Chapters 1-6
____ is an example of transaction-processing system
Automated Payroll
_____ is an example of transaction-processing system.
Automated payroll
____ means that computers and networks are operating and authorized users can access the information they need.
Availability
A systems analyst is responsible for: a. the writing of computer programs and software segments. b. the design and implementation of information systems. c. the design and maintenance of an organization's Web site. d. the management of all the hardware and software within the information systems department.
B
Identify the external source of data in an information system. a. Personnel records b. Economic conditions c. Sales records d. Transaction reports
B
Which of the following is spreadsheet software? a. IBM DB2 b. Corel Quattro Pro c. File Maker Pro d. Microsoft Word
B
Which of the following statements is true of business intelligence (BI)? a. It is information in its raw form. b. It gives organizations a competitive advantage in the marketplace. c. It cannot be generated by an information system. d. It provides only the current view of business operations and environments.
B
Which of the following statements is true of inkjet printers? a. An inkjet printer is used in large office environments with high-volume and high-quality printing requirements. b. An inkjet printer is suitable for home users who have limited text and photo printing needs. c. An inkjet printer uses laser-based technology that creates electrical charges on a rotating drum to attract toner. d. An inkjet printer's output is called a soft copy.
B
_____ contain large-capacity hard drives and enable users to store files and applications for later retrieval. a. Application servers b. Disk servers c. Web servers d. Remote access servers
B
_____ is a set of instructions used to control the computer using 0s and 1s, which the computer understands as on or off signals. a. Object code b. Binary code c. Source code d. Unicode
B
_____ is one of the strategies identified by Michael Porter that can help organizations improve efficiency by reducing costs. a. Loss leadership b. Overall cost leadership c. Reverse costing d. Transformational leadership
B
____ security measures use a physiological element to enhance security measures.
Biometric
____ could be used to make sure people don't vote more than once.
Biometric Security Measures
____ are hackers who specialize in unauthorized penetration of information systems.
Black Hats
A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.
Blog
examples of information technologies used to support information systems
Computer networks (wired and wireless) database systems POS systems radio-frequency-identification (RFID) tags
Intrusion detection system (IDS)
Can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources. This is a nonbiometric security measure.
Sniffing
Capturing and recording network traffic. Often used by hackers to intercept information.
Create, Read, Update, and Delete (CRUD)
Data adminstration is used to determine who has permission to perform certain functions, ofthen summarized as create, read, update, and delete.
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
Disaster Recovery
____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
Discussion groups
A ____ router can build tables that identify addresses on each network.
Dynamic
_______ describes the processes used in data warehouses. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target.
E.T.L. (Extraction, Transformation, Loading)
Decentralized Processing
EACH user HAS ITS OWN COMPUTER for performing processing tasks. Disadvantages include: 1. lack of coordination; 2. high costs; 3. duplication of efforts.
______ is a(n) objected oriented design technique
Encapsulation
A virtual organization needs central offices and organizational hierarchy for participants to contribute their expertise.
F
An effective financial information system (FIS) should provide timely, accurate, and integrated information about the marketing mix.
F
An intrusion detection system cannot prevent DoS attacks.
F
An object code must be translated into source code in order for the computer to be able to read and execute.
F
Application-filtering firewalls are less expensive than packet-filtering firewalls.
F
As compared to data warehouses, consolidating information from different departments or functional areas is easier in data marts.
F
Backup facilities should never be shared in an attempt to reduce costs.
F
Both the ALU and the control unit are part of the BIOS.
F
Buy power is high when customers have few choices and low when they have many choices.
F
Buyer power is high when customers have few choices and low when they have many choices.
F
Client-based e-mail enables you to access your e-mail account from any computer.
F
Corner bolts are secured to a computer at the power outlet.
F
Customers, competitors, and suppliers are examples of internal data sources.
F
Data redundancy is eliminated or minimized in a flat file system.
F
For each database, there can be more than one physical view of data.
F
Generally,there are three sources of data: internal, external and generated.
F
In the context of an information systems job, a database administrator writes computer programs or software segments that allow the information system to perform a specific task.
F
In well-designed data-driven Web sites, changes are made to the HTML code.
F
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
F
Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.
F
Light pen is an output device.
F
Log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
F
Metadata is extraneous data generated from an SQL join command.
F
Most information systems avoid using graphical user interfaces.
F
NAS is composed of arrays such that if one disk is the array fails, data is not lost.
F
Open Directory is an example of an automated directory.
F
Skill in using word processing software is an example of information literacy.
F
Sometimes, 4GLs are called procedural languages.
F
The contents of Programmable read-only memory (PROM) can be erased and reprogrammed.
F
The data component of an information system is considered the output to the system.
F
The database component of an information system accesses only internal data.
F
The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.
F
The hardware components of a computer system consist of programs written in computer languages.
F
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
F
The network model is similar to the hierarchical model because records are organized in the same way.
F
The software component of the management information system (MIS) includes input, output, and memory devices.
F
The speed of the Internet is usually faster than that of an intranet.
F
The term CRUD stands for copy, revise, undo, and define.
F
Twitter is an example of a management information system (MIS).
F
Using VoIP for international and long-distance calls is more expensive than a standard telephone service.
F
Very-large-scale integration (VLSI) circuits were introduced in the fifth generation computers.
F
When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.
F
When solving problems, the users of an information system must avoid using information information- such as rumors, unconfirmed reports, and stories.
F
With NAS, as the number of users increase, the performance increases too.
F
With the indexed sequential access method (ISAM), records cannot be accessed randomly.
F
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
F ; phishing
A select operation pares down a table by eliminating columns according to certain criteria.
F; projection does thiss
The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
Fair Use Docterine
The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
Fair Use Doctrine
What is a legal exception to copyright laws?
Fair Use Doctrine
A hub can choose the best possible path for packets based on distance and cost.
False
A mesh is a hardware and software device that controls the data transfer from a computer to a peripheral device and vice versa.
False
In the Open Systems Interconnection model, the session layer is responsible for formatting message packets.
False
Local area networks(LANs) are used most often to isolate resources.
False
Replacing meetings over computer networks with actual face-to-face meetings is one of the goals of green computing.
False
Social engineering is an example of an unintentional security threat.
False
IBM system z10 is an example of ___ computer
Fifth Generation
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
Green Computing
Which of the following is true of the Internet?
It has less security measures than an intranet.
The four Ms of resources are _____.
Manpower, Machinery, Materials, and Money
Sequentical file structure
In a __, the files are organized and processes in numerical or sequential order, typically the order in which they are entered.
Hierarchical method
In a __, the relationships between records form a treelike structure. Records are called nodes, and relationships between records are called branches. The node at the top is called the root, and every other node is called a child, and consequentially have a parent. Nodes with the same parent are called twins or siblings.
Which of the following is true of a database?
More information can be generated from the same data.
Which of the following is true of a flat file system?
More sophisticated security measures cannot be used.
Ring Topology
NO HOST required as each computer manages its own connectivity; EACH NODE IS CONNECT TO TWO OTHER NODES.
Comprehensive Security System
Protects an organization's resources, including information and computer and network equipment, emails, invoices transferred via electronic data interchange (EDI), new product designs, marketing campaigns, and financial statements.
The ____ view involves how data is stored on and retrieved from storage media.
Physical
_____ is 1/1,000,000,000,000 of a second
Picosecond
A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
Podcast
The purpose of an information system's _____ component is generating the most useful type of information for making decisions.
Process
the purpose of an information system's ____ component is generating the most useful type of information for making decisions
Process
Centralized Processing
Processing is done at ONE central computer; used in EARLY DAYS of computer technology because: 1. data-processing personnel were in short supply; 2. hardware and software were expensive.
Business Intelligence
Provides historical, current and predictive views of business operations and environments and gives organizations a competitive advantage in the market place.
The ____ approach to a distributed DBMS has each site store a copy of the data in the organization's database.
Replication
With the ________ approach to setting up a distributed DBMS, each site stores a copy of data of the organization's database.
Replication
In ____ processing, each department has its own computer for performing processing tasks.
decentralized
log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive
false
metadata is extraneous data generated from an SQL join command
false
replacing meetings over computer networks with actual face-to-face meetings is one of the goals of green computing
false
the database component of an information system accesses only internal data
false
the indexed sequential access method (ISAM) is slow and becomes increasingly useful as the number of records becomes larger
false
the network model is similar to the hierarchical model because records are organized in the same way
false
the term CRUD stands for copy, revise, undo, and define
false
with the indexed sequential access method (ISAM) records cannot be accessed randomly
false
Digital divide
information technology and the internet have created a ___. Computers still aren't affordable to many people. The __ has implications for education.
Hardware components of MIS
input, output, and memory devices and vary depending on the application and the organization
Management information system's (MIS) _____ include programs developed in-house.
software components
client/ server model
software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client request \ can be horizontal - adding more workstations (clients) can be vertical - migrating the network to larger, faster servers
Biometric security measures
use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.
some "information paranoia" is valid because about almost every aspect of people's lives is now stored on various databases
true
sometimes cookies are useful or innocuous
true
spamming has created decency concerns, because these emails often contain explicit language or nudity and can be opened by children
true
the "integrity rules" component of a data model defines the boundaries of a database, constraints, and access methods
true
the database administrator is responsible for developing recovery procedures in case data is lost or corrupted
true
the increasing popularity of the smart phones may result in stress-related injuries of the users' hands, arms back and eyes
true
the sequential access file structure method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis
true
the use of OR operator means that only one of the conditions must be met
true
Physical view
involves how data is stored and retrieved from storage media, such as hard disks, magnetic taper, or CDs.
logical view
involves how information appears to users and how it can be organized and retrieved.
Hardware
physical devices, such as keyboards, monitors, and processing units
Web Technologies
played a major role in improving the efficiency and effectiveness of HR departments. For example, intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left or looking up how much they have in their 401(k) plans
Physical Security measures
primarily control access to computers and networks and includes devices for securing computers and peripherals from theft.
physical security measures
primarily control access to computers and networks, and include devices for securing computers and peripherals from theft
biometric security measures
use a physiological element to enhance security measures. These elements are unique to a person and can't be stolen, lost, copied, or passed on to others
Optical Disk
use laser beams to access and store data. Examples are CD-ROM, WORM discs and erasable ___
Optical Disks
use laser beams to access and store data. Optical technology can store vast amounts of data and is durable. Three common types of optical storage are CD-ROMs, WORM discs, and DVDs.
4th generation languages (4GLs)
use macro codes that can take the place of several lines of programming. The commands are powerful and easy to learn, particular for people with little computer training.
Open Systems Interconnection
Seven-layer ARCHITECTURE for DEFINING HOW DATA IS TRANSMITTED in a network; each layer is responsible for different, unique functions.
Inkjet printers produce characters by projecting electrically charged droplets of ink onto paper that create an image.
T
Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left.
T
Intranets are typically set up behind a firewall.
T
NAS is popular for WEB servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant.
T
Private information on the Web—what is posted by a person—is not subject to censorship because of our constitutional freedom of expression.
T
Random access memory can be read from and written to.
T
Redundant data is eliminated by a process called normalization.
T
Rivalry among existing competitors is high when many competitors occupy the same marketplace position.
T
Some "information paranoia" is valid because information about almost every aspect of people's lives is now stored on various databases.
T
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
T
The "integrity rules" component of a data model defines the boundaries of a database, constraints, and access methods.
T
The World Wide Web (WWW) changed the Internet by introducing a graphical interface to the largely text-based Internet.
T
The most common personal digital assistant is a smartphone.
T
The quality of information is determined by its usefulness to users.
T
The split keyboard has been developed for better ergonomics.
T
The terms "information systems" and "information technologies" are used interchangeably.
T
Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace.
T
Trackballs are ideal for notebook computers because they occupy less space than a mouse.
T
Trojans do not replicate themselves, as viruses and worms do.
T
The ____ denotes the type of organization or country the address specifies.
TLD
Hierarchical Topology
TRADITIONAL MAINFRAME NETWORKS; two primary components: 1. controller; and 2. multiplexer.
Which of the following is a source of external data?
Tax Records
External data
Sources
Internal sales & external economic reports are examples of what?
Sources of Data Records
____ has created decency concerns, because these e-mails often contain explicit language or nudity.
Spamming
A(n) ____ is often used so remote users have a secure connection to the organization's network.
Virtual Private Network (V.P.N.)
Which of the following protocols is used for Internet telephony?
VoIP
What is the protocol used for Internet telephony?
Voice Over Internet Protocol
Random Access Memory (RAM)
Volatile Memory. Data can be read from and written to RAM. Some examples of the type of information stored in RAM include open files, the Clipboard's contents, running programs, and so forth.
____ is a major player in B2B e-commerce.
Walmart
A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
Warehouse
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
Web Browsers
____ is collecting data from Web sites, usually for competitive intelligence.
Web Harvesting
____ is collecting data from Web sites, usually for competitive intelligence.
Web harvesting
Remote access servers (RAS)
allow off-site users to connect to network resources, such as network file storage, printers, and databases.
Information systems vs information technologies
both are used to help organizations be more competitive and improve their overall efficiency and effectiveness
Object-oriented databases
both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the objects date.
Data Definition
component used to create and maintain the data dictionary and define the structure of files in a database.
In symmetric encryption
(also called "secret key encryption"), the same key is used to encrypt and decrypt the message.
CPU Case
(also known as a computer chassis or tower) is the enclosure containing the computer's main components.
Information technologies have created job upgrading.
T
Three Components of a Data Communication System
1. Sender and receiver devices 2. modems or routers 3. communication medium
The Internet started in ____.
1969
The Internet2 (I2) project started in ____.
1987
two - tier architecture
(the most common type) a client, (tier one) communicates directly with the server (tier two) -presentation logic always on client -data management logic always on the server -application logic can be on either client or server most of time client side.
Hand geometry is an example of a biometric security measure.
- T
symmetric encryption
-"secret key encryption" -the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the ley and keep it secret
backdoor
-a.k.a: trapdoor -is a programming routine built into a system by its designer or programmer. it enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files
Byte
1 byte= 8 bits
Decisions that MKIS support
1) Analyzing market share, sales, and sales personnel 2) Sales forecasting 3) Price and cost analysis of items sold
the 5 forces
1) Buyer power 2) Supplier power 3) Threat of substitute products or services 4) Threat of new entrants 5) Rivalry among existing competitors
A PIS/HRIS supports the following decisions, among others:
1) Choosing the best job candidate 2) Scheduling and assigning employees 3) Predicting the organization's future personnel needs 4) Providing reports and statistics on employee demographics 5) Allocating human and financial resources
Describe the four major components of an information system.
1) Data 2) Database 3) Process 4) Information
Summarize the future outlook of information systems.
1) Hardware and software costs will continue to decline making it affordable for all organizations, regardless of size, to utilize information systems. 2) Artificial intelligence will continue to improve and expand. 3) Computer literacy will improve as computer basics are taught in schools. 4) Compatibility issues between networks will become more manageable. 5) Personal computers will continue to improve in power and quality. They should become more affordable. 6) Computer criminals will become more sophisticated, and protecting personal identity information will become more difficult.
By examining various factors related to designing, implementing, and using information systems, the following predictions can be made:
1) Hardware and software costs will continue to decline, so processing information will be less expensive. These cost savings should make information systems affordable for any organization, regardless of its size and financial status. 2) Artificial intelligence and related technologies will continue to improve and expand, which will have an impact on information systems. For example, further development in natural language processing should make information systems easier to use. Also, robots will play a major role in the workforce of the future. 3) The computer literacy of typical information system users will improve, as computer basics are taught more in elementary schools. 4) Networking technology will improve, so connecting computers will be easier, and sending information from one location to another will be faster. Compatibility issues between networks will become more manageable, and integrating voice, data, and images on the same transmission medium will improve communication quality and information delivery. 5) Personal computers and tablets will continue to improve in power and quality, so most information system software will be able to run on them without problems. This trend should make information systems more affordable, easier to maintain, and more appealing to organizations. 6) Internet growth will continue, which will put small and large organizations on the same footing, regardless of their financial status. Internet growth will also make e-collaboration easier, despite geographical distances. 7) Computer criminals will become more sophisticated, and protecting personal information will become more difficult.
When choosing between a SAN and a NAS system, consider the following factors:
1) Hybrid solutions (combining a SAN and a NAS) might be available. 2) A SAN offers only storage; a NAS system offers both storage and file services. 3) NAS is popular for Web servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant. It is also becoming a useful solution for providing large amounts of heterogeneous data (text, documents, voice, images, movies, and so forth) for consumer applications. 4) The biggest issue with NAS is that, as the number of users increases, its performance deteriorates. However, it can be expanded easily by adding more servers or upgrading the CPU.
decisions an FIS is used to support:
1) Improving budget allocation 2) Minimizing capital investment risks 3) Monitoring cost trends 4) Managing cash flows 5) Determining portfolio structures
Examples of decisions supported by an LIS
1) Improving routing and delivery schedules 2) Selecting the best modes of transportation 3) Improving transportation budgeting 4) Improving shipment planning
3 main types of Secondary memory devices
1) Magnetic disks 2) Magnetic Tape 3) Optical Disks
IT jobs fall into the following categories:
1) Operations and help desk 2) Programming 3) Systems design 4) Web design and Web hosting 5) Network design and maintenance 6) Database design and maintenance 7) Robotics and artificial intelligence
Decisions that an MFIS supports
1) Ordering decisions 2) Product cost calculations 3) Space utilization 4) The bid evaluation process used with vendors and suppliers 5) Analysis of price changes and discounts
Porters 3 strategies
1) Overall cost leadership 2) Differentiation 3) Focus
2 other types of ROM
1) Programmable read-only memory (PROM) 2) Erasable programmable read-only memory (EPROM)
A computers 3 basic tasks
1) arithmetic operations 2) logical operations 3) storage and retrieval operations
To use a computer and process data, three major components are needed:
1) input 2) output 3) Memory Devices
the 4 M's of resources
1) manpower 2) machinery 3) materials 4) money
Classes of computers
1) sub notebooks 2) notebooks 3) personal computers 4) minicomputers 5) mainframes 6) supercomputers.
How long do patents last?
14-20 Years
By examining various factors related to designing, implementing, and using information systems, it can be predicted that: a. computer criminals will become more sophisticated. b. hardware and software costs will continue to increase. c. protecting personal information will become easier. d. compatibility issues between networks will become less manageable.
A
Identify a true statement about transaction-processing systems (TPSs). a. They have provided enormous reductions in costs. b. They do not focus on data collection. c. They primarily focus on generating business intelligence (BI). d. They do not have the capacity to handle enormous sources of data.
A
The field of _____ technologies involves the applications and properties of light, including its interactions with lasers and telescopes. a. optical b. space c. vacuum d. integrated circuit
A
Which of the following decisions is supported by a logistics information system (LIS)? a. Improving shipment planning b. Scheduling and assigning employees c. Determining portfolio structures d. Forecasting sales
A
_____ components of a computer are physical devices, such as keyboards, monitors, and processing units. a. Hardware b. Adware c. Software d. Spyware
A
_____ data limits the ability of decision makers to focus on specific factors. a. Aggregated b. Disaggregated c. Symmetric d. Asymmetric
A
_____ is a first generation computer language that is machine dependent. a. Machine language b. Nonprocedural language c. Assembly language d. High-level language
A
Processors
A 32-bit processor can use bytes (4 GB) of RAM; and, in theory, a 64-bit processor can use bytes (16 EB, or exabytes) of RAM. So a computer with a 64-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers; it also has better overall performance than a 32-bit system. However, to take advantage of this higher performance, you must also have a 64-bit OS.
backdoor
A __ (also called a trapdoor) is a programming routine built into the system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Virus
A __ consists of self-propagating program code that's triggered by a specific time or event.
Trojan program
A __ contains code intended to disrupt a computer network, or website and is usually hidden inside a popular program.
Denial-of-Service attack (DOS)
A __ floods a network or server with service requests to prevent legitimate users' access to the system.
firewall
A __ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the internet.
blended threat
A __ is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
logic bomb
A __ is a type of Trojan program used to release a virus, worm, or other destructive code. __ are triggered at a certain time or by an event, such as a user pressing enter or running a specific program.
callback
A __ modem is used to verify whether a user's access is valid by logging the user off and then calling the user back at a predetermined number.
Virtual Private Network (VPN)
A __ provides a secure "tunnel" through the internet for transmitting messages and data via a private network.
Worm
A __ travels from computer to computer in a network. __ are independent programs that can spread themselves without having to be attached to a host program.
Relational Model
A __, is uses a two dimensional table of rows and columns of data. Rows are records(also called tuples) and columns are fields(also called attributes).
Data model
A ___ determines how data is created, represented, organized and maintained. It usually contains data structure, operations, and integrity rules.
Firewall
A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all the other data transmissions are blocked. This is a nonbiometric security measure.
Password
A combination of numbers, characters, and symbols that is entered to allow access to a system.
Define a computer system, and describe its components.
A computer is a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information. The instructions, also called a "program," are step-by-step directions for performing a specific task, written in a language the computer can understand. A computer system consists of hardware and software. Hardware components are physical devices, such as keyboards, monitors, and processing units. The software component consists of programs written in computer languages.
Terminal resource security
A software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Computer programmer
A computer writes computer programs or software pieces that allow the information system to perform a specific task.
Database Administrator
A database administrator (DBA) is responsible for database design and implementation. Additionally, a database administrator should have knowledge and understanding of data warehouses and data-mining tools.
Adware
A form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser.
Cache RAM
A special type of RAM, resides in the processor. Because memory access from main RAM storage generally takes several clock cycles, ___ stores recently accessed memory so that the processor isn't waiting for the memory transfer.
Define management information systems.
A management information system (MIS) is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes. In designing an MIS, the first task is to define the system's objectives clearly. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.
Hard Copy
A printer
Backdoor
A programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Blended threat
A security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
Logic bomb
A type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by a specific event, such as a user pressing the enter key or running a certain program.
Future progress in _____ includes further development in natural language processing that should make information systems easier to use.
AI
Bandwidth
AMOUNT of data that can be transferred from one point to another in a certain time period.
In the context of the important concepts regarding Web and network privacy, ____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
Accountability
Bus
Affects computer performance. The link between devices connected to the computer. A bus can be parallel or serial, internal (local) or external
The ____ approach to setting up a distributed DBMS combines fragmentation and replication.
Allocation
____ is a pure-play company
Amazon.com
Output device
An ___ is capable of representing information from a computer. The form of this output must be visual, audio, or digital and examples are printers, display monitors, and plotters.
_____ prevents new adware from being installed on your computer.
Anti-spyware
_____ prevents new adware from being installed on your computer.
Antispyware
Node
Any device connected to a computer network; these can be computers, personal digital assistants (PDAs), cell phones, or various other network appliances. On an IP network, this is any device with an IP address.
The ____ layer of the OSI model serves as the window through which applications access network services.
Application
Access Controls
Are designed to protect systems from unauthorized access in order to preserve data integrity. Two widely used access controls are: terminal resource security and passwords.
Typically, an organization leases the media used for a VPN on a(n) ____ basis.
As-Needed
____ encryption uses a public key known to everyone and a private key known only to the recipient
Asymmetric
Denial-of-service (DoS)
Attack floods a network or server with the requests to prevent legitimate users' access to the system.
Spoofing
Attempt to gain access to a network by posing as an authorized user to find sensitive information.
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Business Continuity Planning.
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Business continuity planning
Buyer power
Buyer power is high when customers have many choices and low when they have few choices. Typically, organizations try to limit buyers' choices by offering services that make it difficult for customers to switch, which is essentially using a differentiation strategy
a ___ is the size of a character
Byte
A _____ is 1/1,000,000,000 of a second. a. picosecond b. millisecond c. nanosecond d. microsecond
C
A _____ is also referred to as the source code. a. log file b. kernel c. program d. cookie
C
Beginning in the 1940s, first-generation computers: a. were easy to program. b. operated on integrated circuits. c. were bulky and unreliable. d. generated little heat.
C
FileMaker Pro is an example of _____ that is used in an information system. a. external data b. internal data c. a database management system d. a Remember base management system
C
In an organization, a _____ allocates human and financial resources. a. logistics information system (LIS) b. manufacturing information system (MFIS) c. personnel information system (PIS) d. financial information system (FIS)
C
The hardware components of a management information system (MIS) include: a. software developed in-house. b. commercial programs. c. memory devices. d. operating systems.
C
Which of the following statements is true of information systems and information technologies? a. Information systems and information technologies and are independent of each other. b. Information technologies are broader in scope than information systems. c. Information systems and information technologies are used to help organizations be more competitive. d. Information systems face security and privacy issues, while information technologies do not face such issues.
C
_____ is nonvolatile memory that can be electronically erased and reprogrammed. a. Random access memory (RAM) b. Main memory c. Flash memory d. Read-only memory
C
_____ is one of the forces in Porter's Five Forces model. a. Government regulations b. Rivalry among customers c. Supplier power d. Consumer groups
C
_____, a factor distinguishing the computing power of computers, means accessing data from computer memory. a. Storage b. Encapsulation c. Retrieval d. Replication
C
Information Technologies
Can be misused to invade user's privacy and to commit computer crimes. These technologies consist of: Spyware, Adware, Phishing, Pharming, Keystroke loggers, Sniffing, Spoofing.
Data encryption transforms data into a scrambled form called ____.
Cipher Text
Explain how computers are classified.
Computers are classified based on cost, amount of memory, speed, and sophistication. Computers can be classified as: subnotebook; notebook; personal computer; minicomputer; mainframes; or supercomputer.
Summarize computer operations.
Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are carried out by one or a combination of these operations. Computers can add, subtract, multiply, divide, and raise numbers to a power. They also perform comparison operations. Computers can store massive amounts of data in very small spaces and locate a particular item quickly.
Accuracy
Computers do NOT make mistakes
The Power of Computers
Computers draw their power from three factors that far exceed human capacities: speed, accuracy, and storage and retrieval capabilities.
Explain the factors distinguishing the computing power of computers.
Computers draw their power from three factors that far exceed human capacities: speed, accuracy, and storage and retrieval capabilities. Every character, number, or symbol on the keyboard is represented as a binary number in computer memory. A binary system consists of 0s and 1s, with a 1 representing "on" and a 0 representing "off," similar to a light switch. Computers and communication systems use data codes to represent and transfer data between computers and network systems. Three data codes are: ASCII, Extended ASCII, and Unicode.
C.I.A. triangle
Confidentially- means that a system must prevent disclosing information to anyone who is not authorized to access it. Integrity- refers to the accuracy of information resources within an organization. Availability- means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.
Star Topology
Consists of a central computer and a series of nodes.
Virus
Consists of self-propagating programs code that is triggered by a specific time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continuous.
Amazon.com uses ____ to provide customized book recommendations based on past purchases.
Cookies
Which of the following is a commonly used technology for data collection?
Cookies
Generally, ____ laws protect tangible material, such as books and drawings.
Copyright
Grouping objects along with their attributes and methods into a class is called ____.
Encapsilation
External examples
Customers, competitors, and suppliers Government agencies and financial institutions Labor and population statistics Economic conditions
____ is registering, selling, or using a domain name to profit from someone else's trademark.
Cybersquating
_________ is registering, selling, using a domain name to profit from someone else's trademark.
Cybersquatting
Bradley is highly skilled in using Microsoft PowerPoint for creating office presentations. Bradley is likely to exhibit _____. a. data literacy b. network literacy c. information literacy d. computer literacy
D
To enable decision makers to make the right decisions in a timely manner, information must be _____. a. abstract b. tampered c. ambiguous d. consistent
D
Which of the following is one of the three basic tasks performed by computers? a. Lateral thinking b. Groupthink c. Brainstorming d. Logical operations
D
Which of the following statement is true of fourth-generation languages (4GLs)? a. C++ and Java are two most widely used 4GLs. b. Users need to follow a rigorous command syntax to use 4GLs. c. In 4GLs, code written for one type of computer does not work on another type of computer. d. 4GLs use macro codes that can take the place of several lines of programming.
D
_____ is where computers store data and instructions, similar to a human brain. a. Secondary memory b. Control unit c. Disk drive d. Main memory
D
Generating complex queries and reports is faster and easier with ________ than with ________.
Data Warehouse; Databases
Within the context of the various categories of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools.
DB Admin
Microsoft Access is an example of _____ in an information system.
DBMS
A ____ attack typically targets Internet servers.
DDOS
A(n) _________ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
Data Dictionary
___ is a function performed by control programs that controls data integrity by generating checksums to verify that data has not been corrupted or changed
Data Management
The ________ component of a DBMS is used to add, delete, modify and retrieve records from a database.
Data Manipulation
A data ____ is usually a smaller version of a data warehouse, used by a single department or function.
Data Mart
________ are usually more limited in scope than data warehouses.
Data Marts
________ is used to discover patterns and relationships in data.
Data Mining
Business analytics uses ____ to support decision-making activities.
Data Mining Tools
A ________ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
Data Warehouse
Data vs information
Data consists of raw facts and by itself is difficult to use for making decisions. For example, XYZ Company's total sales last month were $5,000,000. This number is data, because it does not tell you how the company performed. Did it meet the sales goal? Did sales increase or decrease from the previous month? How did the company perform against its top competitors? These questions and more can be answered by the information that an information system provides.
Bits
Data is stored in bits. its a single value of 1 or 0
Data mining agents work with _____ , detecting trends and discovering new information and relationships among data items that were not readily apparent.
Data warehouses
within the context of the various categories of IT jobs, a ____ must have knowledge and understanding of data warehouse and data-mining tools
Database Administrator
The _____ component is responsible for data storage, manipulation, and retrieval.
Database Engine
Accuracy of information resources within an organization is called?
Database Integrity
Involves how information appears to users and how it can be organized and retrieved.
Database Logical View
Involves how data is stored on and retrieved from storage and media, such as hard disks, magnetic tapes, or CD's.
Database Physical View
The data ____ component is used to create and maintain the data dictionary.
Definition
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system
Denial of Service
A ____ attack typically targets Internet servers.
Denial of Service
Webmaster
Designs and maintains the organization's Web site.
Job ____ occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position.
Deskilling
Explain the Five Forces Model and strategies for gaining a competitive advantage
Developed by Michael Porter, the Five Forces model is a comprehensive framework for analyzing an organization, distinguishing its position in the marketplace, and identifying information systems that could be used to make the organization more competitive. The five forces are: Buyer power Supplier power Threat of substitute products or services Threat of new entrants Rivalry among existing competitors
Router
Device containing software that connects network systems and controls traffic flow; chooses the best path; prevents network jams.
Synthetic compound
Devices made with this synthetic compound can emit light, withstand higher temperatures, and survive much higher doses of radiation than silicon devices.
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
Dictionary
Some believe that information technology has created a ________ between the "haves" and the "havenots."
Digital Divide
information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.
Digital Divide
____ is a site that facilitates C2C e-commerce
Ebay
Which of the following is a physical security measure?
Electronic Trackers
Which of the following is a physical security measure?
Electronic trackers
Binary number
Every character, number, or symbol on the keyboard is represented as a binary number in computer memory.
Mesh Topology
Every node is connected to every other node; aka plex or interconnected; advantage: highly reliable. Disadvantages: expensive and difficult to maintain and expand.
____ users include customers, contractors, suppliers, and other business partners.
External
2 sources of data
External and internal
A NAS offers only storage; a SAN system offers both storage and file services.
F
A byte is a single value of 0 or 1.
F
A computer with a 32-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers than a 64-bit system.
F
A patent protects product names and identifying marks.
F
A petabyte is 2^30 bytes.
F
A redundant array of independent disks (RAID) system is a collection of disk drives used for fault tolerance and improved performance.
F
Which of the following is a nonbiometric security measure?
Fire-Walls
Which of the following is a nonbiometric security measure?
Firewalls
Generations major attributes
First- Machine language Second- Assembly language Third- High-level language Fourth- Fourth-generation language Fifth- Natural language processing (NLP)
In a ________ some data could be stored in more than one file, causing redundancy. Causing Data integrity and Data security issues.
Flat File
_____ is one of the strategies of Michael Porter's three strategies for successfully competing in the marketplace.
Focus
Transaction Processing Systems (TPS)
Focus on data collection and processing and the major reason for using them is cost reduction.
_____ is one of the strategies Michael Porter's three strategies for successfully competing in the marketplace.
Focus or differentiation or overall cost leadership
Computer Emergency Response Team (CERT)
Focuses on security breaches and DoS attacks and offers guidelines on handling and preventing this incidents. This model is widely adopted by companies to respond to emergency security breaches.
Define transaction-processing systems.
For the past 60 years, transaction-processing systems (TPSs) have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control. TPSs focus on data collection and processing, and the major reason for using them is cost reduction.
A(n)_______ is a field in a relational table that matches the primary key column of another table. It can be used to cross reference tables.
Foreign Key
which of the following computer languages is the easiest to use
Fourth Generation
5 forces model
Harvard Business School's Michael Porter created a comprehensive framework called the Five Forces Model for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive
Java and C++ are ___ languages
High
Random Access-file Structure
In ___, records can be accessed in any order, regardless of their physical location in storage media. This method of access is fast and very effective when a small number of records need to be processed daily or weekly.
Keystroke loggers
Monitor and record keystrokes and can be software or hardware devices.
Major components of an information system
In addition to hardware, software, and human elements, an information system includes four major components, which are discussed in the following sections: data, a database, a process, and information
ASCII
In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of 0s or 1s). Up to 128 characters can be defined.
Explain the differences between computer literacy and information literacy.
In the 21st century, knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy. Computer literacy is having skills in using productivity software, such as word processing, spreadsheet, database management systems, and presentation software, and having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. Information literacy, on the other hand, is understanding the role of information in generating and using business intelligence.
Social Engineering
In the context of security, __ means using "people skills" as such being a good listener and assuming a friendly, nonthreatening air-to trick others into revealing private information.
Review the IT job market.
In the last decade the IT job market has been one of the fastest growing. Broadly speaking, IT jobs fall into the following categories: operations and help desk, programming, systems design, Web design and Web hosting, network design and maintenance, database design and maintenance, and robotics and artificial intelligence.
Threats
Includes sharing passwords with coworkers, leaving a computer unattended while logged on to the network, or even spilling coffee on a keyboard.
The output of an information system is _____.
Information
the output of an information system is
Information
Explain the importance and applications of information systems in functional areas of a business.
Information is the second most important resource (after the human element) in any organization. Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money. To manage these resources, different types of information systems have been developed. Although all have the major components (data, database, process, and information), they vary in the kind of data they collect and the analyses they perform. Major functional information systems include HRIS, LIS, MFIS, FIS, and MKIS.
____ is understanding the role of information in generating and using business intelligence.
Information literacy
Difference between information systems and information technologies
Information systems are broader in scope than information technologies, but the two overlap in many areas
information technologies
Information technologies offer many advantages for improving decision making but involve some challenges, too, such as security and privacy issues
Discuss the types of input, output, and memory devices.
Input devices send data and information to the computer. Examples include keyboards, a mouse, touch screens, light pens, a trackball, data tablet, bar code reader, optical character readers, magnetic ink character recognition, and optical mark recognition. Output devices are available for both mainframe and personal computers. Output devices are either soft copy (plasma display, LCD) or hard copy (printers). Memory is considered either main or secondary.
Convergence
Integrating voice, video, and data so that multimedia information can be used for decision making.
____ refers to the accuracy of information resources within an organization.
Integrity
Information technologies have led to "job deskilling."
T
____ users are employees who will use the system regularly, and they can offer important feedback on the system's strengths and weaknesses.
Internal
internal
Internal data includes sales records, personnel records, and so forth
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
Intrusion Detection System (I.D.S.)
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
Intrusion detection systems
Database Administrator
Is responsible for database design and implementation. Additionally, they should have knowledge and understanding of data warehouses and data mining tools.
Phishing
Is sending fraudulent emails that seem to come from legitimate sources, such as bank or university.
_____ are an external data source of an information system.
Labor statistics
ROM is different from RAM in that
It is nonvolatile
The supervisor program of an OS is called the_____
Kernel
Input device examples
Keyboard Mouse Touchscreen Light pen Track Ball Data tablet Barcode Reader
Three types of networks:
LAN - local area network WAN - Wide area network MAN - Metropolitan area network
___ are an external data source of information system
Labor Statistics
Managers could use a _____ to assess the effect on final product costs of a nine percent increase in raw materials.
MIS
Side note
MISs are often referred to as just information systems, and these terms are used interchangeably in this book.)
Magnetic tape
Made is plastic. Resembles a cassette tape and stores data sequentially. Records can be stored in a block or separately, with a gap between each record or block, called the interrecord gap (IRG). Magnetic tape is sometimes used for storing backups, although other media are more common now.
Magnetic Disk
Made of Metal and is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface. Magnetic disks are much faster but more expensive than tape devices.
semiconductor memory chip
Made of silicon and is the most common type of main memory
Distributed Processing
Maintains centralized control and decentralized operations; advantage: RELIABILITY is improved; disadvantages: ability to manage security, privacy and networking is difficult.
Discuss the history of computer hardware and software.
Major developments in hardware have taken place over the past 60 years. To understand these developments better, computers are often categorized into "generations" to mark technological breakthroughs.
____ introduced the value chain concept
Michael Porter
In a(n) _____ data model, each record can have multiple parent and child records.
Network
In the context of the important concepts regarding Web and network privacy, _____ is a method for binding all the parties to a contract.
Nonrepudiation
Read Only Memory (ROM)
Nonvolatile memory, so data can't be written to ROM
Read Only Memory (ROM)
Nonvolatile memory. Data cannot be written to ROM. The type of data usually stored in ROM includes BIOS information and the computer system's clock.
____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
Normalization
A(n)_________ uses both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object's data.
Object Oriented Model
an example of ____ is UNIX
Operating System
Describes, methods, calculations, and so forth that can be performed on data, such as updating and querying data.
Operations
Discuss common applications of computers and information systems.
Organizations use computers and information systems to reduce costs and gain a competitive advantage in the marketplace. As a knowledge worker of the future, computers and information technology will help you be more effective and productive, no matter what profession you choose.
Business continuity planning
Outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Soft Copy
Output displayed on a screen
Which of the following is a type of access control?
Passwords
_____ protects new processes
Patents
Scheduling and assigning employees might be handled by a _____.
Personnel Management System
___ are an example of internal source of data for an information system
Personnel Records
_____ are an example of internal source of data for an information system.
Personnel Records
Physical security measures
Primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
A(n)________ uniquely identifies every record in a relational database such as a student I.D. number
Primary Key
the clipboards contents are stored on
RAM
In a(n) ________ model, select operation searches data in a table and retrieves records based on certain criteria
Relational Data
A(n)_________ Uses a 2D table of rows and columns of data, Rows are records (tuples) and columns are fields (attributes).
Relational Model
Side note
Remember that focus and differentiation strategies work only up to a certain point. Customers are often willing to pay more for a unique product or service or one with a specific focus. However, cost still plays a major role. If a product or service becomes too expensive, customers might not be willing to purchase it.
Which of the following protocols is used to send e-mails?
SMTP
Which of the following is a source of internal data?
Sales records
A ____ is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.
Script Kiddie
transistor was the major technology used during the ____ generation of hardware
Second
___ memory, which is nonvolatile, holds data when the computer is off or during the course of a program's operation
Secondary
A commonly used encryption protocol is ________, which manages transmission security on the Internet.
Secure Sockets Layer
____ is a commonly used encryption protocol that manages transmission security on the Internet.
Secure Sockets Layer (S.S.L.)
A ____ operation searches data in a table and retrieves records based on certain criteria.
Select
A________ Retrieve zero or more rows from one or more databases tables to database views.
Select Statement
Which of the following is a biometric security measure?
Signature Analysis
Pharming
Similar to phishing, Pharming is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as social security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site address, then alter its IP address so that the user who enter the correct Web address are directed to the pharmers's fraudulent Web site.
____ is the process of capturing and recording network traffic.
Sniffing
Which of the following is considered an intentional threat?
Social Engineering
____ take advantage of the human element of security systems.
Social Engineering Attacks
Describe the two major types of software.
Software is all of the programs that run a computer system. The two types of software include: system software and application software. System software is run by operating systems (OS). Examples of OS include Microsoft Windows, Mac OS, and Linux. Application software is used to perform a variety of tasks on a personal computer, including word processing, spreadsheet, database, presentation, graphics, etc. Examples of application software suites include Microsoft Office, OpenOffice, and Corel.
Spyware
Software that secretly gathers information about users while they browse the Web.
Green computation helps an organization save on energy costs.
T
A Web page displayed when the user first visits the site is called _____.
Splash Screen
Having a clear, specific policy can help prevent legal actions users might take against an organization, as in cases of termination.
T
If a drive in the RAID system fails, data stored on it can be reconstructed from data stored on the remaining drives.
T
In an MIS application, processes are usually methods for performing a task.
T
In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods.
T
In designing an MIS, the first task is to clearly define the system's objectives.
T
___ means saving data in computer memory and retrieval is accessing data from memory
Storage
____ gives users subtotals of various categories.
Summary Data
In accordance with Porter's Five Forces model, ____ power is high when customers have fewer options and low when customer have more options
Supplier
supplier power
Supplier power is high when customers have fewer options and low when customers have more options. Organizations might use information systems to make their products and services cheaper or to offer more services in order to distinguish themselves from competitors (another use of a differentiation strategy).
In the context of an information systems job, a chief technology officer oversees long-range planning and keeps an eye on new developments in the field that can affect a company's success.
T
Information in databases can now be cross-matched to create profiles of people and predict their behavior, based on their transactions with educational,financial, and governmental institutions.
T
Information technologies have a direct effect on the nature of jobs.
T
In ____ encryption, the same key is used to encrypt and decrypt the message.
Symmetric
In ________ (also called "secret key encryption"), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.
Symmetric Encryption
2 types of software
System software application software
A SAN is a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices.
T
A bus can be internal or external.
T
A database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS.
T
A database management system (DBMS) is used to create, organize, and manage databases.
T
A disadvantage of trackball is that positioning is sometimes less precise than with a mouse.
T
A magnetic disk is a type of secondary memory device.
T
A magnetic tape stores data sequentially.
T
A person making two copies of a software package he just bought and selling one of the copies to his friend is considered to be illegal as well as unethical.
T
A personnel information system helps in choosing the best job candidate.
T
A serial port is a communication interface through which information is transferred one bit at a time.
T
A uniform resource locator is the address of a document or site on the Internet.
T
A worm travels from computer to computer in a network, but it does not usually erase data.
T
An Extended ASCII data code allows representation of 1024 characters.
T
An e-commerce site that needs frequent updates would benefit from the use of a static Web site.
T
An intrusion detection system can protect against both external and internal access.
T
Business Intelligence (BI) includes historical views and predictive views of business operations.
T
Business intelligence uses scorecards and query reports to support decision-making activities, whereas business analytics uses data mining tools and predictive modeling.
T
C++ and Java are examples of high-level language.
T
Computers and communication systems use data codes to represent and transfer data between computers and network systems.
T
Computers are most beneficial in transaction-processing operations.
T
Confidentiality, integrity, and availability are collectively referred to as the CIA triangle.
T
Directories are indexes of information based on keywords embedded in documents, which makes it possible for search engines to find what you are looking for.
T
ENIAC is an example of a first-generation computer.
T
Flash memory is used in memory cards.
T
Flat file organization tends to take up unnecessary storage space.
T
____ is a supporting activity in the value chain
Technological Development
In a bus topology, ____ are used at each end of the cable to absorb the signal.
Terminators
replication
The __ approach to distributed DBMS has each site store a copy of data of the organizations database.
Process
The ___ component of an information system generates the most useful type of information for decision making, including transaction-processing reports, and models for decision analysis.
Discuss the differences between data and information.
The data component of an information system is considered the input to the system. An information system should collect data from external and internal sources.
Data
The data component of an information system is considered the input to the system. The information that users need affects the type of data that is collected and used. Has a time orientation
Financial information system (FIS)
The goal of a financial information system (FIS) is to provide information to financial executives in a timely manner.
Central Processing Unit (CPU)
The heart of the computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit.
American Standard Code for Information Interchange (ASCII)
The most common data code for text files, PC applications, and the Internet
Routing
The process of deciding which path the data takes on a network
Process
The purpose of an information system's process component is generating the most useful type of information for making decisions. This component generally includes transaction-processing reports and models for decision analysis that can be built into the system or accessed from external sources.
threat of substitutes
The threat of customers choosing substitute products or services is high when many alternatives to an organization's products and services are available
CTO/CIO
The top job in the informations systems field. This person is responsible for long-range information systems planning and for keeping abreast of new developments in the field that can affect a company's productivity or competitiveness.
Computer fraud
The unauthorized use of computer data for personal gain.
List the generations of computer languages.
There are four generations of computer language with a fifth generation in development. First: Machine Language Second: Assembly Language Third: High-level Language Fourth: Fourth-Generation Language Fifth: Natural Language Processing
___ computer languages are machine independent and are called high-level languages
Third Generation
Chief privacy officer (CPO)
This executive position includes responsibility for managing the risks and business impacts of privacy laws and policies.
Manager of Information Systems Services
This person is responsible for managing all the hardware, software, and personnel within the information systems department.
Systems Analyst
This person is responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position also requires a thorough understanding of business systems and functional areas within a business organization.
Systems Analyst
This person is responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position requires a thorough understanding of business systems and functional areas within a business organization.
Network Administrator
This person oversees a company's internal and external network systems, designing and implementing network systems that deliver correct information to the right decision maker in a timely manner. Providing network and cybersecurity is part of this position's responsibility.
Network Administrator
This person oversees a company's internal and external network systems, designing and implementing network systems that deliver correct information to the right decision-maker in a timely manner. Providing network and cyber security is part of this person's responsibility.
qualities for information to be useful:
Timeliness Integration with other data and information Consistency and accuracy Relevance
Discuss how information technologies are used to gain a competitive advantage
Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money. Three strategies for competing in the marketplace successfully include: Overall cost leadership Differentiation Focus Information systems can help organizations reduce the cost of products and services and assist with differentiation and focus strategies. Information systems can help bottom-and top-line strategies.
Database Management System (DBMS)
To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use. In a large organization, a DBMS such as Oracle or IBM DB2 might be used.
information technology has eliminated more jobs than it has created
false
______ protects products names and identifying marks such as nikes "swoosh" sign.
Trademark
Data encryption
Transforms data, called plaintext or cleartext, into a scrambled form ciphertext that cannot be read by others.
____ ensures data security and integrity over public networks, such as the Internet.
Transport Layer Security (T.L.S.)
Worm
Travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that cab=n spread themselves without having to be attached to a host program.
A hierarchical topology is also called a ____ topology.
Tree
A logic bomb is a type of ____.
Trojan
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
True
Although a database can consist of only a single file, it is usually a group of files.
True
Data encryption transforms data into a scrambled form called ciphertext.
True
Data transmission channels are generally divided into two types: broadband and narrowband.
True
Computer Speed
Typically, computer speed is measured as the number of instructions performed during the following fractions of a second: Millisecond: 1/1,000 of a second Microsecond: 1/1,000,000 of a second Nanosecond: 1/1,000,000,000 of a second Picosecond: 1/1,000,000,000,000 of a second
Word-Processing Software
Typically, this includes editing features, such as deleting, inserting, and copying text. More sophisticated graphics and data management features are in advanced softwares.
A(n) ____ is the address of a document or site on the Internet.
URL
Clerical workers using computers for word-processing tasks is an example of job _____.
Upgrading
Cloud Storage
Used for online storage and backup, it involves multiple virtual servers that are usually hosted by third parties. Examples include JustCloud, ZipCloud, MyPCBackup, and Dropbox.
Narrowband
VOICE GRADE TRANSMISSION channel capable of transmitting a maximum of 56,000 bps, so only a LIMITED AMOUNT OF INFORMATION can be transferred.
A ________ provides a secure "tunnel" through the Internet for transmitting messages and data via a private network.
Virtual Private Network
Callback modem
Verifies whether a user's access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number. This is a nonbiometric security measure.
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.
White Hat Hackers
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
Wiki
Query by Example (QBE)
With ___, you request data from a database by constructing a statement made up from query forms. With current graphical databases you simply click select query forms, instead of having to remember keys, as you do with SQL. You can add AND, OR, or NOT operators to __ to fine tune the query.
Indexed Sequential Access Method
With the __, records can be accessed sequentially or randomly, depending on the number being accessed. For small numbers, random access is used, and for a large number, sequential accessed is used.
A ____ travels from computer to computer in a network, but it does not usually erase data.
Worm
Redundant Array of Independent Disks (RAID)
a collection of disk drives used for fault tolerance and improved performance, and is typically found in large network systems. Data can be stored in multiple places to improve the system's reliability. In other words, if one disk in the array fails, data is not lost. In some RAID configurations, sequences of data can be read from multiple disks simultaneously, which improves performance.
firewall
a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked
Serial Port
a communication interface through which information is transferred one bit at a time
Server
a computer and all the software for managing network resources and offering services to a network.
Computer characteristic
a computer only processes data (raw facts); it cannot change or correct the data that is entered
Storage Area Network (SAN)
a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices. A SAN network makes storage devices available to all servers on a local area network (LAN) or wide area network (WAN).
Computer
a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information.
intranet
a network within an organization that uses Internet protocols and technologies for collecting, storing, and disseminating useful information that supports business activities such as sales, customer service, human resources, and marketing. The main difference between an intranet and the Internet is that intranets are private and the Internet is public
Network-Attached Storage (NAS)
a network-connected computer dedicated to providing file-based data storage services to other network devices.
Network Attached Storage (NAS)
a network-connected computer dedicated to providing file-based data storage services to other network devices. Software on the NAS handles features such as data storage, file access, and file and storage management.
Disk Drive
a peripheral device for recording, storing, and retrieving information
Michael Porter
a professor at Harvard Business School, identified three strategies for successfully competing in the marketplace
Binary code
a set of instructions used to control the computer—uses 0s and 1s, which the computer understands as on or off signals
Programmable read-only memory (prom)
a type of ROM chip that can be programmed with a special device. However, after it has been programmed, the contents cannot be erased
Retrieval
accessing data from memory.
software
all the programs that run a computer system
instructions
also called a program, are step-by-step directions for performing a specific task, written in a language the computer can understand
5th generation languages
also called natural processing (NLP) are ideal computer languages for people with minimal computer training. These languages designed to facilitate natural conversations. between you and your computer
Database Characteristics
also important for reducing personnel time needed to gather, process, and interpret data manually. With a computerized database and a DBMS, data can be treated as a common resource that is easy to access and use.
CPU case
also known as a computer chassis or tower. It is the enclosure containing the computers main component.
Supervisor program
also known as the kernel, is responsible for controlling all other programs in the OS, such as compilers, interpreters, assemblers, and utilities for performing special tasks.
Extended ASCII
an 8-bit code that also allows representation of 256 characters.
Acceptable use policy
an __, is a set of rules specifying legal and ethical system use and activity and the consequences of noncompliance.
Parallel Port
an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
____ is also called a corporate portal.
an intranet
An operating system is....
an operating system is a set of programs for controlling and managing computer hardware and software
Management Information System (MIS)
an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.
Five Forces Model
analyzes an organization its position in the market place, and how in the market place and how information systems could be used to make it more competitive. Then the five forces include buying power, supplier power, threat of substitute powers or services, threat of new entrants and rivalry among existing competitors.
fragmentation
approach to a distributed DBMS addresses how table are divided among multiple locations. There are three variations; horizontal, vertical and mixed.
Allocation
approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often.
Mail Servers
are configured for sending, receiving, and storing e-mails.
access controls
are designed to protect systems from unauthorized access in order to preserve data integrity
Access Controls
are designed to protect systems from unauthorized access to preserve data integrity.
high level languages
are machines independent and part of the third-generation computer language. Many options are available and each is designed for a specific purpose.
Virtual organizations
are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
Cookies
are small text files with a unique ID tag which is embedded in a web browser and are saved on the user's hard drive.
n-tier architecture
attempts to balance the workload between client and server by removing application processing from both client and server and placing it on a middle - tier sever. most common ---- is the three tired architecture - presentation logic always on client -management logic on the server
Output Devices
available for both mainframes and personal computers. output devices include hard copy and soft copy
for each database, there can be more than one physical view of data
false
Level 2 security involves ____.
back-end systems
Application software
can be commerical software or software developed in house and is used to perform a variety of tasks on a personal computer.
dynamic router
can build tables that identify addresses on each network
software components of MIS
can include commercial programs, software developed in-house, or both
intrusion detection system (IDS)
can protect against both external and internal access. It's usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources
An Intrusion detection system (IDS)
can protect both external and internal access. They're usually in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator and cause routers to terminate connections with suspicious sources.
External Bus
capable of communicating with external components, such as a USB device.
Unicode
capable of representing 256 characters
Sniffing
capturing and recording network traffic.
Internal data
collected within organizations
hierarchical topology (tree)
combines computers with different processing strengths in different organizational levels. -company's that are geographically disbursed and organized hierarchically are good candidates. -traditional mainframe networks use this
Join operation
combines two tables based on a common field.
Data Manipulation
component is used to add, delete, modify, and retrieve records from a database.
Application Generation
component is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages.
bus topology (linear bus)
connects to nodules along a network segment, ends of cables are not connected as in ring topology. -device called terminator used at the end of each cable to absorb signal. < without this no network communication -nodule failure has no effect on other nodule -uses least amount of cable of all topology
Binary System
consists of 0s and 1s, with a 1 representing "on" and a 0 representing "off," similar to a light switch.
Machine language
consists of a series of 0s and 1s representing data or instructions and was part of the first generation of computer languages. It depends on the machine, so a code written for one type of computer does not work on another type of computer.
Information
consists of facts that have been analyzed by the process component and is an output of an information system
Software
consists of programs written in computer languages.
Data
consists of raw facts and is a component of an information system.
virus
consists of self-propagating program code that's triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues
Disk Servers
contain large-capacity hard drives and enable users to store files and applications for later retrieval.
File Servers
contain large-capacity hard drives for storing and retrieving data files
Fax Servers
contain software and hardware components that enable users to send and receive faxes.
Trojan program
contains code intended to disrupt a computer, network, of Web site, and it is usually hidden inside a popular program. users run the popular program, unaware that the malicious program is also running in the background
Trojan Program
contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the popular program, unaware that the malicious program is also running in the background.
Fourth Generation Computers
continued several trends that further improved speed and ease of use: miniaturization, very-large-scale integration (VLSI) circuits, widespread use of personal computers, and optical discs (discs written or encoded and read using a laser optical device)
Level 3 security involves ____.
corporate networks
A successful _____ program helps improve client service and create a long-term relationship between an organization and its clients.
customer relationship management
in a relational model, the rows are called attributes and the columns are called tuples
false
in well-designed data-driven Web sites, changes are made to the HTML code
false
Extraction, Transformation, and Loading (ETL)
describes the processes used in data warehouses. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target.
information systems
designed to collect data, process the collected data, and deliver timely, relevant, and useful information that can be used for making decisions
personnel information system (PIS) or human resource information system (HRIS)
designed to provide information that helps decision makers in personnel carry out their tasks more effectively
Project Management Software
designing a web site or setting up an order entry system, consists of a set of related task.
Webmaster
designs and maintains the organization's Web site. Because of the popularity of e-commerce applications, webmasters have been in high demand.
Internal bus
enables communication between internal components, such as a video card and memory;
A database ____ is responsible for data storage, manipulation, and retrieval.
engine
information technologies have decreasedthe ease of access to information for hackers as well as for legitimate organizations
false
fault-tolerant systems
ensure availability in the event of a system failure by using a combination of hardware and software
Fault-tolerant systems
ensure availability in the event of a system failure by using a combination of hardware and software.
Fault-tolerant systems
ensures availability in case of a system failure by using a combination of hardware and software.
Availability
ensures that computers and networks are operating, and authorized users can access the information they need.
Integrity
ensures the accuracy of information resources in an organization.
Dual core processer
essentially two processors in one, to improve processing power. Dual-core processors are common in new PCs and Apple computers
mesh topology (plex or interconnected)
every node (which can differ in size and configuration from the others) is connected to every other node one node failure, does not cause large problems, costly and difficult to maintain and expand.
The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
extranet
In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
extrction
a credit card company selling its customers' mailing addresses to its competitors is considered to be ethical
false
a patent protects names and identifying marks
false
a select operation pares down a table by eliminating columns according to certain criteria
false
a virtual organization needs central offices and organizational hierarchy for participants to contribute their expertise
false
an e-commerce site that needs frequent updates would benefit from the use of a static Web site
false
any changes to a database's structure, such as adding a field, changing a field's size, or changing the data type stored in a field, are made with the data manipulation component
false
as compared to data warehouses, consolidating information from different departments or functional areas is easier in data marts
false
cookies cannot provide information about the user's location and computer equipment
false
copyright laws do not cover online material
false
data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions
false
data redundancy is eliminated or minimized in a flat file system
false
disks are sequential access devices, whereas tapes are random access devices
false
1940's
first-generation computers used vacuum tube technology. They were bulky and unreliable, generated excessive heat, and were difficult to program
denial-of-service (DoS) attack
floods a network or server with service requests to prevent legitimate users' access to the system
In a relational model, when a primary key for one table appears in another table it is called a ____ key.
foreign
Database Administrators (DBA)
found in larger organizations, design and set up databases, establish security measures, develop recovery procedures, evaluate database performance and add and fine-tune database functions
Level 1 security involves ____.
front-end servers
routing table
generated automatically by software, is used to determine the best possible route for a packet
Online Analytical Processing (OLAP)
generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product and location.
The focus of a top-line strategy
generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers. For example, e-commerce businesses are adapting business models to reduce distribution costs dramatically. A good example is antivirus vendors using the Internet to distribute software. For a subscription fee of around $30, you can download the software and receive updates for a year. Without the Internet for easy, inexpensive distribution, vendors could not afford to offer software at such a low price.
byte
group of eight bits, which operates as a single unit.
Table
group of related records
Encapsulation
grouping objects along with their attributes and methods into a class is called __, which essentially means grouping similar items into a single unit. It helps more complex types of data such as images and groups.
the IT job market
has been one of the fastest growing segments in the economy, and it continues to be so.
Transaction Processing systems (TPS)
have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. Payroll, for example, was one of the first applications to be automated. TPSs focus on data collection and processing, and they have provided enormous reductions in costs. Computers are most beneficial in transaction-processing operations.
Motherboard
he main circuit board containing connectors for attaching additional boards. In addition, it usually contains the CPU, Basic Input/Output System (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard
Information Technologies benefits
help bottom-line and top-line strategies
benefits of information systems
help organizations reduce the cost of products and services and, if designed correctly, they can assist with differentiation and focus strategies
Traditional mainframe networks use a ____ topology.
hierarchical
Rivalry among existing competitors
high when many competitors occupy the same marketplace position; it is low when there are few competitors
You make two copies of a software package you just bought for personal use, incase the original software fails and you need a backup. This action is ____.
illegal but ethical
Normalization
improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
The focus of a bottom-line strategy
improving efficiency by reducing overall costs
convergence
in data communication --- refers to integrating voice, video and data so that multimedia information can be used for decision making.
Fifth Generation Computer (Current Computers)
include parallel processing (computers containing hundreds or thousands of CPUs for rapid data processing), gallium arsenide chips that run at higher speeds and consume less power than silicon chips, and optical technologies.
The field of Optical Technologies
involves the applications and properties of light, including its interactions with lasers, fiber optics, telescopes, and so forth.
Structured Query Language (SQL)
is a __ used by many DBMS packages, such as Oracle 11g and Microsoft __, consists of several keywords specifying actions to take.
Database
is a collection of all relevant data
Packet
is a collection of binary digits - including message data and control characters from formatting and transmitting- sent from computer to computer over a network
Data warehouse
is a collection of data from a variety of sources, used to support decision making applications and generate business intelligence.
Redundant array of independent disk systems (RAID)
is a collection of disk drives used for fault tolerance and improved performance, typically in large network systems.
secure sockets layers (SSL)
is a commonly used encryption protocol that managers transmission security on the Internet
Server
is a computer and is the software for managing network resources and offering services to a network.
Transport Layer Security (TLS)
is a cryptographic protocol that ensures data security and integrity over public networks, such as internet.
transport layer security (TSL)
is a cryptographic protocol that ensures data security and integrity over public networks, such as the internet
Storage area Network (SAN)
is a dedicated high-speed network consisting of both hardware and software used to correct and manage shared storage devices, such as disk arrays, tape libraries and optical storage devices.
Foreign keys
is a field in a relational table that makes the primary key column of another table. It can be used to cross-reference tables.
Adware
is a form of spy-ware that collects information about the user(without the user's consent) to display advertisements in the web browser, based on information it collects from the user's browsing patterns
controller
is a hardware and software device that controls data transfer from a computer to a peripheral device -examples - monitor, printer, keyboard.
multiplexer
is a hardware device that allows several noes to share one communication channel.
Intellectual property
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets and patents for "creations of the mind" developed by people or businesses.
bus
is a link between devices connected to the computer. It can be parallel or serial or internal or external.
Computer
is a machine that accepts data as input, process dad without human intervention by using stored instructions and outputs information.
router
is a network connection device containing software the connect network systems and controls traffic flow between them.
mobile network (cellular network)
is a network operating on a radio frequency(RF), consisting of radio cells, each served by a fixed transmitter, known as the cell site or base station
wireless network
is a network that uses wireless instead of wired technology
disk drive
is a peripheral device for recording, storing and retrieving information.
blended of threat
is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks
Operating Systems (OS)
is a set of programs for controlling and managing computer hardware and software. Provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and performing repetitive tasks for users.
logic bomb
is a type of Trojan program used to release a virus, worm, or other destructive code. they are triggered at a certain time or by a specific event, such as a user pressing Enter or running a certain program.
Spoofing
is an attempt to gain access to a network by posting as an authorized user in order to find sensitive information, such as passwords and credit card information.
transmission control protocol/ internet protocol (TCP/ IP)
is an industry - standard suite of communication protocols that enables interoperabillity standard protocol fr UNIX network communication 2 major protocols- transmission control - operates OSI model network layer. internet protocol- OSI model at the network layer major functions are establishing integrity, sequencing and acknowledging packet delivery, regulating data flow between source and destination nodes.
Management Information Systems (MIS)
is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision making purposes.
Spreadsheet Software
is capable of performing numerous tasks with the information in a spreadsheet.
Security Sockets Layers (SSL)
is commonly used encryption protocol that manages transmission security on the internet.
Green Computing
is computing that promotes a sustainable environment and consumes the least amount of energy.
Database Software
is designed to perform operations such as creating, deleting, modifying, searching, sorting, and joining data.
Graphics Software
is designed to present data in a graphical format, such as line graphs and pie charts.
logistics information system (LIS)
is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
Computer literacy
is having the skills in using productivity software, such as word processing, spreadsheets, database management systems, and presentation software, and having a basic knowledge of hardware and software, the internet and calibration tools and technology.
Financial Planning and Accounting Software
is more powerful than spreadsheet software, is capable of performing many types of analysis on large amounts of data.
Secondary memory
is nonvolatile, serves mostly as archival storage, as for backups.
Cybersquatting
is registering, selling, using a domain name to profit from someone else's trademark.
Phishing
is sending fraudulent emails that seem to come from legitimate sources, such as a bank or university, for the purpose of capturing private information, such as a bank account numbers and Social Security numbers.
throughput
is similar to bandwidth. It is the amount of data transferred or processed in a specified time, usually one second.
Network Model
is similar to hierarchical model, but records are organized differently. Unlike the model, each record in ___ can have multiple parent and child records.
Database Management Systems (DBMS)
is software for creating, storing, maintaining, and accessing database files. A ___ makes using databases more efficient.
Spyware
is software that secretly gathers information about the user while they browse the web.
Central Processing Unit (CPU)
is the heart of the computer. It's divided into two components; the arithmetic logic unit and the control unit.
Motherboard
is the main circuit board containing connections for attaching additional boards. It usually contains the CPU, Basic Input/Output System (BIOS), memory, storage interfaces, serial and parallel parts, expansion slate and all the controllers for standard peripheral devices such as display monitor, disk drive, and keyboard.
routing
is the process of deciding which path to take on a network. This is determined by the type of network and software used to transmit data
Data hierarchy
is the structure and organization of data which involves fields, records, and files.
Information Literacy
is understanding the role of information in generating and using business intelligence
Information literacy
is understanding the role of information in generating and using business intelligence.
Spam
is unsolicited emails sent for advertising purposes.
Computer-Aided Design Software
is used for drafting and design and has replaced traditional tools such as, T-squares, triangles, paper and pencil.
Data Administration
is used for tasks such as back and recovery, security, and change management.
Presentation Software
is used to create and deliver slide shows.
Data-mining analysis
is used to discover patterns and relationships.
Desktop Publishing Software
is used to produce professional-quality documents without expensive hardware and software.
Data mart
is usually a smaller version of a data warehouse, used by a single department or function.
Random Access Memory (RAM)
is volatile memory, in which data can be read from and be written to read-write memory.
A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____.
legal but unethical
The ____ view involves how information appears to users and how it can be organized and retrieved.
logical
Threat of new entrants
low when duplicating a company's product or service is difficult. Organizations often use focus strategies to ensure that this threat remains low
Magnetic disk
made of mylar or metal is used for random access processing. In other words data can be accessed in any orders, regardless of its orders on the surface.
Magnetic tape
made of plastic materials, resembles a cassette tape and stores data sequentially.
2 types of memory for a computer
main memory and secondary memory
Control Programs
manage computer hardware and resources by performing the following functions: Job management—Control and prioritize tasks performed by the CPU. Resource allocation—Manage computer resources, such as storage and memory. In a network, control programs are also used for tasks, such as assigning a print job to a particular printer. Data management—Control data integrity by generating checksums to verify that data has not been corrupted or changed. When the OS writes data to storage, it generates a value (the checksum) along with the data. The next time this data is retrieved, the checksum is recalculated and compared with the original checksum. If they match, the integrity is intact. If they do not, the data has been corrupted somehow. Communication—Control the transfer of data among parts of a computer system, such as communication between the CPU and I/O devices.
A data ____ is usually a smaller version of a data warehouse, used by a single department or function.
mart
Confidentiality
means a system must not allow the disclosure of information to anyone who isn't authorized to access it.
inheritance
means new objects can be created faster and more easily by entering new data in attributes.
confidentiality
means that a system must prevent disclosing information to anyone who isn't authorized to access it
availability
means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster
Social engineering
means using "people skills"--such as being a good listener and assuming a friendly, unthreatening air--to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems. Social engineers often search though dumpsters or trash cans looking for discarded material--such as phone lists and bank statements- that they can use to help break into a network.
social engineering
means using people skills - such as being a good listener and assuming a friendly, unthreatening air- to trick others into revealing private information. Tis attack takes advantage of the human element of security systems.
Keyloggers
monitor and record keystrokes and can be software or hardware devices.
business intelligence (BI)
more than just information. It provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.
Supercomputers
most powerful
Source code
must be translated into object code—consisting of binary 0s and 1s.
ALU
performs arithmetic operations (+, -, ∗, /) as well as comparison or relational operations (<, >, =); the latter are used to compare numbers
Arithmetic Logic Unit (ALU)`
performs arithmetic operations and logical operations such as comparing numbers.
In the ____ model, each record can have multiple parent and child records.
network
ring topology
no host computer is required because each computer manages its own connectivity. nodule is connected to two other nodules upstream and downstream neighbors if any link is severed, entire network effected, disrupts entire network.
A routing table lists ____.
nodes on a network
Secondary Memory Devices
nonvolatile and used for storing large volumes of data for long periods. As mentioned earlier, they can also hold data when the computer is off or during the course of a program's operation
Gigabyte
one billion bytes
Megabyte
one million bytes
centralized routing
one node is in charge of selecting the path for all packets. This node, considered the network routing manager, store the routing table, and any changes to a route must be made at this node
Petabyte
one quadrillion bytes
Kilobyte
one thousand bytes
Terabyte
one trillion bytes
Third Generation Computers
operated on integrated circuits, which enabled computers to be even smaller, faster, more reliable, and more sophisticated. Remote data entry and telecommunications were introduced during this generation.
Business continuity planning
outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
business continuity planning
outlines procedures for keeping operational in the event of a natural disaster or network attack
project operation
pares down a table by eliminating columns according to certain criteria.
A ____ operation pares down a table by eliminating columns according to certain criteria.
project
virtual private network (VPN)
provides a secure "tunnel" through the Internet for transmitting messages and data via a private network
integrity
refer to the accuracy of information resources within an organization
The ____ in a database model describes methods, calculations, and so forth that can be performed on data, such as updating and querying data.
set of operation rules
distributed routing
relies on each node to calculate its own best possible route. Each node contains its own routing table with current information on the status of adjacent nodes so packets can follow best possible route.
network topology
represents network's physical layout, including the arrangement of computer cables.
static router
requires the network routing manager to give it information about which addresses are on which network.
Online brokerage firms operate in a highly combative and ambitious environment, so they use information technologies to make their services more unique in order to combat _____.
rivalry among existing competitors
Erasable programmable read-only memory (EPROM)
s similar to PROM, but its contents can be erased and reprogrammed.
Storage
saving data in computer memory,
Select operation
searches data in a table and retrieves records based on certain criteria.
Input Devices
send data and information to the computer
The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field.
set of integrity rules
Operating System (OS)
set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users
bit
short binary code, either a 1 or 0
Which of the following is a biometric security measure?
signature analysis
Data-driven Website
site acts as an interface to a database, retrieving data for users and allowing users to enter data in the database/
Computer literacy
skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.
Database Servers
store and manage vast amounts of data for access from users' computers
Application Servers
store computer software, which users can access from their workstations
Main memory
stores data and information and is usually volatile, meaning its contents are lost when electrical power is turned off.
Main Memory
stores data and information and is usually volatile.
Distributed database
stores data on multiple servers throughout an organization.
Date dictionary
stores definitions, such as types for fields, default values, and validation rules for data in each field.
Input devices
such as keyboards, are used to send data and information to the computer
Output devices
such as monitors and printers, display the output a computer generates.
Enterprise systems
supply chain management (SCM), customer relationship management (CRM), enterprise resource planning (ERP), knowledge management (KM), and collaboration software, to reduce costs and improve customer service
Information Technologies
support information systems come in the form of internet, computer networks, database systems, POS systems, and radio frequency identification tags (RFID).
Control Unit
tells the computer what to do, such as instructing the computer which device to read or send output to.
one advantage a database has over a flat file is that more information can be generated from the same data
true
Designing an MIS
the first task is to clearly define the system's objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.
Database
the heart of an information system, is a collection of all relevant data organized in a series of integrated files.
Database Engine
the heart of the DBMS software, is responsible for data storage, manipulation, and retrieval.
private information on the web-what is posted by a person-is not subject to censorship because of our constitutional freedom of expression
true
redundant data is eliminated by a process called normalization
true
Information
the output of an information system—consists of facts that have been analyzed by the process component and are therefore more useful to the MIS user.
Assembly language
the second generation of computer languages is a higher level language than machine language but is also machine dependent; it uses a series of short codes, mnemonics, to represent data or instructions.
importance of information
the second most important resource (after the human element) in any organization. Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources
chief technology officer (CTO) or the chief information officer (CIO)
the top information system job belongs to one of these 2 guys. This person oversees long-range planning and keeps an eye on new developments in the field that can affect a company's success.
Multiprocessing
the use of two or more CPUs in a single computer system
ultimate goal of an information system
to generate business intelligence (B.I)
code division multiple access (CDMA)
to improve the efficiency and quality of digital communications ---- transmits multiple encoded messages over a wide frequency and then decodes then at the receiving end.
presentation, application, data management
what are the 3 levels of logic of client server model ?
time division multiple access (TDMA)
to improve the efficiency and quality of digital communications,---- divides each channel into 6 time slots. Each user is allocated two slots: one for transmissions and one for reception. This method increases efficiency by 300 percent as it allows carrying three calls on on channel.
why use porters 3 strategies?
to increase customer loyalty, thus combating the threat of new entrants or substitute products. However, certain information technology tools, such as the Internet, have evened the playing field by giving customers more access to all sorts of data, such as the various prices for products and services. This increases buyers' bargaining power and decreases supplier power,
Goal of enterprise systems
to use information technologies to create the most efficient, effective link between suppliers and consumers. A successful CRM program, for example, helps improve customer service and create a long-term relationship between an organization and its customers.
Data encryption
transforms data, called "plaintext" or "cleartext" into scrambled form called "ciphertext" that can't be read by others.
data encryption
transforms data, called "plaintext" or "cleartext"; into a scrambled form called "ciphertext" that cant be read y others
worm
travels from computer to computer in a network, but it doesn't usually erase data. unlike viruses, these are important programs that can spread themselves without having to be attached to a host program
a database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS
true
a database is a critical component of information systems because any type of analysis that is done is based on data available in the database
true
a distributed database is not limited by data's physical location
true
a person making two copies of a software package he just bought and selling one of the copies to his friend is considered to be illegal and unethical
true
a supervisor fires a programmer who has intentionally spread viruses to the organization's network. The supervisor's behavior is both ethical and legal
true
although a database can consist of a single file, it is usually a group of files
true
an organization can generate revenue by licensing its patent to others
true
business intelligence uses scorecards and query reports to support decision-making activities, whereas business analytics uses data mining tools and predictive modeling
true
cookies can be considered an invasion of privacy
true
even a small response for spam is worthwhile return on investment because, sending emails are very inexpensive
true
flat file organization tends to take up unnecessary storage space
true
green computation helps an organization save on energy costs
true
having a clear, specific policy can help prevent legal actions users might take against an organization, as in cases of termination
true
in a hierarchical data model, nodes with the same parents are called siblings
true
in contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods
true
information in databases can now be cross-matched to create profiles of people and predict their behavior, based on their transactions with educational, financial, and governmental institutions
true
information technologies have created job upgrading
true
information technologies have direct effect on the nature of jobs
true
information technologies have led to "job deskilling"
true
star, ring, bus, hierarchical and mesh
what are the five common types of topography?
marketing information systems (MKISs)
used to improve marketing decisions. An effective MKIS should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product.
A manufacturing information system (MFIS)
used to manage manufacturing resources so companies can reduce manufacturing costs, increase product quality, and make better inventory decisions. MFISs can perform many types of analysis with a high degree of timeliness and accuracy. For example, managers could use an MFIS to assess the effect on final product costs of a 7 percent increase in raw materials or to determine how many assembly-line workers are needed to produce 200 automobiles in the next 3 weeks
Second Generation Computer
used transistors and were faster, more reliable, and easier to program and maintain
Client/Server database
users' worksheets are limited in a local area network (LAN) to share the services of a single server.
Biometric Security measures
uses physiological elements to enhance security measures. These elements are unique to a person and can't be stolen, lost, copied, or passed onto others.
Asymmetric encryption
uses two keys; a public key known to everyone and a private or secret key known only to the recipient.
asymmetric encryption
uses two keys; a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient's private key, too. Anyone intercepting the message can't decrypt it because he or she doesn't have the private key
static and dynamic
what are two types of routers?
star topology
usually consists of a central computer (host computer, often a server) and a series of nodes (typically, workstations or peripheral devices) - if one nodule fails its okay, if central computer fails entire network is down.
callback modern
verifies weather a user's access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number
Main (primary) memory
where computers store data and instructions, similar to a human brain
Log Files
which are generated by web server software, record a user's actions on a website.
Secondary Memory
which is nonvolatile, holds data when the computer is off or during the course of a program's operation.
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
wiki
Computer Programmer
writes computer programs or software segments that allow the information system to perform a specific task. There are many computer languages available, and each one requires a specific knowledge suitable for a specific application. Because of the popularity of smartphones and mobile devices, many programmers are now developing apps for iOS and Android devices. There is a huge demand for these applications and for the programmers who develop these apps.