shekhar Assignment 5
docx
keyboard_arrow_up
School
University of the Cumberlands *
*We aren’t endorsed by this school
Course
439
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
9
Uploaded by neerajatammina
1.
Identify three major new information system trends:
Three major new information system trends are big data analytics, automation
process, and Artificial Intelligence. First is the big data analytics that shows rapid growth
from the past years. This executes within the field that introduces long term production that
process, manufactures and supply involvement is present. Brand processing the data in a
better way and supportive the areas as required to development is allowed by the big data
analytics. Other is the automation process. It involves manufacturing production that
estimates to show grow in the upcoming years. Enables the automation process involved to
work quicker and permitting organization to setup aims and more efficient one. Another is the
Artificial Intelligence where introduces the various new channels involved in the AI. Thus,
give light to this day and the future upcoming days. This technology has shown new
development including resources and executing the operation on long terms that setup to
grow rapidly
(Kumar et al., 2023).
Collaboration of AI and blockchain involvement shows potentiality to generate new
business approaches models that enables via
digitalization. Application involves researching
and merging of AI and blockchain that helps in using integration the business that remains
fragmented (Kumar et al., 2023). Study shows impacts by suing content analysis that makes
the light on the subject involving intellectual structure, that is hold up by four major confined
clusters that focussing on supply chains sector, healthcare field, protecting transaction and
finance sector and account sector.
Other mobile digital interface that allows to port the digital
devices that includes smartphones, laptops, and tablets to use the various digital information.
Another is the big data involving huge data setoff pattern that is evaluated in a computerized
manner that shows involvement, trends, and pattern set related to the human communication
and attitudes. Other is the Cloud Computing that involves on demand availability to the
system resources
(Kumar et al., 2023).
2.
Describe how network economics, declining communications costs, and technology
standards affect IT infrastructure
:
Network economics, declining communications costs, and technology standards affect
IT infrastructure by evolving abilities and serving provider that involves new technology such
as artificial intelligence (AI), that grows rapidly that cooperates substructure with more
complexity. If we take an example of the microservice applications that is graceful and
permits the software group to deliver advancement, intensified performance products that is
quick and efficient. Constructing and maintaining, networking system involved and
protection involved that host and cooperate such application is critical and makes human
error free too. Errors related to the human are monotonous, uninterested task are involved
such as devices are protected and is configured. Errors that result to 35% of cyber protection
incidents that lowers the human errors that makes difficult to network resilience. Many IT
substructure collaborates the attributes and services offered by distinct holders involving own
accessed the software and platform used helps in handling it.
Attributes, protection,
redundancy are compromised by the IT structure managing group that stays in the holder’s
system such that it becomes critical to construct a custom-fit network. Several groups opt to
handle each holder solution distinctly with low interoperability. Loss of execution makes
consolidated that faces challenges (
ten Oever, N. 2023).
Networks and substructure make it critical to view as segmented that spots the
problems when viewed or taken as compromises.
Solutions are handled individually
inefficient manner and monotonous that increases the risk involved in the human error.
Communications costs declined as in small amount and small approach too that uses the
communication and exploding the computing facilities too. Standardised the technology
includes specified the compatible establishment of items and has ability to interact in the
network system. Network ideologies concept associated shows the various network ideologist
that plays a major role in 5G networking system that sharpens (
ten Oever, N. 2023).
3.
Define malware and distinguish among a virus, a worm, and a Trojan horse.
Malware is a file that deliberately harm to the system, network or server. Malware
identification still constantly remained great issue. Approaches like
Signature-based and
heuristic-based detection are assumed to be quick and are well organized to identify the
malware if any while signature-based detection approach fails to recognise the malware if
any. While attitude related including model checking-based, and cloud-based approaches
conducting for not knowing and complex malware and relates to the deep learning
approaches, mobile devices related and IoT related strategy that emerges to recognise some
part of familiar and non-familiar malware (Aslan & Samet, 2020). Malware forms includes
system’s viruses, worms, Trojan horses, ransomware and spyware. Malicious programs that
hack, encrypts and removal of relevant data, changes make or hacks the operation related to
the computing devices and scans the end user’s system activities to be performed. Malware
perforate the system that browse via attacking the websites. Viewing a legalized site that
serves includes the malicious ads, installing
the files are to be infected, installation of the
programs or apps from unknown offers, opening a malicious email attached or by
downloading from the sites involved in the device that includes the quality associated with
anti-malware protection application involved (Aslan & Samet, 2020).
Distinguish between a virus, a worm, and a Trojan horse
Virus a software or system programming that linked with another system that harms
the system or devices while worm reproduces itself that slow the processing of the system
while the Trojan Horse
instead reproducing it is significant data linked to the system. Virus
reproduces while worms also reproduces while trojan horse does not reproduces itself.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Virus cannot be restricted by remotely while worms are restricted remotely while the Trojan
horse can also be restricted remotely. Thus, it describes the comparison
(Aslan & Samet,
2020).
4.
Describe how the following systems support knowledge work: CAD, virtual reality, and
augmented reality
:
CAD usefulness is to amend and smoothens the work flow relates to the developer that
intensifies production, improves the level of quality in detailed manner that improves data in
detailed way while communicating and shares the manufacturing design database. CAD is
used in digital way that manufacture and is processed. CAD acronym is computer-aided
design that uses to designing the item that includes electronic circuit boards involving in the
system and other devices. CAD uses in wide way as profession basis. Several architecture,
arts and engineering projects are used by the CAD software. Particular to field involvement
and job processing are used as cases by the CAD
(Yu et al., 2022).
CAD techniques includes to professionalism while it’s not restricted as: it includes
Architects, City developers, engineers, graphics designers and animation involved. Using the
system and enlightened graphics software that automates the ideas and designs revision is
done that is beneficial to the CAD systems. Visualization, rendering, and simulation
capabilities involved includes virtual reality systems. Interactive graphics software generates
system created simulations involved that make access the virtual reality systems where reality
is very nearer to the user who take parts in a real-world sense. Lastly, system devices included
in investment workstation that makes use and handles huge amounts of data related to the
financial basis that handles financing, trading and managing portfolio. Ideas are interacted and
purposeful is involved by powerful technique accessed is the
augmented Reality. Duplicated
Reality concept includes the physical co-location, restriction involved where a choice of
interest is rebuilt in real time based and visualized in sites where involves a digital copy of a
3D region by using an Augmented Reality user connection point (Yu et al., 2022). Thus,
systems follow the supported knowledge work operations involvement that includes CAD,
virtual reality, and augmented reality
(Yu et al., 2022).
5. Describe the challenges of global supply chains and how Internet technology can help
companies manage them better.
Challenges like communication and coordination such that it includes suppliers,
manufacturers, and distributors in different places all over the world that leads to delaying
and making errors. Difference on the basis of cultural terms where it processes the business
but leads to misunderstandings and disrupts. Including Logistics and transportation that is
shipping goods including long distances that is expensive, costlier and time-consumption is
very high, and affects the factors such as weather and geopolitical events. Restricts the
quality making sure to be consistent quality among different suppliers and manufacturers thus
it can be challenges. Technology can control such challenges tools used such as
communication and collaboration tools that includes video conferencing and project
management software that helps in communicating and collaborating effectively. Data
analytics where data is evaluated from different parts of the supply chain by many
organizations that finds inefficiencies and helps in improvement. It includes automation
where helps in streamlining the processes and limit the errors, if we take an example robotics
usage in manufacturing or using predictive analytics that predicts the demand
(El Khatib et
al., 2022).
Collaborating the technology involvement involved in the supply chain management
and including logistics such as it includes
AI, forecasting analysis, and machine learning,
organization that is able to imbrute functioning with the warehouse, making better delivering
times, handling inventory management, optimizing the acquiring relationships and construct
new experiences that is better satisfactorily and increases sales. Searching by analysing is
initiated by a researcher that includes relevant and reliable academic literature drawing that
finds the presented experiences involving the studies made. Analysis is done and is based on
analysing via academic literature is reviewed, facing relevant challenges and expert’s
knowledge gap are determined. Gaps are stated that addresses and indicates the significance
that conducts an interview and case is analysed. Formatting a partially structured the
interview that is made applicable to gather the primary data from an offender by making
study (El Khatib et al., 2022).
6. Define and describe VoIP and virtual private networks and explain how they provide
value to businesses.
Data based on digital audio ‘packets’ form is sent and receive by VoIP between two
locations in the entire world by making IP linkage. It doesn’t need the new hardware or line
installation as the starting positioning of the system is quick and cheaper. Phone solutions of
VoIP are often not filling linkage to any organization’s system. It requires to understand and
identify the VoIP definition and how it operates, and consist of benefits including by an array
system into the business (
Zakaria et al., 2022).
These advantages include: flexibility in tools that permits the business to show growth
constantly as due to it has ability to show increment or lowers the medium of channels
involved actively to the networking system by just selecting one button. Other is the
application features that is available to communicate in a bringing together that enhances the
productivity of the employees as operating and amalgamating with calling on the system.
Multitasking access the attributes that is email voicemail delivering, voice call button in any
email, and presenting the information, increases agent efficiency. A private network gets
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
connected with a virtual private network (VPN) through the internet that primarily uses the
network publicly via protected the medium. In different sources to the network system
accessing a portion of a local area network (LAN) where the users send and receives the data
from others. VPN development permits the users to obtain use of application access and
databases involvement (
Zakaria et al., 2022). The main advantage and gives the values of
VoIP for processing the business as it doesn’t need extra expenditures as adding up or
eradicating the users as external hardware source is not needed that includes headsets or
telephone handsets. Through the system it adds a new line and adds the new people as staff
members. Employees when leaves or transfers they post a reassigning letter through which
one can easily convince the scale VoIP systems to meet all requirements (
Zakaria et al.,
2022).
References
Aslan, Ö. A., & Samet, R. (2020). A comprehensive review on malware detection
approaches.
IEEE access
,
8
, 6249-6271.
https://ieeexplore.ieee.org/abstract/document/8949524
El Khatib, M., Al Hammadi, A., Al Hamar, A., Oraby, K., & Abdulaziz, M. (2022). How
Global Supply Chain Management Is Disrupting Local Supply Chain Management
Case of Oil and Gas Industry in UAE.
American Journal of Industrial and Business
Management
,
12
(5), 1067-1078.
https://www.scirp.org/journal/paperinformation.aspx?paperid=117538
Kumar, S., Lim, W. M., Sivarajah, U., & Kaur, J. (2023). Artificial intelligence and
blockchain integration in business: trends from a bibliometric-content
analysis.
Information Systems Frontiers
,
25
(2), 871-896.
https://link.springer.com/article/10.1007/s10796-022-10279-0
ten Oever, N. (2023). 5G and the notion of network ideology, or: The limitations of
sociotechnical imaginaries.
Telecommunications Policy
,
47
(5), 102442.
https://www.sciencedirect.com/science/article/pii/S0308596122001446
Yu, K., Eck, U., Pankratz, F., Lazarovici, M., Wilhelm, D., & Navab, N. (2022). Duplicated
reality for co-located augmented reality collaboration.
IEEE Transactions on
Visualization and Computer Graphics
,
28
(5), 2190-2200.
https://ieeexplore.ieee.org/abstract/document/9712238
Zakaria, M. I., Norizan, M. N., Isa, M. M., Jamlos, M. F., & Mustapa, M. (2022).
Comparative analysis on virtual private network in the internet of things
gateways.
Indones. J. Electr. Eng. Comput. Sci
,
28
(1), 488-497.
https://www.researchgate.net/profile/Mohd-Natashah-
Norizan/publication/363138577_Comparative_analysis_on_virtual_private_network_in
_the_internet_of_things_gateways/links/630f51495eed5e4bd1345481/Comparative-
analysis-on-virtual-private-network-in-the-internet-of-things-gateways.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help