Wednesday, January 27, 2016

Stakeholder Needs Analysis

Stakeholder Analysis is done to map the interest of your stakeholders. It is a process of systematically analyzing and gathering qualitative information to determine whose interest should be taken into account.
Stakeholder Analysis is important because it helps project leaders and managers to access a stakeholder's interest, positions, alliances and knowledge related to the project.




In this tutorial, you will learn-

When Stakeholder Analysis need to be done?

Stakeholder analysis should always be done at the beginning of a project. Such analysis is helpful in the drafting of a log frame. Log frame is nothing but a general approach to project planning, monitoring, and evaluation in the form of a 'logframe matrix'. Whenever log frames are reconsidered during the life cycle of a project, a stakeholder analysis will be useful. Which means whenever mid-term reviews or annual monitoring is handled, stakeholder analysis should be the part of it.

Stakeholders Categorization

Stakeholders are categorized into two categories
Internal stakeholders
External stakeholders
Within the organization: Employees and Management
Outside the organization: Government & Trade Association

Process for Stakeholder Analysis

Following are the primary aspect needs to be considered for stakeholder analysis
Step 1) Identify your stakeholders: Your boss, your team, senior executives, prospective customers, your family, etc.
Step 2) Assess how those stakeholders could be impacted or have an effect on the organization
Step 3) Prioritize your Stakeholders-
StakeHolder Type
Action
  • High power, interested people
- Keep satisfied
  • High power, less interested people-
- Manage closely
  • Low power, interested people
- Monitor with minimum effort
  • Low power, less interested people
- Keep informed
Step 4) Identify areas of conflicts (organization vs. stakeholder, stakeholder vs. stakeholder)
Step 5) Prioritize, reconcile and balance stakeholders
Step 6) Align significant stakeholder needs with organizations strategies and actions
Things to take care while dealing with stakeholders
  • Could you eliminate processes, which do not add stakeholder value?
  • How would you communicate with stakeholders?
  • Do your communications encourage stakeholder exchange?
  • Do you communicate the stakeholder the value of the deal?

Important questions to ask for Stakeholder Analysis


Different attribute check for stakeholder
Question to ask your stakeholders
  • Identification of stakeholder
  • Who is paying for the project?
  • Who will receive the deliverables or profits from the project?
  • Both from your organization and client organization who will work with you to implement the project?
  • Identify the expert for the project domain in the organization.
  • Interest
  • What direct benefit do stakeholders expect to get from the project?
  • What outcomes do stakeholders expect as a result of the project?
  • What changes do stakeholders need to make as a result of the project?
  • Are there any conflicts of interest amongst the stakeholders?
  • Influence
  • What legitimate authority do stakeholders have in the organization?
  • Who controls the project assets and resources?
  • What degree of influence or negotiation power do your identified stakeholders carry in the organization?
  • Impact
  • How much impact stakeholder could have on the project and does this going to affect the success of the project
Also, you need to figure out when stakeholders will become involved in the following-
  • Project Vision
  • Project Scope Definition
  • Business Process Analysis
  • Needs Elicitation
  • Requirement Validation
  • Design reviews
  • User acceptance testing
You can create a "Participation Matrix Table" for the stakeholders as given below
Participation Type
Inform
Consult
Partner
Control
Needs Assessment
Planning
Implement
Monitoring & Evaluation

Tips to manage your Stakeholders

  • Do not complain. Accept stakeholders as they are
  • For guaranteed success, get the key leadership involved.
  • Make sure, you involve your stakeholders early in the business analysis process
  • In case of a sensitive issue, ensure full confidentiality to all stakeholders to win their trust.
  • To avoid conflicts, help all stakeholders in realizing their personal gains from the project.

Introduction to Business Analysis

Who is a Business Analyst?

Business Analysts have emerged to have a key role in recent business scenarios. Some people think that the role of a Business Analyst is to make money for the organization, which may not be true in direct context. But indirectly, the action and decision taken by Business Analysts do leave an impact on the financial prospects of the organization.
A primary job responsibility of Business Analyst is to communicate with all stakeholders & to elicit, analyze and validate the requirements for changes to business processes, information systems, and policies.
A professional business analyst plays a big role in moving an organization toward efficiency, productivity, and profitability.
Before we jump into the tutorial, we will see some basic perspective of a Business Analyst to help the organization succeed. The foremost priority for any business analyst will be to try understanding following things
  • Understand what business does and how it does
  • Determine how to improve existing business processes
  • Identify the steps or tasks to support the implementation of new features
  • Design the new features to implement
  • Analyze the impact of implementing new features
  • Implement the new features

Different Business Analyst Role

Business Analyst can be from any sector, and the role differs based on the sector. Business Analyst are classified into various categories like
  • Business Analyst
  • Business Process Analyst
  • IT Business Analyst
  • Business System Analyst
  • System Analyst
  • Data Analyst
  • Functional Architect
  • Usability or UX Analyst

Characteristics of a good Business Analyst

Basically, a good business analyst is judged on these four attributes

Typical Qualities of a Good Business Analyst:

  • Analytical skills- An outstanding analytical skills will separate out a good business analyst. A good part of BA role includes analyzing data, workflow, user or stakeholders inputs, documents, etc.
  • Leadership skills- directing team members, forecasting budget, helping team members with the problem, etc.
  • Business process and planning- Planning the project scope, understanding and implementing requirement of project, identifying resources required for the project and so on
  • Technical skill- If a business analyst is in the IT sector, few technical aspect are expected to know like operating systems, hardware capabilities, database concepts, networking, SDLC methodology, etc.

Tools of the Trade

To make their work easier, the business analyst often depends on tools like
  • TopTeam Analyst: This tool helps in providing a complete solution for requirements gathering and management
  • SmartDraw: It is a graphic diagramming tool that use stencils for organizational charts, swim lanes, data flow diagram, etc.
  • Blueprint: This tool produces a blue print of the project artifacts like development models, test scenarios, use cases, flow charts, etc. to ensure that everything is falling in line and as per expectation
  • Survey Monkey: It allows you to send survey to stakeholders, capture their feedback, rank and prioritize their view and turn them into requirements
There are many other tools like iServer, Meetingsense,Ravenflow,AnalystPro, which could be used by Business Analyst during the project.

Certifications

As per the International Institute of Business Analysis (IIBA), CBAP (Certified Business Analysis Professional) certification is a recognized certificate for a professional Business Analyst. They provide two types of certifications. The certification exam is computer based and consists of multiple choice questions.
  • Certification of Competency in Business Analysis: Pre-requisite for this certification is atleast 3750 hours of work experience
  • Certified Business Analysis Profession (senior level): Pre-requisite for this certification is atleast 7500 hours of work experience
For off-shore students, they can appear certification exam online. For more information, you can visit thewebsite.

Jobs

Job prospectus for Business Analyst rises every year, especially for the IT sector. The average salary of business analyst is estimated around $80,000 - $130, 000, even at entry level.
International Institute of Business Analysis (IIBA) is growing exponentially indicating increasing demand of Business Analyst. Business Analyst always remain an organization priority since they have to work in a close proximity to top executives, clients, and stakeholders.
According to U.S Bureau of Labor Statistics, the BA job are predicted to increase by 19% between 2012 and 2022.

Conclusion:

The business analyst role is promising and has to deal with different layers of an organization. Business analyst are classified into various categories like Business Process Analyst, IT Business Analyst and so on.
  • A good business analyst should encompass skills like
    • Analytical skills
    • Leadership skills
    • Business process and Planning
    • Technical Skills
  • Various tools that can help Business Analyst are TopTeam Analyst, SmartDraw, Blueprint, etc.
  • Online certification course for BA available by recognized institute IIBA
  • According to U.S Bureau of Labor Statistics, the BA job are predicted to increase by 19% between 2012 and 2022.

Free Business Analyst Tutorial & Course

Class Summary


A Business Analyst is the key figure in understanding business requirement and its implementation. This course is designed to help you understand Business Analysis right from Software Engineering Methods & Lifecycles to Requirements Preparation, analysis and presentation.

What should i know?


The course is for beginner’s and you should know nothing


Syllabus


  1. Introduction
  2. Stakeholder Need Analysis
  3. Lifecycles
  4. Software Development Lifecycles
  5. Requirement Lifecycles
  6. Software Engineering Methods
  7. General SDLC plus Waterfall Model
  8. Rapid Software Development (RAD)
  9. Incremental Model
  10. Spiral
  11. Agile
  12. Requirements Process
  13. Learn software requirements analysis with case study
  14. Requirements Analysis and Transformation Techniques
  15. Finalizing Requirements
    1. Presenting
    2. Managing Requirements Assets
    3. Change Control
    4. Documentation
    5. BRS VS SRS
    6. Quality Assurance
    7. Overview of testing
    8. Basics of Manual testing
    9. Defect Life Cycle
    10. UAT (User Acceptance Testing)
    11. The complete Process
    12. Business Analysis process
    13. Must read topic
    14. Entity Relationship Diagrams
    15. Decision Tables
    16. Structured Walkthroughs

Monday, January 25, 2016

Microsoft Certified Solutions Associate (MCSA) Exam

Certification is a way of validating your expertise in an industry. If you are looking for a job, a certification will improve the chances of you getting it.
If you are a business owner or self-employed, a certification can boost the confidence of clients in you. In this tutorial, we are going to look at an MIS certification specifically Microsoft Certified Solutions Associate.



In this tutorial, you will learn-
  • What is MCSA (Microsoft Certified Solutions Associate)
  • MCSA Pre-requirements
  • How to apply for an Microsoft certification exam

What is MCSA (Microsoft Certified Solutions Associate)

Microsoft certified solutions associate (MCSA) is a certification program offered by Microsoft that is created to validate your skills in designing and building technology. The previous certification program was Microsoft Certified Systems Administrator.
Microsoft certified systems administrator was more focused on job roles. You can find more details from the official MCSA website
The certification program offers the following exams;
  • MSCA: Widows Server 2012 – the primary objective of this certification is to validate your expertise of windows server 2012. This certification allows you to work as a network or computer systems administrator or as a computer network specialist. You will have to take three (3) exams.
    1. Installing and Configuring Windows Server 2012
    2. Administering Windows Server 2012
    3. Configuring Advanced Windows Server 2012 Services
  • MCSA: Windows Server 2008 – this certification validates your mastery of Windows Server 2008. This certification allows you to work as a network or computer systems administrator or as a computer network specialist. It has the following exams
    1. Windows Server 2008 Active Directory, Configuring
    2. Windows Server 2008 Network Infrastructure, Configuring
    3. Windows Server 2008, Server Administrator
  • MCSA: Windows 10 – validates your skills to configure, manage and maintain a Windows 10 enterprise system. This certification allows you to work as a computer support specialist. You will have to take the following exam
    1. Configuring Windows Devices
  • MCSA: Windows 8 – validates your skills to configure, manage and maintain a Windows 8 enterprise system. This certification allows you to work as a computer support specialist. You will have to take the following exams;
    1. Configuring Windows 8.1
    2. Supporting Windows 8.1
  • MCSA: SQL Server – validates your skills to develop and maintain mission critical databases. This certification allows you to work as a database developer or database analyst. You will have to take the following exams;
    1. Querying Microsoft SQL Server 2012
    2. Administering Microsoft SQL Server 2012 Databases
    3. Implementing a Data Warehouse with Microsoft SQL Server 2012
  • MCSA: Office 365 – validates your skills to transition to and administer cloud hosted business applications with Microsoft Office 365. This certification allows you to work as a software as a service (SaaS) administrator or cloud applications administrator focused on managing Office 365 products. You will have to take the following exams;
    1. Part 1: Managing Office 365 Identities and Requirements
    2. Part 2: Enabling Office 365 Services
  • MCSA: Linux on Azure – validates your skills as a Linux system administration with the ability to design, develop and maintain closed based solutions that take advantage of Microsoft Azure open source capabilities. You will have to take the following exams.
    1. Implementing Microsoft Azure Infrastructure Solutions
    2. Linux Foundation Certified System Administrator
You do not have to take all of the above exams. You should only take the ones that are directly related to your job roles.

MCSA Pre-requirements

You must be computer literate and have basics in information technology related courses. This is an added advantage for you. If you want, you can get the training prior to taking the exams. Microsoft has partnered with qualified, trained professionals all over the world that can help you with your preparations. Use this link to search for Microsoft training partners near your location.

How to apply for an Microsoft certification exam

You will need to create an account with Microsoft before you can schedule an exam. You can follow the URLLearning Sign to do that. Once you are signed in, you can select and schedule an exam with Pearson Vue.Pearson Vue specializes in providing computer-based exams.

MIS Development Process using SDLC, Waterfall Model, Agile Development, Prototyping

The software is one of the major components of a management information system. Some of the software used in a MIS system is off the shelf. These include packages such as spreadsheet programs, database applications, etc.
However, they are times when off the shelf, software does not meet the business requirements. The solution to this problem is custom made software.
This tutorial will focus on the methodologies used to develop custom software.

In this tutorial, you will learn-

Information Systems Development Stakeholder

A typical information systems development usually has three (3) stakeholders namely;
  • Users – Users are the ones who use the system after it has been developed to perform their day to day tasks.
  • Project sponsors - this category of the stakeholders is responsible for the financial aspect of the project and ensuring that the project is completed.
  • Developers – this category is usually made up of systems analysts and programmers. The system analysts are responsible for collecting the user requirements and writing system requirements.
    The programmers develop the required system based on the system requirements that is developed by the system analysts.
The most important stakeholders in a project are users. For a project to be accepted as being completed, the users must accept it and use it. If the users do not accept the system, then the project is a failure.

MIS Systems Analysis and Design

Systems analysis and design refers to two closely related disciplines system analysis and system design.
  • System analysis is concerned with understanding the business objectives, goals and developing business processes. The end product of systems analysis is systems specifications.
  • System design uses the output from system analysis as its input. The main objective of system design is to interpret the system requirements into architectural, logical and physical designs of how the information system to be implemented.

MIS Object oriented analysis and design

Object-oriented analysis and design (OOAD) is closely related to systems analysis and design. The main difference between object-oriented analysis and design (OOAD) and systems analysis and design is that OOAD uses objects to represent real-world entities.
Object oriented analysis and design uses visual modeling to improve communication among all stakeholders and produce high-quality products.
An object is a representation of a real-world entity such as a customer, a product, an employee, etc. Unified Modeling Language (UML) is a general-purpose language used to create visual designs for a system.
The following image shows a sample UML diagram that shows users interacting with a point of sale system

MIS Systems Development Life Cycle (SDLC)

The system development life cycle refers to the processing of planning, creating, testing, and deploying an information system. The main objective of system development life cycle is to produce high-quality information systems that meet or exceed the expectations of the users within the stipulated budget and time frame.

SDLC uses a number of development methodologies to achieve this objective. The next sections will discuss some of the most popular development methodologies.

Waterfall Model

The waterfall model uses a sequential design model. The next stage starts only after the completion of the previous stage. The first stage is usually drawn on the top and the subsequent stages below and to the left bottom. This forms a waterfall like structure, and it's where the name came from.
The main objective of the waterfall model is
  • Planning
  • Time scheduling
  • Budgeting and
  • Implementing an entire system at once
The waterfall model is ideal when the user requirements are clearly understood and are not expected to change radically during the development of the information system. The waterfall model is ideal in situations where a project has a fixed-scope, fixed time frame, and fixed price.
The biggest challenge of the waterfall model is adoption to change. It is not easy to incorporate new user requirements.

Agile Development

Agile development is an alternative methodology to traditional project management which promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change.
A sprint in agile terms is a well-defined task to be accomplished within a given time. Sprint goals and durations are set by the customers and development team. All stakeholders must meet in person to get the feedback on the sprint before they can move on to the next sprint if any.
Agile methodologies usually follow the agile manifesto. The agile manifesto is based on the following twelve (12) principles
  1. Customer satisfaction through early and continues delivery of software
  2. Welcoming changes in requirements any time of the project
  3. Frequent releases of working software usually on a weekly basis
  4. Collaboration between business people and developers when working on a project
  5. Projects built around motivated and trusted individuals
  6. Efficient and effective Face-to-face meetings
  7. Progress is measured based on working software
  8. Sustainable development, sponsors, users, and developers should be able to maintain a constant pace indefinitely
  9. Continuous attention to technical excellence and good design enhances agility.
  10. Simplicity
  11. Self-organizing teams
  12. At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly.
The following diagram illustrates how agile development methodologies are implemented.

Prototyping

A prototype is a semi-functional simulation model of the actual system to be developed. Prototyping development methodologies make use of prototypes. Prototypes allow both developers and users to get feedback early.
Prototyping makes it easy for users to specify their requirements and developers understanding the requirements of the users because of the prototypes. A prototyping methodology stands with identifying the basics system requirements especially the input and output from the system. These requirements are then used to create a simulation model that users can interact with and provide feedback. The user feedback is used to enhance the prototype and make other important decisions such as project costing and feasible time schedules.
The following diagram illustrate the stages of prototyping
Summary:
Information systems development refers to methodologies and steps involved in developing a new information system or upgrading an existing system to meet the evolving user requirements.
In a nutshell, a development methodology has to first identify and understand the problem with the existing system and find a solution that solves the problem.
The methodology chosen depends on the nature of the project and user requirements.
  • The waterfall model is ideal when the project is not expected to change much
  • While methodologies such as Agile, Prototyping, etc. are ideal when the project is expected to change during the course of development and the changes, have to be incorporated.

Types of Information System - Pyramid Diagram, TPS, DSS, OLAP

A typical organization is divided into operational, middle, and upper level. The information requirements for users at each level differ. Towards that end, there are number of information systems that support each level in an organization.
This tutorial will explore the different types of information systems, the organizational level that uses them and the characteristics of the particular information system.



In this tutorial, you will learn-

Pyramid Diagram of Organizational levels and information requirements

Understanding the various levels of an organization is essential to understand the information required by the users who operate at their respective levels.
The following diagram illustrates the various levels of a typical organization.
Operational management level
The operational level is concerned with performing day to day business transactions of the organization.
Examples of users at this level of management include cashiers at a point of sale, bank tellers, nurses in a hospital, customer care staff, etc.
Users at this level use make structured decisions. This means that they have defined rules that guides them while making decisions.
For example, if a store sells items on credit and they have a credit policy that has some set limit on the borrowing. All the sales person needs to decide whether to give credit to a customer or not is based on the current credit information from the system.
Tactical Management Level
This organization level is dominated by middle-level managers, heads of departments, supervisors, etc. The users at this level usually oversee the activities of the users at the operational management level.
Tactical users make semi-structured decisions. The decisions are partly based on set guidelines and judgmental calls. As an example, a tactical manager can check the credit limit and payments history of a customer and decide to make an exception to raise the credit limit for a particular customer. The decision is partly structured in the sense that the tactical manager has to use existing information to identify a payments history that benefits the organization and an allowed increase percentage.
Strategic Management Level
This is the most senior level in an organization. The users at this level make unstructured decisions. Senior level managers are concerned with the long-term planning of the organization. They use information from tactical managers and external data to guide them when making unstructured decisions.

Transaction Processing System (TPS)

Transaction processing systems are used to record day to day business transactions of the organization. They are used by users at the operational management level. The main objective of a transaction processing system is to answer routine questions such as;
  • How printers were sold today?
  • How much inventory do we have at hand?
  • What is the outstanding due for John Doe?
By recording the day to day business transactions, TPS system provides answers to the above questions in a timely manner.
  • The decisions made by operational managers are routine and highly structured.
  • The information produced from the transaction processing system is very detailed.
For example, banks that give out loans require that the company that a person works for should have a memorandum of understanding (MoU) with the bank. If a person whose employer has a MoU with the bank applies for a loan, all that the operational staff has to do is verify the submitted documents. If they meet the requirements, then the loan application documents are processed. If they do not meet the requirements, then the client is advised to see tactical management staff to see the possibility of signing a MoU.
Examples of transaction processing systems include;
  • Point of Sale Systems – records daily sales
  • Payroll systems – processing employees salary, loans management, etc.
  • Stock Control systems – keeping track of inventory levels
  • Airline booking systems – flights booking management

Management Information System (MIS)

Management Information Systems (MIS) are used by tactical managers to monitor the organization's current performance status. The output from a transaction processing system is used as input to a management information system.
The MIS system analyzes the input with routine algorithms i.e. aggregate, compare and summarizes the results to produced reports that tactical managers use to monitor, control and predict future performance.
For example, input from a point of sale system can be used to analyze trends of products that are performing well and those that are not performing well. This information can be used to make future inventory orders i.e. increasing orders for well-performing products and reduce the orders of products that are not performing well.
Examples of management information systems include;
  • Sales management systems – they get input from the point of sale system
  • Budgeting systems – gives an overview of how much money is spent within the organization for the short and long terms.
  • Human resource management system – overall welfare of the employees, staff turnover, etc.
Tactical managers are responsible for the semi-structured decision. MIS systems provide the information needed to make the structured decision and based on the experience of the tactical managers, they make judgement calls i.e. predict how much of goods or inventory should be ordered for the second quarter based on the sales of the first quarter.

Decision Support System (DSS)

Decision support systems are used by senior management to make non-routine decisions. Decision support systems use input from internal systems (transaction processing systems and management information systems) and external systems.
The main objective of decision support systems is to provide solutions to problems that are unique and change frequently. Decision support systems answer questions such as;
  • What would be the impact of employees' performance if we double the production lot at the factory?
  • What would happen to our sales if a new competitor entered the market?
Decision support systems use sophisticated mathematical models, and statistical techniques (probability, predictive modeling, etc.) to provide solutions, and they are very interactive.
Examples of decision support systems include;
  • Financial planning systems – it enables managers to evaluate alternative ways of achieving goals. The objective is to find the optimal way of achieving the goal. For example, the net profit for a business is calculated using the formula Total Sales less (Cost of Goods + Expenses). A financial planning system will enable senior executives to ask what if questions and adjust the values for total sales, the cost of goods, etc. to see the effect of the decision and on the net profit and find the most optimal way.
  • Bank loan management systems – it is used to verify the credit of the loan applicant and predict the likelihood of the loan being recovered.

Artificial intelligence techniques in business

Artificial intelligence systems mimic human expertise to identify patterns in large data sets. Companies such as Amazon, Facebook, and Google, etc. use artificial intelligence techniques to identify data that is most relevant to you.
Let's use Facebook as an example, Facebook usually makes very accurate predictions of people that you might know or went with to school. They use the data that you provide to them, the data that your friends provide and based on this information make predictions of people that you might know.
Amazon uses artificial intelligence techniques too to suggest products that you should buy also based on what you are currently getting.
Google also uses artificial intelligence to give you the most relevant search results based on your interactions with Google and your location.
These techniques have greatly contributed in making these companies very successful because they are able to provide value to their customers.

Online Analytical Processing (OLAP)

Online analytical processing (OLAP) is used to query and analyze multi-dimensional data and produce information that can be viewed in different ways using multiple dimensions.
Let's say a company sells laptops, desktops, and mobile device. They have four (4) branches A, B, C and D. OLAP can be used to view the total sales of each product in all regions and compare the actual sales with the projected sales.
Each piece of information such as product, number of sales, sales value represents a different dimension
The main objective of OLAP systems is to provide answers to ad hoc queries within the shortest possible time regardless of the size of the datasets being used.

Business Information Technology

Information Technology is the use of hardware, software and telecommunication networks to achieve business objectives.
For example, if a person works for a company that has clients in many different locations, they will be required to visit the clients from time to time.
While travelling, they will need access to their cash and all they have to do to access their cash is to go to the nearest ATM machine.
They can even use mobile money from their phones and withdraw cash from any agent.
The above-described scenario and many more others involve the use of Information Technology (IT).
In this tutorial, you will learn-
  • MIS infrastructure / MIS architectures
  • Computer hardware
  • MIS System software, application software, package software solutions
  • Database features, data management, designing databases
  • Telecommunication systems and networks
  • Data structures and algorithms

MIS infrastructure / MIS architectures

MIS infrastructure refers to the resources i.e. hardware, software, communication resources and services such as consultancy, training, etc. that provide the platform required to run an information system.
The following diagram shows the architecture of a typical MIS infrastructure;


Computer hardware

Computer hardware refers to the physical devices such as servers, desktop computers, laptops, portable devices, networking devices, storage devices and printers, etc. Let's now look at each of these elements separately
Servers – a server is a computer with high computing power and storage space that is used to host shared resources. The server can be used as a database server that stores all of the business transaction. An email server could be used for all emails of the company. A file share could be used for storing the individual files of the organization employees, etc.
Desktop computers – these are workstation clients that usually connect to the server to post, process, and retrieve information. For example, a point of sale system installed on a desktop computer to connect to the POS database on the server to post and retrieve data.
Laptops and Portable devices– laptops have the same computing power as desktop computers but have the advantage of been portable. With the advent of the internet and virtual private networks, employees can travel with their laptops to remote locations and still be able to access the server at the head office.
Tablets are much easier to carry compared to laptops, and many organizations have business applications that run from tablets. They are also capable of connecting to the server via the internet.
Networking devices – networking devices are used to interconnect computing resources so that they can communicate with each other. Common networking devices include networking hubs and switches, Wi-Fi routers, etc. Hubs and switches are used to provide network connectivity via a physical cable, and they are usually used to connect desktop computers. Wi-Fi routers are used to provide wireless networking capabilities. Wi-Fi routers are usually used to connect laptops and mobile devices to the corporate network.
Printers – printers are used to print hardcopies of reports. They vary depending on the use. Some printers have networking capabilities and can be installed on a network and used by more than one person. This reduces the costs of buying individual printers for each computer. Dot-matrix printers are usually very common with the point of sale and bank tellers for printing receipts, deposit slips, etc.
Storage devices – storage devices are used to store data. The data could be in the form of documents, audio, video, software installation packages, database backups, etc. The most common storage devices are external discs. Storage devices with networking capabilities also exist that can be used to share files on a network. The IT department usually creates file storage directories according to departments and type of data to be stored.

MIS System software, application software, package software solutions

The software runs on top of the hardware. Software refers to computer programs that perform specific tasks. The software is usually divided into two major categories namely system and application software.
MIS System Software
System software usually refers to the operating system. An operating system is a computer software that facilitates communication between the hardware and the user. Microsoft Windows is the most commonly used operating system in the world.

Other examples of operating systems include Mac OS developed by Apple and other are Linux-based operating systems such as Ubuntu, Fedora, etc.
Application Software
Application software runs on top of the operating system and performs very specialized tasks. For example, Microsoft Word is an example of an application software that is used to create and edit documents. Microsoft Excel is another example of application software that is used to manipulate numeric data.
Applications such as Excel and Word, are known as off-the-shelf packages. This means you can buy them from authorized dealers and start using them without demanding for any changes. If off the shelf software does not meet the requirements of the organization, then the custom software will have to be developed that meets the specification of the users. Such software is usually developed by companies that specialize in developing software.

Database features, data management, designing databases

A database is a collection of related data stored in one place with minimum redundancy. Most business applications record the day to day business transactions through these databases. There are various databases available for accessing and storing data like RDBMS, NoSQL, XML, etc.
  • The relational database management system (RDBMS) model uses tables to store data, and it is the most commonly used database model.
  • The data is queried using structured query language (SQL).
  • Records in a relational database table are uniquely identified using a primary key which should be unique for each record.
  • A primary key that appears in another table is called a foreign key.
A relational database system can either be standalone or client-server based. The standalone database does not support multiple users at the same time. Examples of standalone database systems include;
  • Microsoft Access
  • SQLIte
  • Microsoft SQL Server Compact
A client-server database can support more than one user at a time. The database engine is usually installed on a server computer and users connect to it from remote workstations. Examples of client-server databases systems include
  • MySQL
  • Microsoft SQL Server
  • Oracle
  • PostgreSQL
Another type of database that is now gaining popularity is NoSQL database. They are non-relational and are used to handle large amounts of data without slowing down the performance of the system. Companies that handle large amounts of data such as Facebook, Google, Amazon, etc. use NoSQL database.
Examples of NoSQL databases include
  • CouchDB
  • Oracle NoSQL database
  • MongoDB
  • Neo4J
Database designing is concerned with understanding the data storage and retrieval requirements of an organization and developing detailed data models of the database.

Telecommunication systems and networks

Telecommunication is the exchange of information over long distances. Telecommunication uses transmitters and receivers to facilitate communication. Signals can be sent via physical cables or the sent via a wireless network.
A telecommunication network refers to multiple transmitters and receivers exchanging data. The internet is an example of a large telecommunication network. Wide Area Networks (WANs), telephone communication networks, etc. are all examples of telecommunication networks.
Networking devices are used to link computers and other telecommunication devices together. The devices used to create a network depend on the type of network work that you want. For example, a wired Local Area Networks (LANs) will require a network switch and RJ-45 cables.
A network router is used to facilitate communication between two or more networks. A wireless router is used to provide wireless access points. A wireless access point is used to connect an electronic device i.e. computer, smartphones, etc. to a computer network

Data structures and algorithms

Think of a business such as Facebook. Every month billions of users submit data to Facebook. Facebook, in turn, uses this data to accurately select posts which are relevant to the user and make friends suggestions which are almost 100% accurate every time.
Data structures and algorithms are an efficient way of organizing and managing data, especially large datasets. Data structures usually refer to the way the data is stored.
For example, a class is a representation of a real-world entity. A customer class will contain properties i.e. name, account number, address, etc. and methods i.e. make a purchase, make a payment, etc.
The following image illustrates the concept of a class;
Other examples of data structures include arrays, records, sets and graphs.
An algorithm refers to the operations that can be performed on the data.
Let's take Amazon as an example. If you have ever purchased an item on Amazon or browsed through the catalogues, Amazon will recommend other items that you might be interested in. Amazon uses historical data to predict other items that you might also be interested in.
Summary:
Information technology as a business tool is used to efficiently archive business goals and reduce operational costs in the long run. At a minimum, an implementation of information technology requires hardware, software, and telecommunication networks.
Hardware refers to the physical devices such as servers, workstations, printers, etc. The software most used included database servers, email servers, spreadsheet applications, word processors, etc. Local area networks and sometimes wide area networks are used to share resources among users.

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...