0% found this document useful (0 votes)
11 views22 pages

Ict 4 Richard

The document provides information about various ICT terminologies including MICR, OMR, OCR, QR codes, barcodes, and light pens. It describes each technology, its advantages and disadvantages, examples, and applications.

Uploaded by

simpitorussell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views22 pages

Ict 4 Richard

The document provides information about various ICT terminologies including MICR, OMR, OCR, QR codes, barcodes, and light pens. It describes each technology, its advantages and disadvantages, examples, and applications.

Uploaded by

simpitorussell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

CAVENDISH UNIVERSITY – ZAMBIA

ASSIGNMENT BRIEF AND FEEDBACK FORM

STUDENT NAME RICHARD MWANGO

STUDENT NUMBER: 108-137

MODULE: INFORMATION SYSTEM

MODULE CODE: ICT113

ASSIGNMENT NUMBER: 1

DATE HANDED OUT: 20th/08/2023

DATE DUE IN: 07/09/2023

ASSIGNMENT BRIEF

REFER TO THE QUESTION

STUDENT INSTRUCTIONS

1. This form must be attached to the front of your assignment.


2. The assignment must be handed in without fail by submission date (see assessment
schedule for your course)

1|Page
3. Ensure that submission date is date stamped by the reception stuff when you hand it in.
4. Late submission will not be entertained unless with prior agreement with the tutor
5. All assessable assignments must be word processed.
This assignment is intended to assess the student’s knowledge in all of the following areas.
However, greater emphasis should be given to those item marked with a

(Tutor: - please tick as applicable)


SL ASSESSMENT SKILLS Please Tick
No
1 Good and adequate interpretation of the question

2 Knowledge and application of the relevant theories

3 Use of relevant and practical examples to back up theories

4 Ability to transfer and relate subject topic to each other

5 Application and use of appropriate models

6 Evidence of library research

7 Knowledge of theories

8 Written business English communication skills

9 Use of visual (graphs) communication

10 Self-assessed ‘time management’

11 Evidence of field research

Tutor’s Marks contribution

LECTURER’S FEEDBACK

2|Page
TABLE OF CONTENTS

INTRODUCTION…………………………………………………………………….4

QUESTION 1………………………………………………………………………….4

QUESTION TWO…………………………………………………………………….10

CONCLUSION………………….…………………………………………………….21

REFERENCE…………………………………………………………..……………..22

3|Page
INTRODUCTION

To create an effective information system, you need to do more than simply purchase the various
components. Quality is an important issue in business today, particularly as it relates to
information systems. The quality of an information system is measured by its ability to provide
exactly the information needed by managers in a timely manner. The information must be
accurate and up-to-date. Users should be able to receive the information in a variety of formats:
tables of data, graphs, summary statistics, or even pictures or sound. Users have different
perspectives and different requirements, and a good information system must have the flexibility
to present information in diverse forms for each user.

QUESTION 1

DESCRIBING ICT TERMINOLOGIES

MICR

It is known as Magnetic ink character recognition readers, this are the primary tool used for
check sorting, processing and validation. When scanning a document such as a check, MICR
readers magnetize the ink and detect the MICR characters. The reader head of the device reads
the characters. As each character passes over the reader head, a unique waveform is produced,
which is used to identify the check.

Advantages of MICR technology

MICR technology offers the following benefits:

 Reduced fraud. The MICR line protects against some forms of financial fraud by using
magnetic ink and unique MICR fonts. If someone changes the name of the payer of the
check, the MICR number still shows the correct owner of the account. And, if someone tries
to photocopy a check, the MICR reader doesn't detect the magnetic ink.

 Accuracy. MICR characters can be read through marks such as stamps and signatures
because of the special ink that's used to print the characters.

 Processing speeds. A check can be processed quickly using a MICR reader.

4|Page
 Low error rates. Compared to other character recognition systems, the error rate for MICR is
small. According to the technology review site Techwalla, typically, there's one read error
for approximately every 20,000-30,000 checks.

 Security. MICR is more secure compared to optical character recognition because the printed
characters can't be changed.

Disadvantages of MICR technology

However, MICR also has some disadvantages, including the following:

 Only certain characters and symbols can be read, and it doesn't use alphanumeric

 MICR printing is demanding, as it has stringent standards and the iron oxide ink and the
strict printing format can make the process expensive.

ONR AND OCR

Optical Mark Reader (OMR) is the technology of electronically extracting data from marked
fields such as checkboxes or bubbles from pre-printed forms. OMR technology scans a printed
form and reads from predefined positions. It records the data where marks are made on the form.
This is widely used for processing the large number of hand-filled forms which have to be
processed quickly and with great accuracy. It provides more accuracy as compared to OCR.
Storing documents is not possible. It was first used in 1857 in telegraphs. Its application is in
surveys, answer sheets, questionnaires and ballots. It required timing tracks. It is useful in
grading, calculating marks, etc. It is the rapid method of data entry. It does not require an
advanced level recognition engine when compared to OCR.

Optical Character Reader (OCR) is used to convert different types of documents such as scanned
paper documents, PDF files or images captured by a digital camera into machine-encoded text. It
is widely used as a form of data entry from printed paper data records into electronic editable
text which can be easily searched, stored etc.

It was first used in 1914 to help blind people in reading. Its application is in google books, bank
statements, business documents etc. It does not require timing tracks. The visually impaired

5|Page
people find it useful. The text to speech can be used by them. An advanced recognition engine is
needed for OCR compared to OMR.

QRCODE

A quick response (QR) code is a type of barcode that can be read easily by a digital device and
which stores information as a series of pixels in a square-shaped grid. QR codes are frequently
used to track information about products in a supply chain and often used in marketing and
advertising campaigns. QR codes were developed in the 1990s as a way to provide more
information than a standard barcode. They were invented by Denso Wave, a subsidiary of
Toyota, as a way to track automobiles throughout the manufacturing process. 2 Unlike barcodes,
which require a beam of light to bounce off of the parallel lines, QR codes can be digitally
scanned by devices such as mobile phones.

QR codes are considered an advancement from older, uni-dimensional barcodes, and were
approved as an international standard in 2000 by the International Organization for
Standardization (ISO). QR codes consist of black squares arranged in a grid (matrix) on a white
background and are read by specialized software that is able to extract data from the patterns
that are present in the matrix. These codes are capable of containing more information than
traditional barcodes, and primarily handle four modes of data: alphanumeric, numeric, binary,
and Kanji. Despite the increased data capacity, QR codes have not been as popular with
consumers as expected. Rather than being created by consumers to share information, they are
most commonly associated with advertisers and marketing campaigns.

QR codes have become more widespread in facilitating digital payments and


in cryptocurrency systems such as displaying one's Bitcoin address. QR codes are also
increasingly used to transmit web addresses to mobile phones. For instance, the QR code shown
below encodes the URL for this very entry on Investopedia. Use your phone to give it a try.

BARCODE READER

Most items on sale in shops have a barcode printed somewhere on the packaging. The barcode is
a series of vertical bars of varying widths that give information about:

6|Page
 the country of manufacture
 the name of the manufacturer
 a product codes

The barcode does NOT contain the price of the item, this is held on the company database. A
barcode reader is an automatic input device which is used to scan or 'read' the barcode by using a
visible red light. The reflected light is translated into digital data that is interpreted by the
computer to identify the product and price from the database.

The main advantage of using a barcode system is that any price change only needs to be made to
the database and not every single product package. Barcodes are also used on books to show the
book's ISBN number - have a look at any textbook that you have in your bag. They are also used
on library tickets so that when your ticket is scanned, the database brings up your account and
any books which you still have out on loan are displayed.

EXAMPLE OF A BARCODE READER

LIGHTING PEN

A light pen is a light-sensitive pointing input device commonly used to select or otherwise
modify text or data on a screen. Used with a CRT monitor, these devices were an early form of

7|Page
manipulating and highlighting data on the screen. In the picture, is an example of a woman using
a light pen to highlight text on the screen.

Light pens were originally developed around 1955 and in the 1960s, they became more
commonly used with graphics terminals, like the IBM 2250. In the 1980s, light pen usage
expanded to home computers, like the BBC Microcomputer. Some graphics cards also included a
connection for a light pen.

Today, light pens are no longer used due to the invention of touch screens.

2. The term light pen may also refer to a pointing input device utilizing a light that is commonly
used during a presentation. The light pen is a very focused flashlight-type of device or a laser
pointer. It can direct viewers' attention to a specific area, such as a picture or text in a
presentation.

3. A light pen may also describe the pen (stylus) used with a graphics tablet.

PERIPHERAL DEVICES

Peripheral devices are those devices that are linked either internally or externally to a computer.
These devices are commonly used to transfer data. The most common processes that are carried
out in a computer are entering data and displaying processed data. Several devices can be used

8|Page
to receive data and display processed data. The devices used to perform these functions are
called peripherals or I/O devices.

Peripherals read information from or write in the memory unit on receiving a command from the
CPU. They are considered to be a part of the total computer system. As they require a
conversion of signal values, these devices can be referred to as electromechanical and
electromagnetic devices. The most common peripherals are a printer, scanner, keyboard, mouse,
tape device, microphone, and external modem that are externally connected to the computer.

LIST AND DESCRIBE GOOD ATTRIBUTES OF INFORMATION

Timeliness: Information must reach the user in a timely manner, just when it is needed; not too
early, because by the time it is used it would be out-of-date; not too late because the user will not
be able to incorporate it into his/her decision-making.

Appropriateness: Information must be relevant to the person who is using it. It must be within
the sphere of his/her activities so that it can be used to reduce uncertainty in his/her decision-
making.

Accuracy: Accuracy costs. We don't always need 100% accurate information so long as we know
the degree of accuracy it represents (e.g.: + or - 5%). (Remember the value of information).

Conciseness: Information should always contain the minimum amount of detail that is
appropriate for the user. Too much detail causes information overload.

Frequency: Frequency is related to timeliness. Too often the information presented is linked to
the calendar (end of the week, beginning of the month); its frequency should be synchronized
with the timing of the decision making of the user.

Understandability: The format and presentation of information are very important. Some people
prefer tabular information, whereas others may need it in a graphical form. Also, the use of
colors enhances the understandability of what is presented.

Relevant: It pertains to the particular problem. What data is relevant depends on the decision-
making model used. E.g. university admissions officials may choose to consider the results of

9|Page
some high-school test irrelevant, if they believe that it does not improve the chances of some
applicant later becoming a successful student.

Complete: All the relevant parts are included. E.g. marketing data about household incomes may
lead to bad decisions, if not accompanied by consumption habits of the target population.

Current: Decisions are often based on the latest information available

Economical: The costs of gathering information should be justified by the overall benefits.

QUESTION TWO

A computer is a system, group of interrelated components working together toward a


common goal by accepting inputs and producing outputs in an organized transformation
process. A System will have the following basic interacting components (functions): • Input •
Output • Processing • Control. Information is data that have been shaped into a form that is
meaningful and useful to human beings.

KEY COMPONENTS

Hardware - Computer itself and its peripheral equipment: input, output, storage devices;
includes data communication equipment.

Data refers to streams of raw facts representing events occurring in organizations or the
physical environment before they have been organized and arranged into a form that people
can understand and use.

Input is the capture or collection of raw data from within the organization or from its external
environment for processing in an information system.

10 | P a g e
Processing (Central processing unit) is the conversion, manipulation, and analysis of raw
input into a form that is more meaningful to humans.

Output is the distribution of processed information to the people who will use it or to the
activities for which it will be used.

Feedback refers to the output that is returned to the appropriate members of the organization
to help them evaluate or correct input.

Software - Sets of instructions that tell the computer how to input, process, output and store
data.

Communication networks - Hardware and software specializing in transmission and


reception of electronic data.

(b)

STATE AND DESCRIBE TYPES OF COMPUTERS.

Supercomputer

When we talk about speed, then the first name that comes to mind when thinking of computers is
supercomputers. They are the biggest and fastest computers (in terms of speed of processing
data). Supercomputers are designed such that they can process a huge amount of data, like
processing trillions of instructions or data just in a second. This is because of the thousands of
interconnected processors in supercomputers.

Mainframe computer

Mainframe computers are designed in such a way that they can support hundreds or thousands of
users at the same time. It also supports multiple programs simultaneously. So, they can execute
different processes simultaneously. All these features make the mainframe computer ideal for big
organizations like banking, telecom sectors, etc., which process a high volume of data in general.

Minicomputer

Minicomputer is a medium size multiprocessing computer. In this type of computer, there are
two or more processors, and it supports 4 to 200 users at one time. Minicomputer is similar to
Microcontroller. Minicomputers are used in places like institutes or departments for different
11 | P a g e
work like billing, accounting, inventory management, etc. It is smaller than a mainframe
computer but larger in comparison to the microcomputer.

Workstation Computer

A workstation computer is designed for technical or scientific applications. It consists of a fast


microprocessor, with a large amount of RAM and a high-speed graphic adapter. It is a single-
user computer. It is generally used to perform a specific task with great accuracy.

Personal Computer (PC)

Personal Computers is also known as a microcomputer. It is basically a general-purpose


computer designed for individual use. It consists of a microprocessor as a central processing unit
(CPU), memory, input unit, and output unit. This kind of computer is suitable for personal work
such as making an assignment, watching a movie, or at the office for office work, etc. For
example, Laptops and desktop computers.

Server Computer

Server Computers are computers that are combined data and programs. Electronic data and
applications are stored and shared in the server computer. The working of a server computer is
that it does not solve a bigger problem like a supercomputer but it solves many smaller similar
ones. Examples of server computer are like Wikipedia, as when users put a request for any page,
it finds what the user is looking for and sends it to the user.

Analog Computer

Analog Computers are particularly designed to process analog data. Continuous data that
changes continuously and cannot have discrete values are called analog data. So, an analog
computer is used where we don’t need exact values or need approximate values such as speed,
temperature, pressure, etc.

Tablet and Smartphones

Tablets and Smartphones are the types of computers that are pocket friendly and easy to carry is
these are handy. This is one of the best uses of modern technology. These devices have better
hardware capabilities, extensive operating systems, and better multimedia functionality.

12 | P a g e
Hybrid Computer

As the name suggests hybrid, which means made by combining two different things. Similarly,
the hybrid computer is a combination of both analog and digital computers. Hybrid computers
are fast like analog computers and have memory and accuracy like digital computers. So, it has
the ability to process both continuous and discrete data.

Functions of an Operating System

Memory Management

The operating system manages the Primary Memory or Main Memory. Main memory is made up
of a large array of bytes or words where each byte or word is assigned a certain address.

Processor Management

In a multi-programming environment, the OS decides the order in which processes have access
to the processor, and how much processing time each process has. This function of OS is
called Process Scheduling.

Device Management

An OS manages device communication via its respective drivers. It performs the following
activities for device management. Keeps track of all devices connected to the system.

File Management

A file system is organized into directories for efficient or easy navigation and usage. These
directories may contain other directories and other files.

User Interface or Command Interpreter

The user interacts with the computer system through the operating system. Hence OS act as an
interface between the user and the computer hardware.

Booting the Computer

13 | P a g e
The process of starting or restarting the computer is known as booting. If the computer is
switched off completely and if turned on then it is called cold booting. Warm booting is a
process of using the operating system to restart the computer.

Security

The operating system uses password protection to protect user data and similar other techniques.

OUTLINE SOFTWARE PRODUCTIVITY TOOLS THAT YOU KNOW AND STATE EACH
ITS APPLICATION

Microsoft Office is one of the most well-known suites, which includes Word, Excel, PowerPoint,
OneNote, Outlook and Publisher.

Google Workspace is a suite that includes Google Docs, Google Sheets, Google Slides and
Google Forms.

Apache OpenOffice is a popular open source suite that includes Writer for word processing, Calc
for spreadsheets, impress for presentations, Draw for graphics and Base for databases.

Apple iWork is a suite from Apple that includes Pages for word processing, Numbers for
spreadsheets and Keynote for presentations.

(D)

LIST AND DESCRIBE VARIOUS COMPUTER NETWORK TOPOLOGIES AS WELL AS


TYPES OF COMPUTER NETWORK

Physical topology: This type of network is an actual layout of the computer cables and other
network devices

Logical topology: Logical topology gives insight’s about network’s physical design.

Point to Point (P2P): Point-to-point topology is the easiest of all the network topologies. In this
method, the network consists of a direct link between two computers.

Bus topology: uses a single cable which connects all the included nodes. The main cable acts as a
spine for the entire network.

14 | P a g e
Ring Topology Diagram: In a ring network, every device has exactly two neighboring devices
for communication purpose. It is called a ring topology as its formation is like a ring. In this
topology, every computer is connected to another computer. Here, the last node is combined with
a first one.

Star Topology Diagram: In the star topology, all the computers connect with the help of a hub.
This cable is called a central node, and all other nodes are connected using this central node. It is
most popular on LAN networks as they are inexpensive and easy to install.

Mesh Topology

The mesh topology has a unique network design in which each computer on the network
connects to every other.

Tree Topology: Tree topologies have a root node, and all other nodes are connected which form
a hierarchy. So, it is also known as hierarchical topology. This topology integrates various star
topologies together in a single bus, so it is known as a Star Bus topology. Tree topology is a very
common network which is similar to a bus and star topology.

Hybrid Topology: Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of the standard
topologies.

TYPES OF COMPUTER NETWORK

Local area network (LAN), Personal area network (PAN), Wireless local area network (WLAN),
Campus area network (CAN), Metropolitan area network (MAN), Wide area network (WAN),
Storage area network (SAN), and Passive optical local area network (POLAN). However, there
are two types of communication media. They are Guided or Bounded or Wired Communication
Media and Unguided or Unbounded or Wireless Communication Media. The twisted pair cable
consists of a pair of insulated copper wire twisted around each other.

(e)

15 | P a g e
STATE THE IMPORTANCE OF DATA PRIVACY IN MANAGEMENT INFORMATION
SYSTEM

Data privacy is essential for protecting personal information, establishing trust, complying with
regulations, maintaining ethical practices, driving innovation, and preserving individual
autonomy. Prioritizing data privacy benefits both individuals and organizations by fostering a
secure and responsible data ecosystem. Keeping private data and sensitive information safe is
paramount. If items like financial data, healthcare information, and other personal consumer or
user data get into the wrong hands, it can create a dangerous situation. The lack of access control
regarding personal information can put individuals at risk for fraud and identity theft.

Additionally, a data breach at the government level may risk the security of entire countries. And
if one occurs within your company, it could make your proprietary data accessible to a
competitor. This is where data protection laws come into play. As an increasingly large portion
of our lives and activities occur online, cybersecurity is an ever-growing concern.

Privacy information management covers the methods an organization has for collecting,
processing, storing, and destroying personally identifiable information, also known as PII.

Putting in place a privacy information management system ensures that organizations comply
with regulations like GDPR. The penalty for breaching data protection legislation in the UK and
EU can be serious. For example, the maximum fine is about €17 million or 4% of total
worldwide turnover (whichever is higher).

CORE ELEMENT OF COMPUTER SECURITY

Confidentiality: This component is often associated with secrecy and the use of encryption.
Confidentiality in this context means that the data is only available to authorized parties. When
information has been kept confidential it means that it has not been compromised by other
parties; confidential data are not disclosed to people who do not require them or who should not
have access to them. Ensuring confidentiality means that information is organized in terms of
who needs to have access, as well as the sensitivity of the data. A breach of confidentiality may
take place through different means, for instance hacking or social engineering.

16 | P a g e
Integrity: Data integrity refers to the certainty that the data is not tampered with or degraded
during or after submission. It is the certainty that the data has not been subject to unauthorized
modification, either intentional or unintentional. There are two points during the transmission
process during which the integrity could be compromised: during the upload or transmission of
data or during the storage of the document in the database or collection.

Availability: This means that the information is available to authorized users when it is needed.
For a system to demonstrate availability, it must have properly functioning computing systems,
security controls and communication channels. Systems defined as critical (power generation,
medical equipment, safety systems) often have extreme requirements related to availability.
These systems must be resilient against cyber threats, and have safeguards against power
outages, hardware failures and other events that might impact the system availability.

(f)

i. Adhoc is a Latin term which translates as “to this.” However, it’s also understood as “as
needed” or “as required.” Ad hoc reporting is when reports are generated on request or
created on request. They are usually created for a specific use or to answer a precise
question. For example, if a company had a holiday sale and they wanted to see the
volume of sales at a specific store, the sales of a certain product, or an overall amount of
discount given to customers.
Traditional reporting requires technical specialists to create and distribute reports. There
are also ongoing and recurring reports that are created on a schedule, which tend to use
the same parameters each time. The ability to run reports that answer specific business
questions allows employees to make empowered, data-driven decisions. From operational
questions, such as staffing levels on any given day through to strategic decisions such as
products offered adhoc reporting offers flexibility, insights, and answers.
ii. An exception report lists the documents that are missing from an organization’s files. It
can also include documents that are expired or require some other type of action. For a
bank or credit union, exception reports are most frequently used to track loans
(commercial loans in particular). Since all documents in a loan file are included for a
specific reason, each is important and should be collected and indexed in a timely

17 | P a g e
manner. Financial institutions must resolve exceptions efficiently to manage risk, remain
compliant with banking regulations, and maintain customer and member satisfaction.
iii. regular reports: Regular Report means a report that includes a statement of the LHIN's
revenues, actual expenditures, forecasted expenditures for LHIN operations, transfer
payments, an explanation of variances as required between the forecasted expenditures
and revenues, and the identification of any financial and performance risks.
iv. expert system: In artificial intelligence, an expert system is a computer system emulating
the decision-making ability of a human expert. Expert systems are designed to solve
complex problems by reasoning through bodies of knowledge, represented mainly as if
then rules rather than through conventional procedural code. The first expert systems
were created in the 1970s and then proliferated in the 1980s. Expert systems were among
the first truly successful forms of artificial intelligence (AI) software. An expert system is
divided into two subsystems: the inference engine and the knowledge base. The
knowledge base represents facts and rules. The inference engine applies the rules to the
known facts to deduce new facts. Inference engines can also include explanation and
debugging abilities. A computer program that simulates the judgment of a human expert
is known as an expert system in ai. A few examples of an expert system are DENDRAL,
a molecular structure prediction tool for chemical analysis. Another example of an expert
system that predicts the kind and extent of lung cancer is PXDES. Expert systems can
monitor production factors, compile data, and spot processes that deviate from the norm,
indicating potential issues. It can offer reliable solutions for routine decisions,
procedures, and duties. It can function continually without being constrained by human
constraints.
v. Enterprise Resource Planning (ERP) software solutions help companies more efficiently
manage their resources such as employees, finances, and materials. ERP systems are
often referred to as Enterprise Management Systems (EMS). The most common types of
ERP solutions include Manufacturing Execution Systems (MES), Customer Relationship
Management (CRM), Supply Chain Management (SCM), Human Capital Management
(HCM), Financial Accounting & Reporting (FAR), Project Management, Procurement,
Warehouse Management, Asset Tracking, and Inventory Management. A typical ERP
system includes multiple modules such as accounting, sales, marketing, human resources,

18 | P a g e
manufacturing, procurement, finance, quality assurance, supply chain, customer
relationship management, project management, and much more.
vi. Nowadays, technology is turning into vital in our daily lives. It affects people,
communities, businesses and therefore the nation. Extremely technological impact within
the business world. It's helped in terms of management, producing, selling of
communication product and standard sort a lot of simply. ICT includes all digital
technology that assists people, businesses and organizations in mistreatment data. It
covers all electronic product that have an effect on data throughout a digital kind.
Therefore, ICT cares with digital knowledge storage, retrieval and transmission. ICT
makes a business a lot of economical, effective and promptly answer customers' wants.
ICT will assist business activities together with style, producing, R&D, distribution and
sales and feedback. This theme includes a deep analysis of the impact of the knowledge
and communication technologies on totally different aspects of development and growth.
It covers topics related to the money, economic and technological aspects and stress on
the importance of ICT their role in facilitating a decent vary of services and transactions
like on-line banking and on-line services provided by corporations. The role of ICT in
business is seen in however it will facilitate your company become a lot of productive,
increase performance, save money, improve the client expertise, streamline
communications and enhance social control decision creating. It additionally plays a task
in serving to corporations expand globally and in providing workers access to company
data where and whenever they have.
vii. opportunities of ICT / information system in business today: ICT makes a business more
efficient, effective and promptly respond to customers’ needs. ICT can assist business
activities including design, manufacturing, R&D, distribution and sales and feedback.
Prof. Nassef reports that “contrary to the prevalent predict that ICT will decrease the
demand for face to face communication and will result in greater dispersion of economic
activity. She suggests that ICT promotes industrial agglomeration”. In addition, Prof.
Nassef argues that “The search of job and recruitment via the Internet offer potential
efficiency gains to the labor market and the economy through reducing transaction cost
and providing better matching between workers and vacancies by diffusing information
about job widely”. If we look at information system, even the simplest use of technology

19 | P a g e
can dramatically improve your business' productivity and efficiency. Arguably, the
greatest benefit of information systems is their ability to give users the information they
need to carry out tasks efficiently.
viii. The following are challenges of ICT / IS in business today:
Lack of security: Even though IT provides better security than traditional ways, it is still
susceptible to external attacks like hacking or software viruses.
Unemployment: Many information and communication technologies are replacing human
employees. It is making many jobs such as customer support redundant. For instance,
recent driverless car technology may replace all taxi drivers in the future. The initial cost
of implementation and maintenance: It may cost a lot to implement and maintain a secure
and user-friendly website. Also, businesses have to comply with new laws and
regulations that are introduced.
No human touch: Working from home has increased mental health concerns within
individuals. Many businesses worry about their employees lacking human interaction.
When it comes to chatbots, many customers wish to talk to a real person who can
understand and solve problems faster rather than the software. ICT is highly important for
businesses to survive, compete, and grow. ICT has an impact on every part of the
business from production, supply chains, marketing and sales, and business
communication. There are many advantages of ICT like cost-effectiveness, efficiency,
and security. But if not implemented properly, ICT can be disastrous to businesses
because of disadvantages such the high initial cost of implementation, unemployment,
lack of human touch, and cyber-attacks.
New skills: There is a need for a more, differentiated set of skills in the process of
developing information systems. New types of skills are needed. Systems analysts and
programmers are no longer a sufficient partitioning of “workers” in a development
project. It is a challenge to identify these skills as well ‘as to provide them with adequate
training.
Methods and techniques: Most, if not all system development methods do. hardly address
the issue that the kinds of problems we most often are tackling are “wicked”. Most
method research deals with development (or re-development) of formal description

20 | P a g e
techniques with a high expressive power for describing things which can be formally
described.
Informality: Many IT development projects deal today with engineering or re-engineering
of business processes and with providing adequate IT-support for the processes. The
development process can, in its initial stages.
Maintenance: A key problem for management information systems is the provision of the
raw data input and the maintenance of up-to-date information, your company already
generates data on sales, revenue, expenses, payments and other fundamental business
information. Marketing departments often have additional databases.
Use: Usability is a major problem for management information systems. A powerful
system perfect for the data of your company is wasted if your employees don’t use it.
Changes: An important management information system characteristic is the ability to
adapt to changes in your company. The available information may change, the reports
you want may vary and often the personnel using the system changes.

CONCLUSION

As ICT in education advances informatization, not only teachers who support learning but also
students will be able to acquire knowledge and skills of IT devices. literacy will help students to
select and use necessary information and to develop the ability to think for themselves. ICT
professionals support the emerging goals and cultures of the people and organizations they serve.
The demand for ICT skills is growing. Combining technology skills that are in demand with
communication skills in PR, Advertising, and Media Communications provides an impact to
employers. As an emerging field, ICT jobs generally pay well and provide leadership challenges
and opportunities that contribute to a satisfying career.

21 | P a g e
REFERENCE

Hardcastle, E., (2011). Business Information System. Bookboon. ISBN978-87-7681-463-2

Laudon, K. C. & Laudon, J. P., (2012). Management Information Systems Managing the Digital
Firm, 12th Ed. Prentice Hall. ISBN-13: 978-0-13- 214285-4

French, C. S., (2006). Data Processing and Information Technology, 10th Ed. Thomson
Learning. ISBN-978-1-84480-100-8

Data Communication and Computer Network Tutorial: Tutorials Point, Simply Easy Learning

Excel 2015 Tutorials: http://www.saylor.org/books

Bluttman, K. and Aitken, P., (2010). Excel Formulas and Functions for Dummies, 2nd Ed. Wiley
Publishing, Inc. ISBN-978-0-470-56816-3

22 | P a g e

You might also like