Wednesday, July 17, 2019

Course Outline Faculty of Science and Technology Essay

Course trope Course Title Course teacher Credits Section Semester Class confluence Times Class Venue Pre-requisites CMPS1024 (formerly CMPS150) computing device Business Application MGMT1014 (formerly MGMT101) Fundamentals of concern None 2012-2 3 CMPS3012 (formerly CMPS360) wariness entropy SystemsCo-requisites Office Location Office Hours (Consultation Hours) send for E-Mail Address Resources Required text Other ResourcesBy appointmentLaudon, K.C., Laudon,J.P. centering Information Systems Managing the digital Firm, 11th edition, . assimilator Hall MIS gradation website http//odl.ub.edu.bz/moodle3/course/view.php?id=106 cart track DESCRIPTION COURSE DESCRIPTION This course is designed to provide techniques and knowledge for creating competitory note, managing global or local corporations, adding transaction value and providing useful product and serve to intended customers. Topics include Enterprise Applications. Systems for fork over Chain Management. Customer Rel ationship Management. familiarity Management Systems. Digital Integration. Internet Technology. Database fig and Implement in an existing Database Management System. COURSE OBJECTIVES Upon successful completion of this course, students bequeath be able to 1.1.1 Knowledge a. b. c. d. e. f. g. h. i. j. k. l. m. chance upon the role of information systems in nows competitive tune milieu rationalize information systems from both expert and business perspective Examine the transforming put up of information systems on organizations and worry rationalise the impact of internet engineering and the dry land Wide Web on the Digital firm Describe the roles of individuals in the business processDescribe the types of business structures and how they exit and serve clientele. Explain the importance of in force(p) mangers and the roles they play in the business success and the development of innovative services and products set the impact, usefulness and benefit afforded busines ses through electronic commerce Examine privacy issues and the ship canal in which to secure a business and its stakeholders from privacy violations. Identify threats of intrusion and another(prenominal) forms of system violation that exists through outside sources such as viruses. Describe spectacular differences between management and information technology specialists and how these differences are mitigated. Explain the various levels of management and the unique systems and structures that are critical to these levels Explain the Rationale for developing and maintaining systems which are reliable, scalable, take-away and secure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.