.

Thursday, March 7, 2019

Course Outline Faculty of Science and Technology Essay

tendency Number Course Title Course Instructor Credits Section Semester cable of action Meeting Times Class Venue Pre-requisites CMPS1024 (formerly CMPS150) Computer Business Application MGMT1014 (formerly MGMT101) Fundamentals of Management no(prenominal) 2012-2 3 CMPS3012 (formerly CMPS360) Management Information SystemsCo-requisites Office Location Office Hours (Consultation Hours) bid E-Mail Address Resources Required Text Other ResourcesBy interlockingLaudon, K.C., Laudon,J.P. Management Information Systems Managing the digital Firm, 11th edition, . Prentice Hall MIS course website http//odl.ub.edu.bz/moodle3/course/view.php?id=106 configuration DESCRIPTION COURSE DESCRIPTION This course is intentional to provide techniques and knowledge for creating competitive phone line, managing global or local corporations, adding line of work value and providing useful product and services to intended customers. Topics include green light Applications. Systems for Supply Chain Management. Customer Relationship Management. Knowledge Management Systems. digital Integration. Internet Technology. Database Design and Implement in an existing Database Management System. COURSE OBJECTIVES Upon successful completion of this course, students will be able to 1.1.1 Knowledge a. b. c. d. e. f. g. h. i. j. k. l. m. tell the role of information systems in todays competitive military control environment exempt information systems from both technical and business location Examine the transforming effect of information systems on organizations and management Explain the daze of internet technology and the World Wide Web on the Digital firm Describe the roles of individuals in the business processDescribe the types of business structures and how they function and serve clientele. Explain the importance of effective mangers and the roles they play in the business success and the development of innovative services and products Identify the impact, improvement and ben efit afforded businesses through electronic commerce Examine privacy issues and the shipway in which to secure a business and its stakeholders from privacy violations. Identify threats of usurpation and other forms of system violation that exists through external sources such as viruses. Describe salient differences between management and information technology specialists and how these differences are mitigated. Explain the various levels of management and the unique systems and structures that are critical to these levels Explain the Rationale for developing and maintaining systems which are reliable, scalable, portable and secure.

No comments:

Post a Comment