首页 > > 详细

辅导 ISYS1000 Introduction to Business Information Systems Semester 1, 2025讲解 Python语言程序

ISYS1000 Introduction to Business Information Systems

Semester 1, 2025

ISYS1000 Assessment 1(30%)

This assessment consists of two parts: Weekly worksheets (10%) & ISDF Assignment (20%).

Part 1: Weekly Worksheets (10%)

To help you stay on track with your learning, we’ve designed weekly worksheets that align with Modules 1–5. These are great opportunities to reinforce key concepts and practice applying what you’ve learned!

Due Dates & Completion Timeline

You can complete the worksheets online at your own pace, as long as you submit them by the deadlines.

Key deadlines to remember:

•     Worksheet 1 (Module 1) and Worksheet 2 (Module 2) are due on 16 March.

•     Worksheets for Modules 2–5 will each have two weeks for completion.

•     Worksheet 5 (Module 5) is due by Sunday, 6 April 2025.

Accessing the Worksheets

•    You can find the worksheet links on Blackboard → Assessments → Assessment 1: Business Technology Analysis (ISDF).

Completing & Submitting the Worksheets

•     All worksheets must be completed on the Pearson MyLab platform.

•     If you have not yet set up your Pearson MyLab account, please follow the instructions provided on Blackboard → MyLab.

Recommendations for Successful Completion

•     Start early to allow ample time for completion and review.

•     Ensure you are familiar with the Pearson MyLab platform before beginning.

•     If you have any questions or encounter difficulties, please reach out for assistance.

Monitored Test – Closed-Book Exam Information

To ensure fairness and maintain academic integrity, these worksheets will be closed-book, monitored tests that must be completed under exam conditions.

Preparing for the Test

To take the test, you will need to install Respondus Monitor & LockDown Browser ahead of time. This tool helps create a secure test environment and ensures a smooth experience for all students.

What to Expect During the Test

•     You’ll take the test in a quiet, secure space without external resources.

•    The Respondus LockDown Browser will prevent you from opening other applications or browsing the web during the test.

•     Respondus Monitor will use your webcam and microphone to verify exam conditions.

Helpful Reminders

•    To avoid any last-minute issues, please install and test the Respondus LockDown Browser & Monitor in advance.

•     Step-by-step setup instructions are available on Blackboard → Assessments → Assessment 1:  Business Technology Analysis (ISDF) → Respondus LockDown Browser Download and Install.

Part 2: Information Systems Description Framework (ISDF) Assignment (20%)

Revised due date: Friday 28-March-2025 6:00 pm

In this individual assignment, you will use the Information Systems Description Framework (ISDF) to analyse  an  Information  System  within  a  selected  real-world  business.  This  analysis  will  involve providing detailed descriptions and diagrams to  illustrate the components and operations of the system.

The  Information  Systems  Description  Framework  (ISDF)  is  a  structured,  step-by-step  process  for describing the components and processes of an Information System. The proposed documentation should  clearly  describe  the  User,  uses  and  components  of  the  information  system  that  you  are describing.

Assignment Tasks

To begin, you need to select a small or medium-sized enterprise (SME) within your locality that has implemented an Information System to address a specific business need or to optimise its operations. Ideally, this should be a business you are familiar with, such as your own workplace (if employed) or a business you frequently interact with. Choosing a business you have access to will help in gathering relevant information for your analysis.

Once you  have  selected a  business,  provide  a  brief  description that  includes  its  name,  location, industry, and the products or services it offers. Additionally, describe its typical daily operations, such as sales transactions, order processing, inventory management, appointment scheduling, or customer service  interactions.  This  section  should  give  context  to  the  business  environment  in  which  the Information System operates.

Next, identify two key business processes that are crucial for the business's operations. These could include functions such as order  processing, inventory management, appointment scheduling, or customer service.  For each process, provide a brief explanation of how it functions and why it is important to the business. Consider what role these processes play in improving efficiency, reducing errors, or enhancing customer experience.

After identifying two business processes, select one of these processes for a detailed ISDF analysis in the following sections. Clearly state which process you have chosen. In the following section, your analysis of the chosen process should focus on how the information system supports this process, detailing the system's components, the users who interact with it, and the overall workflow. Ensure that your explanation includes diagrams in the relevant sections to visually represent the information system’s structure and its role within the business.

Your write-up for these sections can serve as the introduction of your submission, providing a clear foundation before diving into the deeper analysis using the ISDF framework.

1.0 General Description

1.1 Identifying Key Functions in the Business Process

For the chosen business process, identify and briefly describe four key functions or sub-processes within the process. These functions should represent the major steps involved but should not include internal technical details of the Information System itself.

For example, in an Order Processing system, the process begins when a customer initiates a purchase. Once the order is placed, the system records the sale through data capture, such as scanning a barcode at the Point-of-Sale (POS) system. After the transaction is logged, the inventory is automatically updated to reflect the reduction in stock levels. Finally, the system generates receipt for the customer, and the transaction is stored for reporting and future reference.

1.2 Identifying the Supporting Information System

After outlining the key functions, identify the Information System that supports this process and describe its overall purpose within the business. Explain how the system contributes to the efficiency, accuracy, or automation of the process, ensuring a clear connection between the system and the business operations.

1.3 Identifying Users and System Components

Identify and describe all users and their roles within the Information System. Users can include external users, such as customers and suppliers, who interact with the system for transactions, tracking, or service requests. Additionally, other information systems may act as users by exchanging data, automating processes, or supporting business functions. In this assignment, these are considered non-computerised users because they interact with the system but are not human users.

Next, identify internal users, such as employees and managers, who use the system for daily operations, decision-making, and managing business processes. Then, identify the key system components, such as internal software applications and storage databases, that interact within the system. In this assignment, software applications and storage databases are also conceptualised as non-computerized users because they interact with other components of the Information System but are not human users.

Briefly explain how both computerised and non-computerized users interact with each other within the Information System. These interactions may include inputting data, retrieving information, processing transactions, or storing records.

Provide a high-level explanation, focusing on the overall purpose of these interactions rather than technical details. The specific details will be discussed further in the ‘External Description’ and Internal Descriptionsections.

2.0 External Description

In this section, you will describe the inputs, outputs, and boundaries of the Information System. The focus should be on understanding how users interact with the system, what data they provide, how that data is processed, and what outputs the system generates for various users.

2.1 Inputs to the Information System

Identify all user roles and specify the inputs they provide to the components of the information system, along with the data entry methods used for submission.

Users interact with the system by submitting various types of input data through different data entry methods. These methods may include manual entry, such as filling out a web form; scanning, such as barcode scanning for inventory updates; or automatic capture, where an online purchase is recorded by the system without manual intervention.

Each user role should be clearly identified along with the data entry method used, the specific input data provided, and the software or application to which the data is submitted. This submission corresponds to the information processor discussed in the Internal Description section.

2.2 Outputs from the Information System

Identify all user roles and list the specific outputs they receive from components in the information system, along with the delivery method usedt 

After processing user inputs, the system generates various outputs that provide relevant information to users. These outputs can be delivered in different forms, such as emails, reports, notifications, receipts, or system updates. Each output is tailored to a specific recipient and contains information relevant to their role.

The format for describing outputs should include the name of the user or system receiving the output, the  data  output  method,  which  defines  how  the  information  is  delivered  (e.g.,  receipt,  report, notification), and a description or example of each output.

2.3 System Boundary

The boundary of the Information System defines what is inside the system (internal components) and what interacts with it externally (external components). External components are elements outside the  system  that   provide   inputs  or   receive  outputs,  such  as  customers,  suppliers,  or  external databasesInternal components are elements within the system that process or store information, such as internal databases, software applications, or internal users.

For example, in an Online Retail Systemexternal components include customers, who place orders, and suppliers, who send stock updates. The internal components include an Order Management System, which handles orders and transactions, and an Inventory Database, which stores product stock  levels.  In  this scenario,  customers  input  order details, the system  processes the  order, the warehouse receives a packing list, inventory levels are updated, and the finance team receives sales reports. The system boundary distinguishes what is part of the system, such as databases and internal processing, from what interacts with it externally, such as customers and suppliers.


When  describing  system  boundaries,  focus  on  information  processing  itself  rather  than  specific hardware, software, or communication technologies. Ensure that your descriptions of inputs and outputs are detailed, clearly identifying who provides or receives them and how they interact with the system. This section should offer more depth than the general system description, providing a structured understanding of how the Information System operates within its defined boundaries.

3.0 External View of the Information System

Create a diagram summarising the external components and interactions of the Information System, following the format below. Ensure the diagram includes all relevant details from the external description of the information system.

Figure 1 - External View of the Information System


4.0 Internal Description

This section details the information processors, information stores, and internal networks within the Information System. These components are crucial in processing, managing, and storing information to support business operations.

4.1 Information Processors

Information processors are the components responsible for handling and transforming data within the system. These processors can be human-based, where employees manually enter or verify data, or software-based, where automated systems perform calculations and process transactions. Each processor has a specific function in managing information to ensure efficient operations.

Example 1: Software-based information processor is the Automated Order Processing Application (AOPA), which automates order handling and transactions.

This system processes online orders by calculating total costs, including taxes and discounts, verifies payment transactions, and  updates stock  levels  accordingly.  It  also  generates order confirmation emails for customers.

•     Type: A software-based information processor that automates order handling and transactions.

•     Function:

o  Processes online orders by calculating total costs, including taxes and discounts.

o  Verifies payment transactions and updates stock levels.

o  Generates order confirmation emails for customers.

•     Description:   when   a   customer   places   an   order   on   an   e-commerce   website,   the   AOPA automatically calculates the final price, confirms the payment through an integrated payment gateway, updates the inventory system, and sends an order confirmation email to the customer. This  automation  reduces  manual  work,  minimises  errors,  and  improves  the  speed  of  order processing.

Example 2: Barcode Scanning System, a hardware device with embedded software that processes barcode data and transmits it to an inventory management system or Point-of-Sale (POS) software.

This system reads product barcodes, decodes the data, and updates stock levels accordingly.

•     Type: A barcode scanner with embedded software that processes scanned data and transmits it to an inventory system.

•     Function:

o  Reading product barcodes and extracting information.

o  Sending scanned information to the inventory management system or POS.

o  Automatically updating stock levels and tracking product movement.

•     Description: when a warehouse worker scans a barcode on an incoming shipment, the scanner processes the data, verifies product details, and updates the inventory system.

Note: While the barcode scanner is a physical device, the actual data processing is performed by the software embedded within the scanner or in a connected system. This distinction clarifies that the scanner itself is hardware, but the information is processed by its internal software or an integrated system.

Example 3: Manual Data Entry by Employees [Human-Based Information Processor]

Employees play an essential role in reviewing and correcting system-generated records, as well as manually inputting data where necessary.

•     Type: A person manually inputting or verifying data in the system.

•     Function:

o  Reviewing and correcting system-generated records to ensure accuracy.

o  Manually inputting data when automation is unavailable or unreliable.

•     Description: Customer support staff may need to correct an incorrect shipping address in the order management system to ensure the order is delivered to the correct recipient.

In situations where automation is limited, human input ensures that errors can be corrected, and data accuracy is maintained.

4.2 Information Stores

Information stores are the components of an information system that store and retrieve data. These stores can be physical (e.g., paper-based records, filing cabinets) or digital (e.g., databases, cloud storage, file management systems). The purpose of these stores is to ensure that critical information is securely recorded and accessible when needed.

Example 1: Customer Database (CDB) [Digital Storage]

A common example of a digital information store is the Customer Database (CDB), which stores customer-related  data,  including  names,  contact  details,  and  order  history.  This  database  helps businesses track  customer  purchase  behaviour  and  preferences  while  enabling  quick  retrieval  of information for order processing and customer support. For instance, when a returning customer logs into an e-commerce website, the CDB retrieves their saved shipping address and previous order history, streamlining the checkout process and enhancing the customer experience.

•     Type: A digital database that stores customer-related data.

•     Function:

o  Stores customer details such as names, contact information, and order history.

o  Tracks customer purchase behaviour and preferences.

o  Allows quick retrieval of customer information for order processing and support.

Description: A returning customer logs into an e-commerce website. The CDB retrieves their saved shipping address and previous order history, enabling a faster checkout process.

Example 2: Inventory Management Database (IMD) [Digital Storage  Cloud-Based or On-Premise Database]

Another example of a digital storage system is the Inventory Management Database (IMD), which is used to track stock levels, product details, and warehouse locations. This structured database can be cloud-based  or  on-premise,  and  it  maintains  real-time  records  of  product  availability  and stock movements. It automatically updates inventory levels after a sale or upon receiving new stock. For example, when a warehouse worker scans a barcode on a newly arrived shipment, the IMD updates stock levels instantly, ensuring accurate inventory tracking and supporting supply chain management.

•     Type:  A  structured  digital  database  that  tracks  stock  levels,  product  details,  and  warehouse locations.

•     Function:

o  Maintains real-time records of product availability and stock movements.

o  Updates inventory levels automatically after a sale or new stock arrival.

o  Supports supply chain and warehouse management.

Description: A warehouse worker scans a barcode on a newly arrived shipment. The IMD updates the stock levels automatically, ensuring accurate inventory tracking.

Example 3: Document Storage System (DSS) [Physical Filing System]

In contrast, a Document Storage System (DSS) represents a physical filing system used for storing important  business  documents,  such  as  invoices,  contracts,  and  compliance  records. This  system allows  businesses  to  retrieve  physical  documents  when  needed  for  operations,  audits,  or  legal requirements. For instance, when the finance department needs to verify a past transaction, they locate the relevant filing cabinet, retrieve the customer’s invoice, and review the payment details for reconciliation.

•     Type: A physical repository for business documents, such as filing cabinets or paper-based record storage.

•     Function:

o  Stores important documents, including invoices, contracts, and compliance records.

o  Enables retrieval of physical documents when needed for business operations.

o  Provides a structured filing system to support audits and legal requirements.

Description: The finance department needs to verify a past transaction.  They locate the DSS filing cabinet, retrieve the customer's invoice, and review the payment details for reconciliation.

4.3 Communication Networks

Communication networks are essential for transferring information within and outside an Information System. These networks facilitate seamless interaction between internal system components and external users, ensuring secure and efficient data exchange.

Communication networks are categorised into:

•     Internal communication networks are used within the organisation to facilitate data exchange between employees, systems, and databases.

•     External Communication Networks connect the system to external users, third-party services, and other external entities.

4.3.1 Internal Communication Networks

Internal communication networks enable data transfer within the organisation, allowing employees, systems, and databases to communicate efficiently. These networks provide secure access to internal applications, facilitate collaboration, and ensure smooth business operations.

4.3.2 External Communication Networks

External communication networks connect the system with customers, suppliers, payment gateways, and third-party services. These networks allow external users to interact with the system for transactions, support, and information exchange.

Examples of communication networks

1.    Intranet [Internal Network] - Type: A private network accessible only to employees within the organisation.

An Intranet is a private network accessible only to employees within the organisation. It provides secure access to internal applications, shared files, and company resources while connecting internal systems such as the Automated Order Processing System (AOPS) and Inventory Management Database (IMD). It also enables employees to collaborate using internal web portals and dashboards.

•     Function:

o  Provides secure access to internal applications, shared files, and company resources.

o  Connects internal systems, such as the Automated Order Processing System (AOPS) and Inventory Management Database (IMD).

o  Enables employees to collaborate using internal web portals and dashboards.

•     Description:

o  Sales manager may access the Intranet to check order reports and inventory status from the Inventory Management Database (IMD).

2.   VPN (Virtual Private Network) [Secure Remote Access] - Type: A secure encrypted network that allows employees to access internal systems remotely.

A VPN is a secure, encrypted network that allows employees to access internal systems remotely. It creates a secure tunnel for remote employees to connect to company resources while encrypting data to protect sensitive information from external threats. Employees can  access internal databases, applications, and file servers securely from outside the office.

•     Function:

o  Provides a secure tunnel for remote employees to connect to company resources.

o  Encrypts data to protect sensitive information from external threats.

o  Allows access to internal databases, applications, and file servers from outside the office.

•     Description: Remote employee uses a VPN to securely access the Customer Database (CDB) from their home computer to update customer records.

3.    Internet [Public Network] - Type: A global public network that enables customers and external users to access system resources.

The Internet is a global public network that enables customers and external users to access system resources. It supports online transactions, customer interactions, and third-party integrations. Customers can place orders, track shipments, and receive automated notifications via a web-based portal.

•     Function:

o  Supports online transactions and customer interactions.

o  Enables customers to place orders and track shipments through a web-based portal.

o  Allows third-party integration with services such as payment gateways and logistics providers.

•     Description: Customer visits the company’s e-commerce website via the Internet, places an order, and receives an automated order confirmation email.

4.    Direct Email Communication [External Email Network] - Type: An external communication network for exchanging emails with customers, vendors, and partners.

Direct email communication is an external communication network used for exchanging emails with customers, vendors, and business partners. This network facilitates automated order confirmations, invoices, and shipping notifications while enabling direct customer service interactions. It also supports business-to-business communication with suppliers and partners.

•     Function:

o  Sends automated order confirmations, invoices, and shipping notifications to customers.

o  Enables direct customer service interactions.

o  Facilitates business-to-business communication with suppliers and partners.

•     Description: After a successful payment, the Automated Order Processing System (AOPS) sends an email confirmation to the customer with their order details and   estimated delivery date.


5.0 Internal View Diagram

Create a diagram that visually represents the internal workings of the Information System. Use the provided drawing as a base and modify it to include all relevant internal components.

Ensure that your diagram:

•     Accurately reflects the internal description from Part 4, including information processors, information stores, and communication networks.

•     Clearly labels each component, showing how data flows within the system.

•     Maintains consistency with your written explanation, ensuring that all essential elements are visually represented.

Once you have edited the diagram, review it carefully to confirm that it aligns with your written  description of the internal system and effectively illustrates its key components and interactions.

Figure 2 - Internal View of the Information System



联系我们
  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp
热点标签

联系我们 - QQ: 99515681 微信:codinghelp
程序辅导网!