CIS 109 Case Study 1 Laptop Versus Tablet

Strayer CIS 109 Case Study 1: Laptop Versus Tablet: Which One to Buy?
Due Week 3 and worth 120 points, Paper is 5 pages 927 words
Read the case study in Chapter 2 titled “Laptop Versus Tablet: Which One to Buy”.
Write a two to three page paper in which you
1. Explain the main factors that you should consider before deciding between a laptop or a tablet to buy.
2. Identify the key features of a laptop and a tablet. Next, discuss three important characteristics of each that might influence your decision.
3. Identify three best-selling tablets on the market, and decide on the one that you would like to buy. Justify your response.
4. Use at least two quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Download Now
(sent via email)

Discussion one:
• From the a-Activity, compare and contrast the key differences between information
sytems and information technologies. Discuss one to two ways in which a
company uses management information system in order to increase organizational
efficiency and productivity.
• Explain the overall manner in which the four building blocks (i.e. input devices, CPU,
main memory, and output devices) of a computer system work together to perform the
three basic tasks of computer operation (i.e., arithmetic operations, logical
operations, and storage and retrieval operations). Include one example of such
collaboration to support your response.

Information systems are systems that sort, distribute and transfer information
to people and businesses. These systems can include mediums such as the
internet software programs and databases. Information technology is the
development, maintenance, and use of the information systems, software, and
networks to transfer and distribute this information.
The use of management information systems in businesses is used to study
people, technology, organizations and the relationships among them coincide
with one another. The biggest use of this system is to predict trends, peaks, and
valleys in consumer sales. By using statistic data collected by these systems,
companies can produce products in a more efficient and timely manner to
reduce waste and loss. These systems are also used for computing financial data
that can assist upper management in perfecting management practices such as
six sigma and lean operations.

These four building blocks are the key components used in all computers to
computing data. When an input device such as a mouse or keyboard sends a
command to the computer, the processor, hard drive, ram and other internal
components use a series of codes and logic to complete the request and deliver
the results to an output device such as a monitor or printer. These operations
can include creating pictures and documents.

Discussion two:
• Describe at least two (2) methods that business owners could use in order to protect the
privacy of both personal infonnation and organizational data resources related to the web
and infonnation technologies. Provide one (1) example of the use of each method to
support your response.
• From thee-Activity, compare and contrast the key similarities and differences between
Online Analytical Processing (OLAP) and Online Transaction Processing (OL TP).
Speculate on the primary manner in which a grocery chain could use OLAP to gain a
competitive advantage. Provide a rationale to support your response.

Business owners could need to protect the privacy of both personal information and organizational data
resources related to the web and information technologies. Employee monitoring systems and
comprehensive security systems assist in securing personal or data related organizational information
from being released to public domain. “With employee-monitoring systems, managers can supervise
employees’ Performance the number of errors they make, their work speeds, and their time away from
the de~(Bidgoli 2014, p 64). Two methods that can be utilized are acceptable use policies and nonrepudiation
By having employees acknowledge that there are a set a legal and ethical rules to using
data resources and have them sign a binding contract, management can honor confidentiality and
protect their developments made within their business.

Analytical Processing (OIAP) “is a data modeling approach typically used to facilitate and manage usual
business applications. OIAP stands for On Line Analytic Processing and is an approach to answer multidimensional
queries” (CBSolution 2011). The differences between the two are as follows:
Grocery stores could use OLAP to gain a competitive advantage because OLAP can provide them with
data analysis that reflects store performance, product sales and trends, promotion, performance,
customer preferences, buying patterns, and warehouse information. “E-commerce organizations must
gain competitive advantage by having access to the most current and accurate information available to
help them make better decisions about products, customers, partners, and processes. In the customer focused
world of e-commerce on the Web, it is becoming increasingly important to have nat only the
right information, but also superior analysis tools to enable organizations to improve overall decision making”

Discussion three:
• Identify two to three information technology tools that affect privacy. Next, discuss
the main way in which one would use the tools that you have identified to commit
computer crimes. Provide a rationale to support your response.
• Assume that you have been asked to put together a security policy for your local bank.
Suggest your top three recommendations to the bank in order to improve the security
and privacy of online banking. Provide a rationale to support your response.

Two information technology tools that affect privacy are spyware and spoofing. Spyware gathers
information about the user, interfere with their computer controls, and changes
computer settings. Spoofing is an attempt to gain access to a network by posing
as an authorized user in order to find sensitive information, such as passwords
and credit card information. One would use both Spyware and spoofing to
interfere with a valid user’s computer controls and gain access to their
information to commit identity theft. By stealing one’s identity, the hacker can
make fraudulent claims or purchases. “Tampa and Miami were the two top
cities from where fraudulent tax returns originated, the perpetrators usually
stealing the identities of dead people, children, or someone else who normally
does not file a tax return”

The top three recommendations I would make to a bank in order to improve the security and privacy of
online banking are:
1. Designing an audit trail procedure for incoming and outgoing data
2. Developing an audit procedure for system access and use
3· Install firewalls and intrusion detection systems.
Since this is a policy for online banking, I believe that an audit process needs to be first incorporated
that tracks access, use, and incoming and outgoing data. Effective firewalls and detection systems may
make the user feel more comfortable in accessing their personal bank information online.