Assessment Task – Tutorial Questions
Unit Code: HC1041
Unit Name: IT for Business
Assignment: Tutorial Questions 2
Due: 11:30pm 12ed June 2020
Purpose: This assignment is designed to assess your level of knowledge of the key topics covered in this unit
Unit Learning Outcomes Assessed.:
1. Evaluate and justify theoretical and practical knowledge of information technology in a business context
2. Analyze information technology issues in a business environment and provide solutions to these issues using their knowledge of information technology and practical techniques in a
3. Understand the ICT profession in information technology
4. Communicate using effective oral and written communication tools, act in a professional manner
5. Review and describe the major privacy, legal, ethical and societal issues with respect to managing digital information and information systems
Description: Each week students were provided with three tutorial questions of varying degrees of difficulty. These tutorial questions are available in the Tutorial Folder for each week on Blackboard. The Interactive Tutorials are designed to assist students with the process, skills and knowledge to answer the provided tutorial questions. Your task is to answer a selection of tutorial questions for weeks 6 to 10 inclusive and submit these answers in a single document.
The questions to be answered are;
Question 2: What is the difference between volatile and non-volatile memory? Give one example of volatile memory and one example for non-volatile memory (4+3+3=10 marks)
Question 3: List and explain two benefits of videoconferencing to an organization. List and explain two benefits to society (2.5 x 4=10 marks)
Question 2: What is SQL? In which database model does it operate? Why is it so popular? (4+3+3 = 10 marks)
From Ideas to Application: Real Cases Change for the Sake of Change?
The word change does not usually evoke comfortable feelings or create a warm impression When change is mentioned in business organizations, it often creates anxiety or, in its worst-case, resentment or opposition. Change can be implemented in many ways: through imposition or edict; consensually or democratically; gradually or precipitously. The approach or tone of the execution of change is as important as the basis for change itself.
Consider the example of Chesterfield County, Virginia and employee timecard entry. The County, consisting of 3,000 employees and 600 supervisors, embarked on the implementation of a new online system for employees to enter their timecard data. The timecard entry process involved approximately 60 timekeepers.
The County replaced several legacy systems with the new online system. The new system combined two systems: an internally developed time and attendance system and an “off the shelf” payroll and human resources system. The challenges of the new information technology system extended beyond its technology components: Employees would have to learn a new process of entering their hours into the system and being paid. System developers often forget to assess how familiar the system’s stakeholders are with the computer and other skills they would need to use the new system, but County administrators knew they needed a sensible and reasonable approach to manage the change. A well- developed information system without an appropriately planned implementation with its stakeholders can often fail.
The County created a team to manage the change to the new system and develop a change management strategy. The team used several methodologies to ensure that stakeholders were involved throughout the implementation, communicating with key department personnel to “build on existing processes, drawing up communication plans and creating a well-thought-out training plan.” The team was comprised of several managers from the various financial, operational, and payroll functional departments as well as their local educational institution, Chesterfield University.
From this team, they established a communication process to connect with customer departments. This network was responsible for determining training needs, analysing a security procedure, coordinating training, and gaining valuable input from the various stakeholders. Ultimately, the goal of this process was to maintain the lines of communication among the employees and other stakeholders. The process involved not simply words, but also actions. In addition, since quality training was an important component of the system rollout, the Information Systems department worked closely with Chesterfield University to develop and conduct training sessions as well as to provide technical assistance to support employees through the installation.
An essential component of change management is to gain acceptance by the system’s stakeholders. The County understood that appropriate communication would help gain acceptance and reduce employee anxiety. The final version of the communication plan changed “substantially” from the initial version. As input was received and evaluated, so did the methods and approach to how and what they communicated. Constant and interactive communication through newsletters, emails, surveys, meetings and an intranet site provided timely and constant information flow.
Over 300 issues were reported and tracked during the first parallel test run of the new system. A total of four system changes were approved to be implemented, resolving 285 issues, with only seven issues unresolved before the second parallel test. At the final implementation, the employees successfully used the new timecard system with only six payroll checks processed in error for the first payroll period.
Please read the case study and answer the following question.
Question 1: Consider the statement “A well-developed information system without an appropriately planned implementation with its stakeholders can often fail.” Why? Provide two examples and details. (5 + 5 = 10 marks)
Question 3: Consider sensitivity to privacy in the United States. Are Americans more sensitive to government handling of private information or to business handling of private information? Answering the same question regarding Western European countries. (5 + 5 = 10 marks)
The assignment has to be submitted via Blackboard. Each student will be permitted one submission to Blackboard only. Each student needs to ensure that the document submitted is the correct one.
Academic honesty is highly valued at Holmes Institute. Students must always submit work that represents their original words or ideas. If any words or ideas used in a class posting or assignment submission do not represent the student’s original words or ideas, the student must cite all relevant sources and make clear the extent to which such sources were used. Written assignments that include material similar to course reading materials or other sources should include a citation including source, author, and page number.
In addition, written assignments that are similar or identical to those of another student in the class is also a violation of the Holmes Institute’s Academic Conduct and Integrity Policy. The consequence for a violation of this policy can incur a range of penalties varying from a 50% penalty through to suspension of enrolment. The penalty would be dependent on the extent of academic misconduct and the student’s history of academic misconduct issues. All assessments will be automatically submitted to SelfAssign to assess their originality.
For further information and additional learning resources, students should refer to their Discussion Board for the unit.