Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Answers - Information Systems for Managers

(1)

 IT infrastructure is a collection of IT elements, networking, programming, and human


resources working together to assist design, growth, release, management, administration,
and keep a company's IT community. IT infrastructure could be installed on the company or
the cloud's properties. Hardware, programming, connection components, a software
system, and information management are distributed throughout the body to supply IT
items and solutions. On the other hand, even when an IT infrastructure isn't correctly built,
firms might have connection and performance, consisting of cybersecurity troubles, such as
systems disruptions and assaults
 To support an organization's IT community during its design, development, release,
management, administration, and maintenance phases, IT infrastructure is made up of
several IT components, networking, programming, and typically human resources.
 IT infrastructure can be installed on-site at a company or on the cloud. A range of
components including hardware, programming, connecting elements, software, and
information management, are often dispersed throughout the body to deliver IT products
and solutions in general.
 Businesses may yet encounter connectivity and performance problems, as well as
cybersecurity problems like system failures and covert infiltration, even with well-built IT
infrastructure.

(2)

 The role of BPCL’s CEO is majorly managerial in nature. However, the CEO is required to
make specific difficult decisions that the other members of the organization cannot. The
CEO’s main focus is on ensuring that all the activities within the organization are carried out
properly and effectively.
 The CEO K. Padmakar’s objective is to effectively carry out the duties and responsibilities
entrusted to him while making positive contributions to the organization’s success.
 The CEO is required to make management decisions along with carrying out supervising
duties where all the tasks carried out by the middle management and bottom-level
management will be supervised and evaluated by the CEO.
 In order to carry out the management roles effectively, the CEO will need each and every
piece of information with respect to the company’s past performance, list of inventory, list
of employees working along with their salary details, the cost sheet, budget, and other
expenditure details, along with the books of accounts, and other necessary information. This
will help the CEO in making informed decisions as and when needed.
 The CEO will be in tenure for as long as his skills and experience will serve the needs of the
organization. The company will rotate the roles and responsibilities in order to ensure that
there is no bias within the organization.

 The data processing method you use will determine the query response time and the
reliability of the output. The method must therefore be chosen carefully. For example, in a
situation where availability is critical, such as a stock exchange portal, transaction processing
should be the preferred method.
 It can also be used to run batch processing. However, it doesn't scale very well for this job.
 In this sense, when we talk about choosing the right type of data processing for your needs,
we mean choosing the right system.

(3)a
BYOD or Bring Your Device is the latest IT trend in town. It is a practice under which, employees are
encouraged to make use of their devices to access systems and data of the enterprise. BYOD focuses
on the aspect where employees in the workplace are allowed to use and connect their own personal
devices to the organizational network and access the work-related systems. This is majorly evident
with the organization that allows flexible timings and work-from-home operations.

There are three levels of BYOD and they are as follows:


1. The first stage of BYOD is disclosure. This focuses on the aspect that there should be simple
disclosure of the privacy and data protection of the employees in the workplace. This ensures that
their fundamental rights are protected. The policy should explain what measures the employee
must take in order to protect the data on the device, such as encryption, password protection to
access the device, and limitation on the types of company information that can be stored on the
device.
2. Another level is reviewing, revising, and reminding them of their changes. This ensures that the
usage of personal devices can be managed in a periodical manner and that privacy can be revised
and reminded to the employees. The BYOD policy should be a living document that changes as both
technology and the company’s needs change. This can be achieved by following ‘the three Rs’:

 Periodically review the policy to make sure that it accurately reflects the ways personal
devices are used in the company
 Revise the policy to account for the evolution of industry security measures and changes to
privacy legislation
 Remind employees that they are bound to the terms of the BYOD policy

3. Another integral stage is the exit aspect of BYOD. This is integral for those times when employers
do not leave the company in a mutually acceptable manner. Having an exit BYOD strategy ensures
that the data and privacy is maintained. A company’s BYOD policy should explain that the employee
is required to permanently delete all company and employee information from the device before the
end of the employment term. Furthermore, the company should consider whether the employee
will be required to bring the device to IT for evaluation as part of the exit interview.
(3)b

Advantages of BYOD

1. Flexibility
 By allowing employees to use their own devices, they are able to work anywhere at any time
without needing to use other tools to access work documents. This removes the need to
email copies of documents back and forth to be stored in your company system after being
worked on.

 A bring your own device policy also gives the employer greater flexibility to try out new
solutions. Trying to collect field data with phones and tablets can be tough when there is
technical set-up involved. If a team wants to run a pilot program to try a new mobile forms
software, it’s far easier to do without having to go through layers of IT to get an app
installed.

2. Financial Savings
 BYOD means that employers save money, since they don’t have to buy devices for each of
their employees. An added benefit of this is that employees are more likely to take better
care of the devices, since they own them. This greatly reduces costs for repairs and
updating, if there are any costs at all – a definite pro for BYOD.

Disadvantages of BYOD

1. Liability
 When it comes to blurring the distinction between work devices and personal devices, the
question of who is liable for repair costs arises.
 Who should pay for a new device if something goes wrong with it or if it gets stolen while on
work time? What about when someone is using the device (or claims to be using the device)
for work-related tasks outside of work hours and something goes wrong?
 These are questions that need to be carefully considered and for which a solution ought to
be provided before implementing the BYOD program in your company

2. Data Retrieval
 After a contract has been terminated or when an employee leaves the company, it may be
necessary to remove the company’s private information from the employee’s device, which
could prove to be difficult. A plan should be in place to prevent the potential misuse of
information.

You might also like