shekhar Assignment 5

docx

School

University of the Cumberlands *

*We aren’t endorsed by this school

Course

439

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

9

Uploaded by neerajatammina

Report
1. Identify three major new information system trends: Three major new information system trends are big data analytics, automation process, and Artificial Intelligence. First is the big data analytics that shows rapid growth from the past years. This executes within the field that introduces long term production that process, manufactures and supply involvement is present. Brand processing the data in a better way and supportive the areas as required to development is allowed by the big data analytics. Other is the automation process. It involves manufacturing production that estimates to show grow in the upcoming years. Enables the automation process involved to work quicker and permitting organization to setup aims and more efficient one. Another is the Artificial Intelligence where introduces the various new channels involved in the AI. Thus, give light to this day and the future upcoming days. This technology has shown new development including resources and executing the operation on long terms that setup to grow rapidly (Kumar et al., 2023). Collaboration of AI and blockchain involvement shows potentiality to generate new business approaches models that enables via digitalization. Application involves researching and merging of AI and blockchain that helps in using integration the business that remains fragmented (Kumar et al., 2023). Study shows impacts by suing content analysis that makes the light on the subject involving intellectual structure, that is hold up by four major confined clusters that focussing on supply chains sector, healthcare field, protecting transaction and finance sector and account sector. Other mobile digital interface that allows to port the digital devices that includes smartphones, laptops, and tablets to use the various digital information. Another is the big data involving huge data setoff pattern that is evaluated in a computerized manner that shows involvement, trends, and pattern set related to the human communication and attitudes. Other is the Cloud Computing that involves on demand availability to the system resources (Kumar et al., 2023).
2. Describe how network economics, declining communications costs, and technology standards affect IT infrastructure : Network economics, declining communications costs, and technology standards affect IT infrastructure by evolving abilities and serving provider that involves new technology such as artificial intelligence (AI), that grows rapidly that cooperates substructure with more complexity. If we take an example of the microservice applications that is graceful and permits the software group to deliver advancement, intensified performance products that is quick and efficient. Constructing and maintaining, networking system involved and protection involved that host and cooperate such application is critical and makes human error free too. Errors related to the human are monotonous, uninterested task are involved such as devices are protected and is configured. Errors that result to 35% of cyber protection incidents that lowers the human errors that makes difficult to network resilience. Many IT substructure collaborates the attributes and services offered by distinct holders involving own accessed the software and platform used helps in handling it. Attributes, protection, redundancy are compromised by the IT structure managing group that stays in the holder’s system such that it becomes critical to construct a custom-fit network. Several groups opt to handle each holder solution distinctly with low interoperability. Loss of execution makes consolidated that faces challenges ( ten Oever, N. 2023). Networks and substructure make it critical to view as segmented that spots the problems when viewed or taken as compromises. Solutions are handled individually inefficient manner and monotonous that increases the risk involved in the human error. Communications costs declined as in small amount and small approach too that uses the communication and exploding the computing facilities too. Standardised the technology includes specified the compatible establishment of items and has ability to interact in the
network system. Network ideologies concept associated shows the various network ideologist that plays a major role in 5G networking system that sharpens ( ten Oever, N. 2023). 3. Define malware and distinguish among a virus, a worm, and a Trojan horse. Malware is a file that deliberately harm to the system, network or server. Malware identification still constantly remained great issue. Approaches like Signature-based and heuristic-based detection are assumed to be quick and are well organized to identify the malware if any while signature-based detection approach fails to recognise the malware if any. While attitude related including model checking-based, and cloud-based approaches conducting for not knowing and complex malware and relates to the deep learning approaches, mobile devices related and IoT related strategy that emerges to recognise some part of familiar and non-familiar malware (Aslan & Samet, 2020). Malware forms includes system’s viruses, worms, Trojan horses, ransomware and spyware. Malicious programs that hack, encrypts and removal of relevant data, changes make or hacks the operation related to the computing devices and scans the end user’s system activities to be performed. Malware perforate the system that browse via attacking the websites. Viewing a legalized site that serves includes the malicious ads, installing the files are to be infected, installation of the programs or apps from unknown offers, opening a malicious email attached or by downloading from the sites involved in the device that includes the quality associated with anti-malware protection application involved (Aslan & Samet, 2020). Distinguish between a virus, a worm, and a Trojan horse Virus a software or system programming that linked with another system that harms the system or devices while worm reproduces itself that slow the processing of the system while the Trojan Horse instead reproducing it is significant data linked to the system. Virus reproduces while worms also reproduces while trojan horse does not reproduces itself.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Virus cannot be restricted by remotely while worms are restricted remotely while the Trojan horse can also be restricted remotely. Thus, it describes the comparison (Aslan & Samet, 2020). 4. Describe how the following systems support knowledge work: CAD, virtual reality, and augmented reality : CAD usefulness is to amend and smoothens the work flow relates to the developer that intensifies production, improves the level of quality in detailed manner that improves data in detailed way while communicating and shares the manufacturing design database. CAD is used in digital way that manufacture and is processed. CAD acronym is computer-aided design that uses to designing the item that includes electronic circuit boards involving in the system and other devices. CAD uses in wide way as profession basis. Several architecture, arts and engineering projects are used by the CAD software. Particular to field involvement and job processing are used as cases by the CAD (Yu et al., 2022). CAD techniques includes to professionalism while it’s not restricted as: it includes Architects, City developers, engineers, graphics designers and animation involved. Using the system and enlightened graphics software that automates the ideas and designs revision is done that is beneficial to the CAD systems. Visualization, rendering, and simulation capabilities involved includes virtual reality systems. Interactive graphics software generates system created simulations involved that make access the virtual reality systems where reality is very nearer to the user who take parts in a real-world sense. Lastly, system devices included in investment workstation that makes use and handles huge amounts of data related to the financial basis that handles financing, trading and managing portfolio. Ideas are interacted and purposeful is involved by powerful technique accessed is the augmented Reality. Duplicated Reality concept includes the physical co-location, restriction involved where a choice of
interest is rebuilt in real time based and visualized in sites where involves a digital copy of a 3D region by using an Augmented Reality user connection point (Yu et al., 2022). Thus, systems follow the supported knowledge work operations involvement that includes CAD, virtual reality, and augmented reality (Yu et al., 2022). 5. Describe the challenges of global supply chains and how Internet technology can help companies manage them better. Challenges like communication and coordination such that it includes suppliers, manufacturers, and distributors in different places all over the world that leads to delaying and making errors. Difference on the basis of cultural terms where it processes the business but leads to misunderstandings and disrupts. Including Logistics and transportation that is shipping goods including long distances that is expensive, costlier and time-consumption is very high, and affects the factors such as weather and geopolitical events. Restricts the quality making sure to be consistent quality among different suppliers and manufacturers thus it can be challenges. Technology can control such challenges tools used such as communication and collaboration tools that includes video conferencing and project management software that helps in communicating and collaborating effectively. Data analytics where data is evaluated from different parts of the supply chain by many organizations that finds inefficiencies and helps in improvement. It includes automation where helps in streamlining the processes and limit the errors, if we take an example robotics usage in manufacturing or using predictive analytics that predicts the demand (El Khatib et al., 2022). Collaborating the technology involvement involved in the supply chain management and including logistics such as it includes AI, forecasting analysis, and machine learning, organization that is able to imbrute functioning with the warehouse, making better delivering
times, handling inventory management, optimizing the acquiring relationships and construct new experiences that is better satisfactorily and increases sales. Searching by analysing is initiated by a researcher that includes relevant and reliable academic literature drawing that finds the presented experiences involving the studies made. Analysis is done and is based on analysing via academic literature is reviewed, facing relevant challenges and expert’s knowledge gap are determined. Gaps are stated that addresses and indicates the significance that conducts an interview and case is analysed. Formatting a partially structured the interview that is made applicable to gather the primary data from an offender by making study (El Khatib et al., 2022). 6. Define and describe VoIP and virtual private networks and explain how they provide value to businesses. Data based on digital audio ‘packets’ form is sent and receive by VoIP between two locations in the entire world by making IP linkage. It doesn’t need the new hardware or line installation as the starting positioning of the system is quick and cheaper. Phone solutions of VoIP are often not filling linkage to any organization’s system. It requires to understand and identify the VoIP definition and how it operates, and consist of benefits including by an array system into the business ( Zakaria et al., 2022). These advantages include: flexibility in tools that permits the business to show growth constantly as due to it has ability to show increment or lowers the medium of channels involved actively to the networking system by just selecting one button. Other is the application features that is available to communicate in a bringing together that enhances the productivity of the employees as operating and amalgamating with calling on the system. Multitasking access the attributes that is email voicemail delivering, voice call button in any email, and presenting the information, increases agent efficiency. A private network gets
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
connected with a virtual private network (VPN) through the internet that primarily uses the network publicly via protected the medium. In different sources to the network system accessing a portion of a local area network (LAN) where the users send and receives the data from others. VPN development permits the users to obtain use of application access and databases involvement ( Zakaria et al., 2022). The main advantage and gives the values of VoIP for processing the business as it doesn’t need extra expenditures as adding up or eradicating the users as external hardware source is not needed that includes headsets or telephone handsets. Through the system it adds a new line and adds the new people as staff members. Employees when leaves or transfers they post a reassigning letter through which one can easily convince the scale VoIP systems to meet all requirements ( Zakaria et al., 2022).
References Aslan, Ö. A., & Samet, R. (2020). A comprehensive review on malware detection approaches. IEEE access , 8 , 6249-6271. https://ieeexplore.ieee.org/abstract/document/8949524 El Khatib, M., Al Hammadi, A., Al Hamar, A., Oraby, K., & Abdulaziz, M. (2022). How Global Supply Chain Management Is Disrupting Local Supply Chain Management Case of Oil and Gas Industry in UAE. American Journal of Industrial and Business Management , 12 (5), 1067-1078. https://www.scirp.org/journal/paperinformation.aspx?paperid=117538 Kumar, S., Lim, W. M., Sivarajah, U., & Kaur, J. (2023). Artificial intelligence and blockchain integration in business: trends from a bibliometric-content analysis. Information Systems Frontiers , 25 (2), 871-896. https://link.springer.com/article/10.1007/s10796-022-10279-0 ten Oever, N. (2023). 5G and the notion of network ideology, or: The limitations of sociotechnical imaginaries. Telecommunications Policy , 47 (5), 102442. https://www.sciencedirect.com/science/article/pii/S0308596122001446 Yu, K., Eck, U., Pankratz, F., Lazarovici, M., Wilhelm, D., & Navab, N. (2022). Duplicated reality for co-located augmented reality collaboration. IEEE Transactions on Visualization and Computer Graphics , 28 (5), 2190-2200. https://ieeexplore.ieee.org/abstract/document/9712238
Zakaria, M. I., Norizan, M. N., Isa, M. M., Jamlos, M. F., & Mustapa, M. (2022). Comparative analysis on virtual private network in the internet of things gateways. Indones. J. Electr. Eng. Comput. Sci , 28 (1), 488-497. https://www.researchgate.net/profile/Mohd-Natashah- Norizan/publication/363138577_Comparative_analysis_on_virtual_private_network_in _the_internet_of_things_gateways/links/630f51495eed5e4bd1345481/Comparative- analysis-on-virtual-private-network-in-the-internet-of-things-gateways.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help