Concept explainers
Mention some examples of waste and mistakes in an IS environment along with their causes, and recommended solutions.
Explanation of Solution
The major cause of computer related problems is the computer-related waste and mistakes. Let us see some examples of these waste and mistakes one by one including their causes and possible solutions.
Computer-related waste
Some of the computer-related waste are as follows:
Operating unintegrated information systems: Some organizations for cost-benefit operate with unintegrated information systems which results in a difficulty in collaborating and sharing information among decision makers and further leads to missingupcomingopportunities, extra cost, and less sales.
Acquiring redundant systems: Unknowingly some organizations acquire those information systems which otherwise looks different as per their specification but performs same tasks as are performed by already installed systems in the company. These issues often occur due to improper analyses of requirements before investing into these systems. Acquiring redundant system increases company’s hardware and software cost.
Wasting information systems resources: In some companies there are no proper guidelines for employeesregarding the proper usage of
Computer-related mistakes
Computer related mistakes are errors, failure, and other computer problems which result in incorrect output. Some of the common computer-related mistakes are as follows:
- Data-entry or data capture errors.
Programming errors.- Errors in file handling.
- Mishandling computer output
- Installing inadequate computing capacity than required
- Failure to provide access to most current information.
Possible solutions to computer-related waste and mistakes
To prevent such computer-related waste and mistakes, employees and managers should work together to minimize waste and organizations should make its efforts towards establishing, implementing, monitoring, and reviewing effective policies and procedures.
The organization should establish policies and procedure regarding acquisition, use and disposal of information system resources. Once the policies are decided, they should implement these policies with a proper training so that users are aware of how to use the information resources. After the implementation, the organization should keep watch on whether the policies and procedures are being followed and take necessary actions incase of negligence. Finally, the company should review the already formed guidelines to check whether they are performing the intended task.
Want to see more full solutions like this?
Chapter 9 Solutions
Fundamentals of Information Systems
- PROBLEM STATEMENT Based on studies that have been conducted, entry bookings for flight tickets sometimes deviate from what is booked by customers who want to board the plane to their desired destination. the existing system is not able to identify bookings made by customers properly. therefore, the existing system needs to be upgraded. Using a new flight ticket management system will be able to solve the problem. Secondly, the charge calculations performed still use the old method of calculation and take time to complete one calculation after another. With the new management system, the calculation and displayed total charges can be done automatically. Sometimes it is quite difficult for us to calculate the discounts given to customers who book flight tickets with large bookings. this will result in incorrectly giving the actual price to the customer and may result in losses. Moreover, with the new system, the amount of profit earned can be easily calculated. Lastly, daily…arrow_forwardWhat are some examples of situations that might lead to overfitting?arrow_forwardBriefly explain the overview phase in the software inspection process.arrow_forward
- Topic: Project Management Please answer thoroughly with an appropriate well detailed project Used : Risk Management in Software Development as project , please give Citation if possible You are required to identify and select a project that you have worked on, whether as a project manager or project team member. If you have not worked on a project before or are unable to select a suitable project based on your work experiences, you should select a project that you know about and have sufficient access to the project’s information. If you decide to select a project outside of your work experiences, there are projects in your local community, your country, the region, or internationally that you may be able to select as a case for this assignment. Please be deliberate in your selection or when choosing a project to work with. You should avoid selecting a project for which genuine information is difficult to obtain or a project for which information is not freely and/or publicly…arrow_forwardDefine the process of planning a preliminary investigation. Describe what each step does. Give different examples (Examples of problems that could occur) for each step.arrow_forwardComputer Science Most mobile phones in the market are not designed for elderly people to use. Now, you are asked to design mobile phones for elderly users who are over 65 years old to be able to use them easily. Prepare USER PROFILING for this project by identifying: (i) Who are the users – characteristics, skills, education; (ii) What are the task – goal & tasks; (iii) Where they will use the system – location; when and how.arrow_forward
- Explain the meaning of the term "one user's work does not unfairly impact another user's work."arrow_forwardDescription:Work Integrated Learning (WIL) is the term given to an activity or program that integrates academic learning with its application in the workplace. The practice may be real or simulated and can occur in the workplace, at the university, online, or face-to-face. Design and develop an application for work-integrated learning placement that requires a student to register for an internship or project and enroll in a specific course. Once done, the student should record their company details as well as their supervisor at the workplace. Followed by tracking the students' progress for 3 months before they perform their final presentation. Question Develop a prototype based on the above descriptionarrow_forwardThe purpose of a benchmark exam is to measure something. A minimum of two benchmarks should be supplied.arrow_forward
- Briefly explain the role of a moderator in the software inspection.arrow_forwardExplain the call-to-action used in the PSA (Poverty Poster Program Invitation)arrow_forwardIt is often suggested that the researcher should maintain a research diary or a log book for the entire duration of his/ her research journey. What in your opinion is the advantage of doing so?arrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,