Friday, May 24, 2019

Course Outline Faculty of Science and Technology Essay

Course Number Course Title Course Instructor credit Section Semester Class Meeting Times Class Venue Pre-requisites CMPS1024 (formerly CMPS150) Computer Business Application MGMT1014 (formerly MGMT101) Fundamentals of guidance None 2012-2 3 CMPS3012 (formerly CMPS360) Management reading SystemsCo-requisites Office Location Office Hours (Consultation Hours) Telephone E-Mail Address Resources Required Text Other ResourcesBy appointmentLaudon, K.C., Laudon,J.P. Management Information Systems Managing the Digital Firm, eleventh edition, . Prentice Hall MIS course website http//odl.ub.edu.bz/moodle3/course/view.php?id=106COURSE DESCRIPTION COURSE DESCRIPTION This course is designed to provide techniques and knowledge for creating competitive strain, managing global or local corporations, adding business value and providing useful product and services to intended customers. Topics include Enterprise Applications. Systems for Supply Chain Management. Customer Relationship Management. Knowledge Management Systems. Digital Integration. Internet Technology. Database Design and Implement in an existing Database Management System. COURSE OBJECTIVES Upon successful completion of this course, students will be able to 1.1.1 Knowledge a. b. c. d. e. f. g. h. i. j. k. l. m. see the role of breeding systems in todays competitive business environment Explain information systems from both technical and business perspective regard the transforming effect of information systems on organizations and management Explain the impact of internet technology and the World Wide Web on the Digital firm absorb the roles of individuals in the business processDescribe the types of business structures and how they function and serve clientele. Explain the importance of effective mangers and the roles they play in the business success and the ripening of innovative services and products Identify the impact, usefulness and benefit afforded businesses through electronic commerce Examine privacy issues and the ways in which to secure a business and its stakeholders from privacy violations. Identify threats of intrusion and other forms of system violation that exists through external sources such as viruses. Describe salient differences between management and information technology specialists and how these differences are mitigated. Explain the various levels of management and the unique systems and structures that are critical to these levels Explain the Rationale for developing and maintaining systems which are reliable, scalable, portable and secure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.