

  • Mainframe: most processing power, big refrigerator size computers
  • Midrange: *** also called a minicomputer
  • Microcomputer: *** the type of computer that we own
  • - laptops
  • - desktops
  • - handhold

OPERATING SYSTEMS (PLATFORMS)

Collection of computer programs that work together to manage hardware and software and makes sure the computer is working correctly. Systems software

  • File management
  • Multitasking: running different programs
  • Memory management
  • Disk management

STUDY BELOW

BUSINESS INFORMATION TECHNOLOGY

***: this is important will be on test Common Business Operating Systems (Platforms)

  • Microsoft windows: dominate the industry
  • Mac OS
  • Linux (free): will do anything windows does
  • Unix: run mainframes

Why isn't linux as popular as windows then?

APPLICATION SOFTWARE

  • Performs particular tasks like creating budgets, resumes, or professional presentations.
  • Chances of an application software not meeting and end-users needs are remote.

Common application software:

  • Email
  • Word processor: ***Word
  • Spreadsheet: ***Excel
  • Database: ***Access
  • Presentation software: ***Powerpoint
  • Project management software

Productivity Suites:

  • Collection of business computer application programs of associated functionality that

share a common graphical user interface.

  • Also called “software suites” or “application suites”
  • Allows smooth data exchange
  • Microsoft office is the most popular

GET MISSED NOTES FROM THIS SLIDE

CHAPTER 1: DUE THIS FRIDAY

2,557views
4.7
(110 ratings)

Related Study Guides

IT3215 | Programming Methods in Computer Science - Capella university

IT3215 Introduction to JavaScript Unit 1 Assignment Using Variables in a Form Expectations The JavaScript that you use in the course assignments should: Render and function properly in at least two of...

art-designcomputer-science

Assignment 1 Securing a Remote Work Environment for a Global Corporation | CSIS 343 - Cybersecurity

3. Home Network Security Guidelines: Develop guidelines for securing home networks to ensure a secure connection for remote employees. Discuss the importance of strong Wi- Fi passwords, router securit...

educationcomputer-science

Assignment 5 Cybersecurity Measures for a Financial Institution | CSIS 343 - Cybersecurity

4. Data Encryption for Financial Transactions: Assess the encryption practices used for financial transactions, both internally and externally. Propose encryption standards and protocols to secure dat...

financecommunication

Bibliography references | Computer Science homework help

Bibliography References CyberSterPlease see the attach instructions to create a bibliography from the references in the attachment. - 8 months ago - 30 Bibliographyinstructions.docx Bibliographyinstru...

curriculum-instructioncomputer-science

IT3215 | Programming Methods in Computer Science - Capella university

IT3215 Introduction to JavaScript Unit 1 Discussion DQ1 Getting Started With JavaScript JavaScript has been one of the most popular scripting languages for dynamic interactivity. It is a completely di...

communicationart-design

Liberty university bibl 104 quiz 3 answers (a+) | History homework help

LIBERTY UNIVERSITY BIBL 104 QUIZ 3 ANSWERS (A+) indigo11IMPORTANT: AFTER PURCHASE, PLEASE SCROLL DOWN BELOW THIS PAGE AND DOWNLOAD FILES WITH ANSWERS. LIBERTY UNIVERSITY BIBL 104 QUIZ 3 SET 2019: 1. A...

human-resourceshistory

Need discussion in 15 hours or less | Education homework help

NEED DISCUSSION IN 15 HOURS or LESS NeNe1994PLEASE UPLOAD ALL 4 DISCUSSION RESPONSE SEPARATELY!!!!! - a year ago - 20 Week5Discussion1Response.pdf Week5Discussion2Response.pdf Week5Discussion1Response...

communicationeducation

Q-2 | Computer Science homework help

q-2 UnknownpSpoofing attacks involve a malicious actor disguising their identity or masquerading as a trusted entity to gain unauthorized access, manipulate data, or trick users into divulging sensiti...

communicationsociology

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student