100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Lecture notes Business Information Systems (CBIA011)

Rating
-
Sold
-
Pages
44
Uploaded on
08-05-2024
Written in
2023/2024

Data Technologies are a broad of category of tools, systems, and methods used to collect, store, process, manage, and analyse data. These are employed to facilitate handling and utilization of data in various contexts.












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 8, 2024
Number of pages
44
Written in
2023/2024
Type
Class notes
Professor(s)
Ms moila
Contains
All classes

Subjects

Content preview

UNIVERSITY OF LIMPOPO
TRUFLOOP CAMPUS


FACULTY OF MANAGEMENT AND LAW
SCHOOL OF ACCOUNTANCY
DEPARTMENT OF FINANCIAL MANAGEMENT




DATA AND TECHNOLOGY MODULE
CBIA 011/021




COMPILED BY:
MR. MB SONO
&
MS. MM MOILA


2022

, Table of contents

Contents
1. The fourth industrial revolution W5 .................................................................................................... 3
1.1. Introduction................................................................................................................................... 3
2. The nature of information W2............................................................................................................. 5
2.1. Introduction on Data versus Information ................................................................................... 5
3. The qualities of good information ...................................................................................................... 9
4. IT Choices .......................................................................................................................................... 11
4.1. Introduction................................................................................................................................. 11
4.2. Network Configuration............................................................................................................... 11
4.3. Wired or WiFi or 3G/4G? ............................................................................................................. 12
4.4. Local or cloud? ........................................................................................................................... 13
4.5. Databases .................................................................................................................................. 14
5. The ‘web’, the Internet, intranets andextranets W5 .......................................................................... 18
5.2. Variety ......................................................................................................................................... 22
5.3. Velocity ....................................................................................................................................... 22
6. Software for big data W3 .................................................................................................................. 22
7. Extraction, transformation and loading (ETL) W3 .......................................................................... 23
7.1. Introduction................................................................................................................................. 23
7.2. Extraction.................................................................................................................................... 25
7.3. Transformation ........................................................................................................................... 25
7.4. Loading ...................................................................................................................................... 25
8. Business intelligence W2 ................................................................................................................. 25
9. Dangers of big data W2 .................................................................................................................... 28
10. Monetising data; from data to impact W2 ....................................................................................... 30
10.1. Introduction ............................................................................................................................. 30
10.2. Monetising data ...................................................................................................................... 30
10.3. Data to impact .......................................................................................................................... 32
11. CYBER SECURITY W6 ................................................................................................................... 32
12. Artificial intelligence and Machine learning ....................................................................................... 39

, TECHNOLOGY ANDINFORMATION

1. The fourth industrial revolution W5

1.1. Introduction

Technologies have emerged and influences our lives in ways that suggest we are at the early stages
of a 4th industrial revolution, a new phase that is establishing as well as widening the impact of digital
technologies in unexpected ways. Thus, it is worth the time and effort to precisely consider the level
of developments we are starting to experience as well as how we could, independently and as part,
guarantee that they benefit the many rather than the few.

The First Industrial Revolution is universally perceived as the change from reliance on animals, human
effort, and biomass as sources of energy to the use of coal and oil and the mechanical energy that it
enabled. The second industrial revolution occurred between the end of the nineteenth century and
the first two decades of the twentieth century, and it resulted in increased breakthroughs such as
electricity distribution, wireless and wired communication, ammonia synthesis, and new forms of
electricity generation. The Third Industrial Revolution began in the 1950s, with the aid of computer
systems, communication, and rapid advances in computing power, which enabled new methods of
generating, processing, and sharing information.

The Fourth Industrial Revolution can be identified as the emergence of "cyber-physical systems," that
provide people and machines with entirely new capabilities. Even though these capabilities rely on
Third Industrial Revolution technologies and infrastructure, the Fourth Industrial Revolution
represents completely new embedding technology into societies and even our human bodies.
Examples include genome editing, new forms of artificial intelligence, ground-breaking materials, and
governance approaches based on cryptographic methods such as blockchain. The accounting
industry is one the industries which is being hit by the 4IR as people are losing jobs to robotics and
automated system. This is why it is important to equip the CAs of 2025 about the new developments
which are taking place so that the CAs of 2025 can equip themselves with the necessary knowledge
in order to fit in the society which is influenced by the 4th Industrial Revolution




1st industrial 2nd industrial 3rd Industrial 4th industrial
revolution revolution revolution revolution
Mechanisation: Mass production: Computers and Digital assets:
steam, water power. electricity to power automation. For artificial intelligence,
Eg the cotton and assembly lines such example, process robotics, 3d printing
steel industries as car production automation and (additive
digital machines, manufacturing)
autonomous vehicles,
biotechnology,
connectivity

, You will be familiar with the effects of the first three of the above and we now stand on the
brink of the fourth industrial revolution.

The World Economic Forum digital transformation initiative (DTI) suggests several key
technologies; in addition, there are several other emerging digital technologies. The complete
list is:

◉ Artificial intelligence: machines can learn and machines can make deductions based
on data supplied. For example, playing games such as Go, facial recognition,
predicting customer purchasing requirements and tastes, recommending music (like
Pandora) that each consumer should like.

◉ Autonomous vehicles: Taxis, private cars and particularly delivery vehicles. When
such vehicles can communicate with each other they should, in an emergency, all
be able to coordinate braking or taking evasive action.

◉ Big data analytics: See below.

◉ Cloud computing: Cloud computing turns IT infrastructure into a service. In other words, it
enables you to "connect" to the infrastructure via the Internet and use compute resources
without having to install and maintain them locally.

◉ Process automation: A whole process is automated. For example, when you order
goods on Amazon, once you click on ‘Buy’ the goods are automatically picked in the
warehouse, brought together and packed then despatched with very little human
intervention. Similarly, car manufacturing allows different components to be
automatically delivered to the production line so that the precise vehicles specified by
customers can be made.

◉ Custom manufacturing and 3D printing (additive manufacturing): Instead of drilling
holes into piece of metal or cutting it to shape, the material is gradually built up. The
process is automated allowing the quick production of prototypes or one-off
components

◉ Internet of things and connected devices: Your phone tells your heating system
when you come in and go out so that heating is automatically switched on and off.
Smart locks that you can unlock using an App. Radio Frequency Identification
(RFID) allow all components and finished goods to be tracked (and therefore
located) individually.

◉ Robots and drones: Robots offer sophisticated, reliable manufacturing. They can
also be used in human interactions. Drones allow cheap surveillance and surveying
from the air. For example, the health of crops can be analysed and based on findings
an autonomous tractor can be used to spread nutrients just where they are needed.
R253,33
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
thapelokaltykarymoshole

Get to know the seller

Seller avatar
thapelokaltykarymoshole University of Limpopo
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
7
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions