Using information in information system, Computer Engineering

Assignment Help:

Using Information in Information System

Information Systems can be thought of as being useful at three levels: 

The detail level where information is used to carry out discrete tasks in support of the operations of the business, examples are the use of spreadsheet or CAD toolsets. This information will mostly be used by first line employees carrying out the basic activities for the operation.

  • The middle level where information is used to help control and co-ordinate operations, examples are the use of MRP systems. This information will mostly be used by the middle management of the business.
  • The executive level where information is used to inform the process of decision-making for strategy and other high level organisational concerns.

 

Each of the three levels has a slightly different emphasis in terms of required knowledge but each has to be informed by the same set of captured data and the same systemic tool that processes and manipulates it.


Related Discussions:- Using information in information system

Why SS7 protocol is use, SS7 Protocol uses: (A) Out of band signalling...

SS7 Protocol uses: (A) Out of band signalling. (B) Associated signalling. (C) Speech control signalling. (D) No signalling. Ans: SS7 Protocol uses Out of

Staircase, What is the aim of a stair case light is controlled by two switc...

What is the aim of a stair case light is controlled by two switches one at the top of the stairs and another at the bottom of the stair

What is the difference between the c#.net and vb.net, What is the differenc...

What is the difference between the C#.NET and VB.NET? VB.NET - It didn't have the XML Documentation. - It didn't have the Operator Overloading. - It didn't have the P

Explain open source software, Explain Open source software? Open Source...

Explain Open source software? Open Source Software is software for which the underlying programming code is available to the users so that they might be read it, make changes t

Define word/byte rotation and xor bit masking encryption, Define Word/byte ...

Define Word/byte rotation and XOR bit masking encryption technique to make sure secured transactions on the net? Word/byte rotation and XOR bit masking: In this process t

C programming, Find out useless nonterminal symbols use c program.

Find out useless nonterminal symbols use c program.

Congestion in network layer, explain different types of congestion in netwo...

explain different types of congestion in network layer?

Draw a diagram to illustrate the design pattern, Problem: (a) What show...

Problem: (a) What shows a Pattern a Pattern? (b) Which pattern is given below? Justify your answer. public class A { private static A instance = null; private A() {

What is the purpose of iop, What is the purpose of IOP. The purpose of ...

What is the purpose of IOP. The purpose of IOP is to given an independent path way for transfer of information among external and internal memory.

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd