Week 1 Assignment Operational
Week 1 Assignment Operational
Sanjay Adhikari
Operational Excellence
(ITS-631-M41)
05/14/2022
2
Section 1
Study questions
They develop information systems, helpdesk support, system analyst, and programming
Exercise 3
technologies, people, and processes working in harmony. Technologies play a crucial role in
system development and operation. This includes hardware such as servers, networking
equipment, and storage devices, as well as software components like operating systems,
3
like artificial intelligence, machine learning, and Internet of Things (IoT) have significantly
engineers, system architects, designers, and testers collaborate to design, develop, and deploy
these systems (Al-Mamary, Shamsuddin & Aziati, 2014). Project managers oversee the entire
process, ensuring effective communication and coordination. System administrators and support
personnel maintain the systems, monitor performance, and provide technical assistance.
Processes are the structured methodologies used to develop and manage systems. This
includes software development methodologies like Agile, Scrum, or Waterfall, which outline the
steps from requirements gathering to deployment. Quality assurance processes ensure that
systems meet the specified requirements and undergo thorough testing. Additionally, change
management processes ensure smooth updates and upgrades, while incident and problem
improvement in these areas are crucial for building robust and efficient systems that meet the
Exercise 4
The argument that we are in a post-PC stage in the evolution of information systems
holds merit. The rise of mobile devices, cloud computing, and the Internet of Things (IoT) has
significantly shifted the way we access and interact with information. Cloud computing has
4
gained traction, providing businesses with scalable and flexible computing resources, reducing
will play a crucial role in automating routine tasks, enhancing decision-making, and enabling
personalized user experiences (Alajrami, Romanovsky & Gallina, 2016, November). Edge
computing will bring computing power closer to the data source, enabling real-time processing
and reducing latency, which is crucial for applications like IoT. Immersive technologies like
virtual reality (VR) and augmented reality (AR) will revolutionize collaboration, training, and
Section 2
Information systems are more than just computers. This lesson emphasizes that
information systems involve more than just computer hardware and software. They encompass
the people, processes, and data that work together to collect, store, process, and distribute
information. Recognizing this broader perspective is crucial for leveraging information systems
Information systems are strategic assets. This lesson underscores the strategic value of
Understanding this strategic potential helps businesses view information systems as critical
Information systems must be aligned with business objectives. This lesson stresses the
Effective alignment ensures that information systems support business goals, improve efficiency,
and enable innovation (Ponelis, 2015). Recognizing this alignment helps organizations make
informed decisions about technology investments and maximize their return on investment.
Information systems require skilled professionals. This lesson highlights the need for
maintaining these systems. Recognizing the importance of skilled personnel helps organizations
Information systems raise ethical and social concerns. This lesson emphasizes the ethical
and social implications of information systems. Privacy, security, and data integrity are essential
considerations when dealing with information systems. Recognizing these concerns ensures
organizations uphold ethical standards, protect sensitive information, and navigate legal and
regulatory requirements.
Understanding these basic concepts is vital for several reasons. It helps organizations
make informed decisions regarding information systems investments, ensuring they align with
Recognizing the ethical and social implications ensures responsible and ethical use of
information systems, safeguarding privacy and data security. Understanding these concepts helps
individuals pursue careers in information technology, equipping them with the necessary
knowledge and skills to excel in this field. These key lessons lay the foundation for a
6
environments.
7
References
Al-Mamary, Y. H., Shamsuddin, A., & Aziati, N. (2014). The role of different types of
333-339.
Alajrami, S., Romanovsky, A., & Gallina, B. (2016, November). Software development in the
Ponelis, S. R. (2015). Using interpretive qualitative case studies for exploratory research in
enterprises.