Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 1.7, Problem 2CGDQ

Explanation of Solution

Five Component Career chart:

The Five Component Career chart consists of the following fields:

  • Hardware
  • Software
  • Data
  • Procedures
  • People.

It can be observed that programmers work with software component, whereas system analysts work with the entire system, with all the five components.

These five component career chart further consists the following fields:

  • Sales and Marketing
  • Support
  • Development
  • Management
  • Consulting.

The row in Five Component Career Chart which seems most relevant:

Management:

For column Hardware: Internal MIS:

  • The Management Information System that deals with study of people, technology and organizations. It is a part of system hardware component.

For column Software: Internal MIS:

  • The Management Information System that deals with study of people, technology and organizations...

Blurred answer
Students have asked these similar questions
Perform the following activities as part of the assignment • Read the case study at the end of Chapter 5, (which I will include below). You should use the 4 questions for the case study as a guide to the following:   • Add new resort use case • Add book reservation use case • Activity diagrams • Sequence diagrams CRUD analysis.   • Remember tables and diagrams always need a narrative to elaborate on them. This is what makes your document a narrative business document and not just a list of facts and ideas.   Here is the case study.   The Spring Breaks 'R' Us Travel Service The SBRU information system includes four subsys- they only plan to provide some design specifications and tems: Resort relations, Student booking, Accounting guidelines to each resort. The resort will be responsible and finance, and Social networking. The first three for connecting to the Internet and for providing a secur are purely Web applications, so access to those occurs wireless environment for the students.…
For question 4.17, provide an example of a business rule from your job.
Computer Engineering Question
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning