Sunday, June 5, 2011

Blog Questions

1. Explain the ethical issues surrounding information technology.

 Privacy
 It is the interest of a person in protecting their life from unwanted intrusion and public scrutiny.

Intellectual property
 The collection of rights that protect  creative and intellectual effort

Copyright
The exclusive right to do so, or omit to do, certain acts, with intangible property such as a song, video game and some types of proprietory documents. 

Fair use doctrine
In certain situations it is legal to use copyrighted material

Pirated software
The unauthorised use, duplication, distribution, or sale of copyright material

Counterfeit software
software that is manufactured to look like the real thing and sold as such

2. Describe a situation involving technology that is ethical but illegal.

Sharing technology that can improve drugs to become more affordable is a ethical thing but sharing information which belongs to other drug companies is illegal

3. Describe and explain one of the computer use policies that a company might employee

By informing employees that playing and using socila networking sites during working hours is un-acceptable and this could lead to termination of employment.
4. What are the 5 main technology security risks?

5. 
6.

Week Six - Enterprise Architectures 

1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other? 

Information architecture - identifies where and how important information, such as customer records, is maintained and secured.

  Infrastructure architecture- includes the hardware software and telecommunications equipment that, when combined, provides the underlying foundation to support organisational goals.  



 2. Describe how an organisation can implement a solid information architecture


By creating a system of Backup and recovery, disaster recovery, information security.

Backup and recovery - creating a copy of the information and the ability to get the system up and running in an event of a crash.

Disaster recovery - is a detailed process of recovering information in a event of a disaster.

Information security - to prevent hackers spammers and other malcontent from entering networks.

3. List and describe the five requirement characteristics of infrastructure architecture.

Flexibility - systems must be flexible enough to meet all types of business 

Scalability - refers to how well a system can adapt to increased demands 

Reliability - ensures all systems are functioning correctly and providing accurate information, reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency.

Availability- addresses when systems can be accessed by users. high availability refers to a system or component that is continuosly operational for a desirably long length of time 

Performance - measures how quickly a system performs certain process or transactions ( in terms of IT metrics of both speed and throughput )

 4. Describe the business value in deploying a service oriented architecture

SOA is a business driven IT architectural approach that supports integrating a business as linked, repeatable task or services. SOA helps today's business innovate by ensuring IT systems can adapt quickly easily and economically to support rapidly changing business needs. It helps business increase flexibility of their process, strengthen underlying IT architecture and reuse their existing IT investments by creating connections among disparate applications and infromation sources.





5. What is an event?

This are the eyes and ears of the business expressed in technology- they detect threats and opportunities and alert those who can act on the information. 

6. What is a service?

Service are more like software products than they are coding products. they must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity. 

Week Seven - Databases and Data Warehouses


1. List, describe, and provide an example of each of the five characteristics of high quality information. 

Accuracy - The values are correct, for example are the names spelled correctly and are the dollar amounts recorded properly.

Completeness - Are any of the values missing? for example is the address complete including street, city state and postcode?   

Consistency - Is aggregate or summary information in agreement with detailed information? for example, do all total fields equal the true total of the individual fields. 

Uniqueness - Is each transaction, entity and event represented only once in the information? for example, are there any duplicate customers? 

Timelines - is the information current with respect to the business requirements? for example is information updated weekly, daily or hourly?  

2. Define the relationship between a database and a database management system.

The computer program use to manage and query database is a database management system.  

3. Describe the advantages an organisation can gain by using a database. 
  
good database can handle changes quickly and easily, high quality information can help a business make solid strategic business decisions.