{"id":91818,"date":"2022-02-10T10:45:21","date_gmt":"2022-02-10T10:45:21","guid":{"rendered":"https:\/\/academicwritersbay.com\/answers\/undergraduate-business-programme\/"},"modified":"2022-02-10T10:45:21","modified_gmt":"2022-02-10T10:45:21","slug":"undergraduate-business-programme","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/answers\/undergraduate-business-programme\/","title":{"rendered":"UNDERGRADUATE BUSINESS PROGRAMME"},"content":{"rendered":"<p>Pg. 1 Version 2FACULTY OF BUSINESS AND MANAGEMENT STUDIESUNDERGRADUATE BUSINESS PROGRAMMEACADEMIC YEAR 2021-2022, RESITMarch \u2013 2022WRIT1<br \/>\nProgramme Title: BMS, A&amp;F, MM, BE, BIS<br \/>\nModule Title: Information Technology in Business<br \/>\nModule Code: GCO3000<br \/>\nAssessment Method: Report<br \/>\nLevel: 3<br \/>\nBlock: 1<br \/>\nModule Credits: 20<br \/>\nWeighting: 50%<br \/>\nDue Date: 17-Feb-2022, 09:00 PM<br \/>\nWord Count: 2,000<br \/>\nExaminer(s): Mr. Aumir Shabbir<br \/>\nSubmission Date: February 17, 2022<br \/>\nVersion: 2<br \/>\nPg. 2 Version 2Gulf College \u2013 Faculty of Business and Management Studies \u2013 In academicAffiliation with CARDIFF SCHOOL OF MANAGEMENTA. Written work<br \/>\n\uf0d8<br \/>\nA signed declaration that the work is your own (apart from otherwise referencedacknowledgements) must be included after the reference page of your assignmentEach page must be numbered.Where appropriate, a contents page, a list of tables\/figures and a list of abbreviations shouldprecede your work.All referencing must adhere to School\/Institutional requirements.A word count must be stated at the end of your work.Appendices should be kept to the minimum and be of direct relevance to the content of yourwork.All tables and figures must be correctly numbered and labelled.<br \/>\n\uf0d8\uf0d8<br \/>\n\uf0d8\uf0d8\uf0d8<br \/>\n\uf0d8<br \/>\nB. Other types of coursework\/assignments<br \/>\n\uf0d8<br \/>\nWhere coursework involves oral presentations, discussions, poster presentations, etc.,specific instructions will be provided by your module leader\/team.<br \/>\n\uf026\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014Rewrite below part just after the References of your assignment.WORK DECLARATIONI, [Name of Student], hereby declare that the uploaded Report through Turnitin is my own work. Iaffirm that this has been researched and completed in accordance with the college rules andregulations on plagiarism.I acknowledge the advice given by the module tutors on proper referencing to avoid plagiarism andthe rules on the academic unfair practice.I acknowledge that I read and understand the plagiarism guide written at the end of this assessment.Any academic misconduct will be handled according to the rules and regulations of the university.[Name of Student]Pg. 3 Version 2General instructionsReport must be submitted online through Turnitin before due date.The only circumstance in which assignments can be uploaded late via Turnitin is if a MitigatingCircumstances (MC) form is submitted at the same time. In these circumstances work may besubmitted within five (5) working days. Make sure to secure MC form and submit the same to theconcerned staff.Write the number of words used, excluding references, at the end of your assignment. Provide thelist of sources you used at the last page of your assignment with proper label \u2018References\u2019. You mayinclude diagrams, figures etc. without word penalty. The number of words will be + or \u2013 10% of thetotal words allowed.A work declaration must be included on the first page of your assignment. This ensures that youprepare your work in good faith. Any form of collusion and\/or academic unfair practice will be dealtwith according to the pertinent rules and regulations of the partner university. Please carefully readthe plagiarism guide.Assessment Details and Guidelines to Students:This Report comprises 50% of the total assessments\u2019 marks. Make sure you reference (properHarvard Referencing should be observed) any sources you have used to complete this assessment.Analytical skills. The reflection report enables the students to analyse and evaluate the benefits ofthe different activities done in the class. This skill will eventually help them evaluate optionsnecessary to make decisions in the workplace.In addition, the assessment will test the following learning outcomes:1. Discuss the key functions of IT hardware and software and their application to business.3. Discuss the role of Information Technology within business and its wider role within society.Pg. 4 Version 2ASSESSMENT TASKCASE STUDY: How Information Systems (IS) can improve Business quality:The importance of information systems (IS) has dramatically increased during the past decade.Today a modern organisation could not be imagined without an efficientinformation system.Hence, to run a successful business, you need to invest in high-quality information systems that willsimplify processing data and statistics, either organisational or financial. Most of the companies haveexperienced data problems caused by lack of accuracy and reliability, and as a result, the workflowslows down. The primary goal for all companies is to reduce human errors and increase efficiency. Tobe able to achieve such goals, companies have to get an excellent information system.Against this backdrop you are required to write a report to assess the impact of Information Systemsin the development of business. The report should contain the following:1. Introduction: (400 words)a) Define and explain the Information Systems along-with the various types of InformationSystems used today in business organisations.2. Background: (400 words)a) Discuss the historical development of Information Systems along-with its advantages foroganisations.b) Compare the business environment before and after the implementation of InformationSystems applications.3. Discussion Section: (400 words)a) Identify and explain the key functions of Information Systems applications used in business.b) Does the system require some specific hardware to implement the Information Systems?Discuss the key functions of the additional IT hardware requirements, justify your answer.4. Recommendations: (200 words)a) Provide a secure computing environment that ensures data privacy and integrity whichmitigates cyber-security threats.5. Include report summary: (400 words)a) Discuss the role of Information Systems in the economy of Oman.b) Discuss the possible effect of the use of Information Systems on Omani society.6. Conclusion: (200 words)a) Conclusion, indicating that the report objectives have been met.***END OF ASSIGNMENT TASK***Guideline to the Students:Paragraph Format:<br \/>\nFont size<br \/>\n14pt for heading12pt for body text<br \/>\nFont style<br \/>\nArial(applicable to the source code as well)<br \/>\nLength of the contents (without the diagrams)<br \/>\n2000 words(include page numbers at the right-handbottom of each page)<br \/>\nReferences:Provide a list of minimum six (6) references from different sources including books, e-books,online sources, newspapers, journals, and publications using the proper Harvard style ofreferencing.GCO3000 \u2013 Information Technology in BusinessAY: 2021-2022 \/ RESITMarking Scheme<br \/>\nQuestionNo.<br \/>\nDescription<br \/>\nMarksAllocated<br \/>\n1.<br \/>\nIntroduction (include all the required points)<br \/>\na.<br \/>\nDefine and explain the Information Systems along-with the various types ofInformation Systems used today in business organisations.<br \/>\n20<br \/>\n2.<br \/>\nBackground (Knowledge and Analysis)<br \/>\na.<br \/>\nHistorical development of Information Systems along-with its advantages foroganisations.<br \/>\n10<br \/>\nb.<br \/>\nCompare the business environment before and after the implementation ofInformation Systems.<br \/>\n10<br \/>\n3.<br \/>\nDiscussion Section (Application)<br \/>\na.<br \/>\nThe key functions of Information Systems applications used in business.<br \/>\n10<br \/>\nb.<br \/>\nDetails of hardware requirements, justify your answer.<br \/>\n10<br \/>\n4.<br \/>\nRecommendations<br \/>\na.<br \/>\nProvide a secure computing environment that ensures data privacy and integritywhich mitigates cyber-security threats.<br \/>\n10<br \/>\n5.<br \/>\nReport Summary<br \/>\na.<br \/>\nDiscussion on the role of the Information Systems in the economy of Oman.<br \/>\n10<br \/>\nb.<br \/>\nDiscuss the possible effect of the use of Information Systems on Omani society.<br \/>\n10<br \/>\n6.<br \/>\nConclusion<br \/>\na.<br \/>\nConclusion, indicating that report objectives have been met.<br \/>\n10<br \/>\nTOTAL MARKS<br \/>\n100<br \/>\nPg. 7 Version 2Plagiarism1. Plagiarism, which can be defined as using without acknowledgement another person\u2019s words or ideasand submitting them for assessment as though it were one\u2019s own work, for instance by copying,translating from one language to another or unacknowledged paraphrasing. Further examples ofplagiarism are given below:Use of any quotation(s) from the published or unpublished work of other persons, whether publishedin textbooks, articles, the Web, or in any other format, which quotations have not been clearlyidentified as such by being placed in quotation marks and acknowledged.Use of another person\u2019s words or ideas that have been slightly changed or paraphrased to make itlook different from the original.Summarising another person\u2019s ideas, judgments, diagrams, figures, or computer programmes withoutreference to that person in the text and the source in a bibliography or reference list.Use of services of essay banks and\/or any other agencies.Use of unacknowledged material downloaded from the Internet.Re-use of one\u2019s own material except as authorised by the department.2. Collusion, which can be defined as when work that has been undertaken by or with others is submittedand passed off as solely as the work of one person. This also applies where the work of one candidateis submitted in the name of another. Where this is done with the knowledge of the originator bothparties can be at fault.3. Fabrication of data, making false claims to have carried out experiments, observations, interviews orother forms of data collection and analysis, or acting dishonestly in any other way.Plagiarism Detection Software (PDS) \u2013 TurnitinAs part of its commitment to quality and the maintenance of academic standards, the University reserves theright to use Plagiarism Detection Software (PDS), including Turnitin. Such software makes no judgment as towhether a piece of work has been plagiarised; it simply highlights sections of text that have been found inother sources.The use of plagiarism detection software fulfills two functions. The first is to enhance student learning (i.e., asa developmental tool); the second is to guard against and identify unfair practice in assessment.Further information and guidance can be found in the University\u2019s policy on the Use of Plagiarism DetectionSoftware (Turnitin).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pg. 1 Version 2FACULTY OF BUSINESS AND MANAGEMENT STUDIESUNDERGRADUATE BUSINESS PROGRAMMEACADEMIC YEAR 2021-2022, RESITMarch \u2013 2022WRIT1 Programme Title: BMS, A&amp;F, MM, BE, BIS Module Title:&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-91818","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/posts\/91818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/comments?post=91818"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/posts\/91818\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/media?parent=91818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/categories?post=91818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/answers\/wp-json\/wp\/v2\/tags?post=91818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}