Using information in information system, Computer Engineering

Assignment Help:

Using Information in Information System

Information Systems can be thought of as being useful at three levels: 

The detail level where information is used to carry out discrete tasks in support of the operations of the business, examples are the use of spreadsheet or CAD toolsets. This information will mostly be used by first line employees carrying out the basic activities for the operation.

  • The middle level where information is used to help control and co-ordinate operations, examples are the use of MRP systems. This information will mostly be used by the middle management of the business.
  • The executive level where information is used to inform the process of decision-making for strategy and other high level organisational concerns.

 

Each of the three levels has a slightly different emphasis in terms of required knowledge but each has to be informed by the same set of captured data and the same systemic tool that processes and manipulates it.


Related Discussions:- Using information in information system

Initial thought process, Initial thought process: Design a script which...

Initial thought process: Design a script which was simple and user friendly.  Integrate procedures/functions to extract data under the hood.  I focused on giving the user the o

What is traffic engineering, What is Traffic Engineering? Traffic engi...

What is Traffic Engineering? Traffic engineering gives the basis for analysis and design of telecommunication network to carry a specified traffic at an exact loss probability

Explain is cgi a script or a program, The distinction is semantic. Traditio...

The distinction is semantic. Traditionally, compiled executables (binaries) are known as programs, and interpreted programs are usually known as scripts. In the context of CGI, the

Explain the techniques used for protection of user files, Explain the techn...

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

Human–computer interaction, In the view of the M364 module team, HCI has be...

In the view of the M364 module team, HCI has been superseded by ID. This is because HCI traditionally concentrated upon desktop computers with single users, whereas ID includes the

Computer science, Read in integers until a zero is read in. Keep a total o...

Read in integers until a zero is read in. Keep a total of both the quantity and the sum of the negative integers and the positive integers. Once a zero is read in (signifying the

What is check box, A dialog box, generally square, that records an on or of...

A dialog box, generally square, that records an on or off value.

How to reduce the maximum quantization error, In successive-approximation A...

In successive-approximation A/D converter, offset voltage equal to 1/2 LSB is added to the D/A converter's output. This is done to ? Ans. It is done to reduce the maximum quantiz

Describe website features and functionality, This assignment relates to all...

This assignment relates to all of the course objectives but more specifically to your practical understanding and evaluation of the key issues in relation to the development of the

Basic architecture of computer system, Q. Basic Architecture of computer sy...

Q. Basic Architecture of computer system? Replacing the ALU and CU (i.e., CPU) of Figure by a microprocessor, and storing instructions and data in the same memory, one arrives

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd