Chap 2

advertisement
โจทย์
จงตอบคำถำมต่ อไปนีล้ งในสมุดคำตอบ
1 ข้อมูล (data) และ สารสนเทศ (information) มีความแตกต่างกันอย่างไร? (3 คะแนน)
2 ระบบ interorganizational system คืออะไร จงอธิบาย?
(3 คะแนน)
3 ระบบ enterprise information system คืออะไร จงอธิบาย?
(3 คะแนน)
4 Internet คืออะไร จงอธิบาย?
(3 คะแนน)
5 Indexing agents คืออะไร จงอธิบาย?
(3 คะแนน)
6 Intranet คืออะไร จงอธิบาย?
(3 คะแนน)
7 E-learning คืออะไร จงอธิบาย?
(3 คะแนน)
8 Cybermalls คืออะไร จงอธิ บาย?
(3 คะแนน)
9 Viral marketing คืออะไร จงอธิบาย?
(3 คะแนน)
10 Hotspot zone คืออะไร จงอธิบาย?
(3 คะแนน)
11 Voice portals คืออะไร จงอธิบาย?
(3 คะแนน)
12 Product life cycle management คืออะไร จงอธิบาย?
(5 คะแนน)
13 ฟังก์ชนั และประโยชน์ของ SCM คืออะไร จงอธิบาย?
(5 คะแนน)
14 ERP คืออะไร จงอธิบาย?
(3 คะแนน)
15 ความแตกต่างระหว่าง tacit knowledge กับ explicit knowledge คืออะไร จงอธิบาย (5 คะแนน)
16 Clickstream data คืออะไร จงอธิบาย?
(3 คะแนน)
17 Semantic Web คืออะไร จงอธิบาย?
(3 คะแนน)
18 จงอธิ บายถึงขั้นตอนทั้งสี่ ที่ใช้วางแผน IT
(5 คะแนน)
19 จงอธิบายถึงแนวทางของ Total Cost of Ownership
(3 คะแนน)
20 อะไรคือความแตกต่างระหว่าง vulnerability และ exposure
(5 คะแนน)
พนม เพชรจตุพร
เฉลย
1. What is the difference between data and information? Is there a difference?
Data items refer to an elementary description of things, events, activities, and
transactions that are recorded, classified and stored, but not organized to convey any
specific meaning. Information is data that have been organized so that they have
meaning and value to the recipient.
2. What are interorganizational systems?
Some information systems connect two or more organizations. They are referred to as
interorganizational information systems (IOSs). For example, the worldwide airline
reservation system is composed of several systems belonging to different airlines. Of
these, American Airlines’ SABRE system is the largest; thousands of travel agents and
hundreds of airlines are connected to it. Such systems are common among business
partners. Those that support international or global operations may be
especially complex. Interorganizational information systems play a major role in ecommerce, as well as in supply chain management support.
3. What are enterprise information systems?
While a departmental information system is usually related to a functional area, other
information systems serve several departments or the entire enterprise. These
information systems together with the departmental applications comprise the
enterprisewide information system (EIS). One of the most popular enterprise
applications is enterprise resources planning (ERP), which enables companies to
plan and manage the resources of an entire enterprise. ERP systems present a
relatively new model of enterprisewide computing.
4. What is the Internet?
Internet is a global network of computer networks. It links the computing resources of
business, government and educational institutions using a common computer
communication protocol, (TCP/IP).
5. What are Indexing agents?
Indexing agents can carry out a massive autonomous search of the web on behalf of a
user or, more commonly of a search engine like Google, Hotbot or AltaVista.
6. What is an Intranet?
An Intranet (internal Web) is a secure Web based network designed to serve the
internal informational needs of a company.
7. What is e-learning?
E-learning refers to learning supported by the Web. It can be done inside classrooms;
it can be done as a support to conventional teaching, such as when students work on
the Web at home or in the classroom. It also can be done in virtual classrooms, in
which the entire coursework is done online and classes do not meet face-to-face, and
then it is a part of distance learning.
8. What are cybermalls?
An electronic mall, also known as a cybermall or emall, is a collection of individual
shops under one Internet address. The basic idea of an electronic mall is the same as
that of a regular shopping mall—to provide a one-stop shopping place that offers
many products and services
9. What is viral marketing?
Viral marketing refers to online word-of-mouth marketing. The main idea in viral
marketing is to have people forward messages to friends, asking them, for example, to
“check this out.” For example, a marketer can distribute a small game program,
which comes embedded with a sponsor’s e-mail. By releasing a few thousand copies,
vendors hope to reach many more thousands. Word-of-mouth marketing has been
used for generations, but its speed and reach are multiplied many-fold by the Internet.
Viral marketing is one of the new models being used to build brand awareness at a
minimal cost (e.g., see alladvantage.com). It has long been a favorite strategy of
online advertisers pushing youth-oriented products.
10. What is a hotspot zone?
A wireless access point provides service to a number of users within a small
geographical perimeter (up to a couple hundred feet), known as a “hot spot” or
hotspot zone. Such hotspot zones are found at airports, hotels, restaurants, and in
stores. For instance, StarBucks has hotspot zones in many of its locations. Panera
Bread Company has added hotspots in many of its restaurants in St. Louis, Missouri,
where Panera is headquartered. The addition of hotspots is a marketing tactic aimed
at attracting customers.
11. What are voice portals?
A voice portal is a Web site with an audio interface. Voice portals are not really Web
sites in the normal sense because they are accessed through a standard or a cell
telephone. A certain phone number connects you to a participating Web site where
you can request information verbally. The system finds the information, translates it
into a computer-generated voice reply, and tells you what you want to know. Several
of these new sites are in operation.
12. What is product life cycle management?
Product lifecycle management (PLM) is a business strategy that enables
manufacturers to control and share product-related data as part of product design
and development efforts and in support of supply chain operations. In PLM, Webbased and other new technologies are applied to product development to automate its
collaborative aspects, which even within a given organization can prove tedious and
time-consuming.
13. What are the functions of the SCM and benefits?
The function of Supply chain Management (SCM) is to plan, organize, and coordinate
all the supply chain’s activities. Today the concept of SCM refers to a total systems
approach to managing the entire supply chain.
The goals of modern SCM are to reduce uncertainty and risks in the supply chain,
thereby positively affecting inventory levels, cycle time, business processes, and
customer service. All these benefits contribute to increased profitability and
competitiveness. The benefits of supply chain management have long been recognized
both in business and in the military.
14. What is ERP?
Enterprise Resource Planning (ERP) is a process of planning and managing all
resources and their use in the entire enterprise. It promises benefits ranging from
increased efficiency to improved quality, productivity, and profitability.
15. What is the difference between tacit and explicit knowledge?
Explicit knowledge deals with more objective, rational, and technical knowledge
(data, policies, procedures, software, documents, etc.). Tacit knowledge is usually in
the domain of subjective, cognitive, and experiential learning; it is highly personal
and difficult to formalize. Explicit knowledge is the policies, procedural guides, white
papers, reports, designs, products, strategies, goals, mission, and core competencies of
the enterprise and the information technology infrastructure. It is the knowledge that
has been codified (documented) in a form that can be distributed to others or
transformed into a process or strategy without requiring interpersonal interaction. For
example, a description of how to process a job application would be documented in a
firm’s human resources policy manual. Explicit knowledge has also been called leaky
knowledge because of the ease with which it can leave an individual, document, or the
organization, after it has been documented. Moreover, there is a simple relationship
between the codification of knowledge and the costs of its transfer: the more than
knowledge is made explicit, the more economically it can be transferred.
Tacit knowledge is the cumulative store of the experiences, mental maps, insights,
acumen, expertise, know-how, trade secrets, skill sets, understanding, and learning
that an organization has, as well as the organizational culture that has embedded in it
the past and present experiences of the organization’s people, processes, and values.
Tacit knowledge, also referred to as embedded knowledge, is usually either localized
within the brain of an individual or embedded in the group interactions within a
department or a branch office. Tacit knowledge typically involves expertise or high
skill levels. It is generally slow and costly to transfer and can be plagued by
ambiguity.
16. What is Clickstream data?
Clickstream data are those that occur inside the Web environment, when
customers visit a Web site. They provide a trail of the users’ activities in the Web site,
including user behavior and browsing patterns. By looking at clickstream data, an etailer can find out such things as which promotions are effective and which
population segments are interested in specific products. According to Inmon (2001),
clickstream data can reveal information to answer questions such as the following:
What goods has the customer looked at or purchased? What items did the customer
buy in conjunction with other items? What ads and promotion were effective? Which
were ineffective? Are certain products too hard to find? Are certain products too
expensive? Is there a substitute product that the customers find first?
17. What is a semantic Web?
One of the major problems of the Web is the information overload, which is growing
rapidly with time. Software and search agents are helpful, but they cannot understand
today words that have multiple meanings. Meaning depends on content, context,
graphics and even positioning on a Web page. The proposed solution is known as the
semantic Web. It is an extension of the current Web, in which information is given a
well-defined meaning, better enabling computers and people to work in cooperation.
The technology behind the semantic Web is based in part on NLP, on XML
presentation, and new technologies such as resource description framework (RDF).
The semantic Web is expected to facilitate search, interoperability, and the
composition of complex applications. It is an attempt to make the Web more
homogenous, more data-like, and more amenable to computer understanding. If Web
pages contained their own semantics, then software agents could conduct smarter
searches.
18 Describe the four stages involved in IT planning.
Strategic IT planning establishes the relationship between the overall organizational
plan and the IT plan.
Information requirements analysis identifies broad, organizational information
requirements to establish a strategic information architecture that can be used to
direct specific application development.
Resource allocation, allocates both IT application development resources and
operational resources.
Project planning, develops a plan that outlines schedules and resource requirements
for specific information systems projects.
19. Discuss the Total Cost of Ownership approach.
An interesting approach for IT cost evaluation is the total cost of ownership (TCO).
TCO is a formula for calculating the cost of owning, operating, and controlling an IT
system, even one as simple as a PC. The cost includes acquisition cost (hardware and
software), operations cost (maintenance, training, operations, evaluation, technical
support, installation, downtime, auditing, viruses damage, and power consumption),
and control cost (standardization, security, central services).
20 What is the distinction between vulnerability and exposure?
A universal vulnerability is a state in a computing system (or set of systems) which
either: allows an attacker to execute commands as another user; allows an attacker to
access data that is contrary to the specified access restrictions for that data; allows an
attacker to pose as another entity; or allows an attacker to conduct a denial of service.
An exposure is a state in a computing system (or set of systems) which is not a
universal vulnerability, but either: allows an attacker to conduct information gathering
activities; allows an attacker to hide activities; includes a capability that behaves as
expected, but can be easily compromised; is a primary point of entry that an attacker
may attempt to use to gain access to the system or data; and is considered a problem
according to some reasonable security policy.
Download