Concept explainers
Mention some examples of waste and mistakes in an IS environment along with their causes, and recommended solutions.
Explanation of Solution
The major cause of computer related problems is the computer-related waste and mistakes. Let us see some examples of these waste and mistakes one by one including their causes and possible solutions.
Computer-related waste
Some of the computer-related waste are as follows:
Operating unintegrated information systems: Some organizations for cost-benefit operate with unintegrated information systems which results in a difficulty in collaborating and sharing information among decision makers and further leads to missingupcomingopportunities, extra cost, and less sales.
Acquiring redundant systems: Unknowingly some organizations acquire those information systems which otherwise looks different as per their specification but performs same tasks as are performed by already installed systems in the company. These issues often occur due to improper analyses of requirements before investing into these systems. Acquiring redundant system increases company’s hardware and software cost.
Wasting information systems resources: In some companies there are no proper guidelines for employeesregarding the proper usage of
Computer-related mistakes
Computer related mistakes are errors, failure, and other computer problems which result in incorrect output. Some of the common computer-related mistakes are as follows:
- Data-entry or data capture errors.
Programming errors.- Errors in file handling.
- Mishandling computer output
- Installing inadequate computing capacity than required
- Failure to provide access to most current information.
Possible solutions to computer-related waste and mistakes
To prevent such computer-related waste and mistakes, employees and managers should work together to minimize waste and organizations should make its efforts towards establishing, implementing, monitoring, and reviewing effective policies and procedures.
The organization should establish policies and procedure regarding acquisition, use and disposal of information system resources. Once the policies are decided, they should implement these policies with a proper training so that users are aware of how to use the information resources. After the implementation, the organization should keep watch on whether the policies and procedures are being followed and take necessary actions incase of negligence. Finally, the company should review the already formed guidelines to check whether they are performing the intended task.
Want to see more full solutions like this?
Chapter 10 Solutions
Fundamentals of Information Systems
- Describe the role of databases and database management systems in the context ofenterprise systems. Give two references with your answer.arrow_forwardIs it advisable to run a test on a live database? Give reasons. Also give one reference from an article.arrow_forwardFor context and I am looking for someone with experience in either computer graphics with companies, or at least has an expertise or experiences in engine development.I am developing a game engine. The niche that I want to focus in open-world development to specialize in.I have seen, heard, and had discussions about various approaches to scene graphs and ways they get handled to be sent to the renderer.If I wanted to focus on open-world, what are different tips and approaches you can tell me of how complex scenes. Like open-world get rendered? What I mean when asking this question, what is the design layout typically of a few approaches that is used for rendering not just basic scenes but complex scenes? Especially since I want to focus on building a game engine that hopes to focuse in open-world.I am using the entity component system framework EnTT, and would like to know if you can also provide tips and how that framework can be incorporated into the design layouts of how you've…arrow_forward
- Please original work Describe the steps of the process of data discovery Why each one is important to data analysis and data warehousing frameworks. Please cite in text references and add weblinksarrow_forwardThe following is code for a disc golf program written in C++: player.h: #ifndef PLAYER_H #define PLAYER_H #include <string> #include <iostream> class Player { private: std::string courses[20]; // Array of course names int scores[20]; // Array of scores int gameCount; // Number of games played public: Player(); // Constructor void CheckGame(const std::string& courseName, int gameScore); void ReportPlayer(int playerId) const; }; #endif // PLAYER_H player.cpp: #include "player.h" #include <iomanip> Player::Player() : gameCount(0) {} void Player::CheckGame(const std::string& courseName, int gameScore) { for (int i = 0; i < gameCount; ++i) { if (courses[i] == courseName) { // If course has been played, check for minimum score if (gameScore < scores[i]) { scores[i] = gameScore; // Update to new minimum score } return; // Exit after…arrow_forwardWhat is the cyclomatic complexity of the diagram below, and how did you find it?arrow_forward
- Write the following code segment in MARIE’s assembly language:if X <= Y thenY = Y - 1;else if X != Zthen Y = Y + 1;else Z = Z - 1arrow_forwardA browser’s cache and cookies are used to? a. Keep your identity safe online b. Store information about a site for faster load times c. Act as an online file directory for websites d. Translate webpages from one language to another Which of these passwords meets the most complexity requirements? a. password1 b. Opensaysme c. EzP@ss35! d. PaSsWoRd45 Which of the below is a browser version number? a. Chrome 81.0.4044.129 b. IE Desk 7 c. Firefox iPad d. Google Chrome One Which one of these is an Excel file type? a. .csv b. .docx c. .html d. Python Select the best option for each of the following scenarios. Please use each selection only once. If I needed to communicate to everyone in my company at once, I would go to: __ If I were readying an important presentation, I would go to: __ If I were writing an essay I would go to: __ If I were looking at a lot of data I would go to: __ a. Powerpoint b. Outlook c. Word d. Excel An outdated browser can cause any of the following…arrow_forwarddigital image processing By finding the necessary coding for the symbols according to the given symbol probability table, calculate code symbol for "001000011010000010110011". Note that in the initial state, the probability of 0,55 is expressed as 0 and the probability of 0,45 is 1.What is the last symbol of the result from the Huffman coding?A) a4 B) a6 C)a1 D) a3arrow_forward
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,