Concept explainers
Mention some examples of waste and mistakes in an IS environment along with their causes, and recommended solutions.
Explanation of Solution
The major cause of computer related problems is the computer-related waste and mistakes. Let us see some examples of these waste and mistakes one by one including their causes and possible solutions.
Computer-related waste
Some of the computer-related waste are as follows:
Operating unintegrated information systems: Some organizations for cost-benefit operate with unintegrated information systems which results in a difficulty in collaborating and sharing information among decision makers and further leads to missingupcomingopportunities, extra cost, and less sales.
Acquiring redundant systems: Unknowingly some organizations acquire those information systems which otherwise looks different as per their specification but performs same tasks as are performed by already installed systems in the company. These issues often occur due to improper analyses of requirements before investing into these systems. Acquiring redundant system increases company’s hardware and software cost.
Wasting information systems resources: In some companies there are no proper guidelines for employeesregarding the proper usage of
Computer-related mistakes
Computer related mistakes are errors, failure, and other computer problems which result in incorrect output. Some of the common computer-related mistakes are as follows:
- Data-entry or data capture errors.
Programming errors.- Errors in file handling.
- Mishandling computer output
- Installing inadequate computing capacity than required
- Failure to provide access to most current information.
Possible solutions to computer-related waste and mistakes
To prevent such computer-related waste and mistakes, employees and managers should work together to minimize waste and organizations should make its efforts towards establishing, implementing, monitoring, and reviewing effective policies and procedures.
The organization should establish policies and procedure regarding acquisition, use and disposal of information system resources. Once the policies are decided, they should implement these policies with a proper training so that users are aware of how to use the information resources. After the implementation, the organization should keep watch on whether the policies and procedures are being followed and take necessary actions incase of negligence. Finally, the company should review the already formed guidelines to check whether they are performing the intended task.
Want to see more full solutions like this?
Chapter 10 Solutions
Fundamentals of Information Systems
- Discuss with appropriate examples the types of relationships in a database. Give one reference with your answer.arrow_forwardDetermine the velocity error constant (k,) for the system shown. + R(s)- K G(s) where: K=1.6 A(s+B) G(s) = as²+bs C(s) where: A 14, B =3, a =6. and b =10arrow_forward• Solve the problem (pls refer to the inserted image)arrow_forward
- Write .php file that saves car booking and displays feedback. There are 2 buttons, which are <Book it> <Select a date>. <Select a date> button gets an input from the user, start date and an end date. Book it button can be pressed only if the start date and ending date are chosen by the user. If successful, it books cars for specific dates, with bookings saved. Booking should be in the .json file which contains all the bookings, and have the following information: Start Date. End Date. User Email. Car ID. If the car is already booked for the selected period, a failure message should be displayed, along with a button to return to the homepage. In the booking.json file, if the Car ID and start date and end date matches, it fails Use AJAX: Save bookings and display feedback without page refresh, using a custom modal (not alert).arrow_forwardWrite .php file with the html that saves car booking and displays feedback. Booking should be in the .json file which contains all the bookings, and have the following information: Start Date. End Date. User Email. Car ID. There are 2 buttons, which are <Book it> <Select a date> Book it button can be pressed only if the start date and ending date are chosen by the user. If successful, book cars for specific dates, with bookings saved. If the car is already booked for the selected period, a failure message should be displayed, along with a button to return to the homepage. Use AJAX: Save bookings and display feedback without page refresh, using a custom modal (not alert). And then add an additional feature that only free dates are selectable (e.g., calendar view).arrow_forward• Solve the problem (pls refer to the inserted image) and create line graph.arrow_forward
- who started the world wide webarrow_forwardQuestion No 1: (Topic: Systems for collaboration and social business The information systems function in business) How does Porter's competitive forces model help companies develop competitive strategies using information systems? • List and describe four competitive strategies enabled by information systems that firms can pursue. • Describe how information systems can support each of these competitive strategies and give examples.arrow_forwardData communıcatıon digital data is transmitted via analog ASK and PSK are used together to increase the number of bits transmitted a)For m=8,suggest a solution and define signal elements , and then draw signals for the following sent data data = 0 1 0 1 1 0 0 0 1 0 1 1arrow_forward
- DatacommunicationData = 1 1 0 0 1 0 0 1 0 1 1 1 1 0 0a) how many bıts can be detected and corrected by this coding why prove?b)what wıll be the decision of the reciever if it recieve the following codewords why?arrow_forwardpattern recognitionPCA algor'thmarrow_forwardConsider the following program: LOAD AC, IMMEDIATE(30) ADD AC, REGISTER(R1) STORE AC, MEMORY(20) Given that the value of R1 is 50, determine the value stored at memory address 20 after the program is executed. Provide an explanation to support your answer.arrow_forward
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,