Information Systems Management - C724 (Set 2)
Which of the following is not a characteristic of big data?
Object data
Analytical modeling
various scenarios are run mathematically, so decisions can be made (computers do this)
broadband
video is also called _________ due to its intense data bandwidth requirement
vulnerability
the possibility that an information resource will be harmed by a threat.
byte hertz
A _______ is a unit of digital information. A ________is a measurement of frequency
system-oriented, function-oriented, and strategy-oriented.
There are three types of system evaluation:
bytes each consist of
8 bits
multiplexer
If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a ____________
There are many database tools and technologies that help with business performance. What capabilities does a DBMS enable in a database?
Input, modification, and retrieval of data
basic operations in the information processing cycle that hardware operates and that every computer performs?
Input, output, process, and storage
What is extraction?
Extraction is the operation of removing data from a source for use in a data warehouse
Chapter 6
Valuing Organizational Information
object-oriented are designed to store audio or mixed media, while relational links tables of records
What is the difference between and object-oriented database model and a relational model?
database administrator
Who is responsible for checking on an employees' access to the company's database?
information security analyst
Who is responsible for the risk and vulnerability assessment to prevent security breaches of company or government data?
system-oriented evaluation
_______________________________ is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.2 This form of evaluation also includes query response speed and memory space demands.
People
are the most important component of an information system (IS) and their requirements are the primary reason IS are developed. Individuals who interface with the hardware, software, network, and data.
The network layer
includes the protocols used to describe the network layout and the interfaces necessary for data transmission.
A network protocol
is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception.
Hyper Text Markup Language (HTML)
is a system used to convert a plain-text document into one optimized for viewing as a web page, integrating colors, graphics, fonts, and links.
Wireless communication
is a type of telecommunication network that uses radio waves to send and receive signals.
Agile software development methodology
is an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.
The human resource function
is responsible for processes related to the employees of an organization, including benefits, compensation, training, and performance.
Processors are constructed of
microscopic electrical circuits using highly conductive gold (and soon, perhaps graphene) connections sandwiched by multilayer ceramic or silicon substrate
De-centralized
share no systems between units, eaqch meets its own needs
Cloud fabric
software that makes the benefits of cloud computing possible, such as multi-tenancy.
the process of building relationships between tables based on keys.
Describe referential integrity
Information technology
Entire process of collecting, storing, processing, securing, disseminating information, not just computers
Chapter 33 in COS, 31 in ebook
Global Information Systems
Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System
Microcomputer
Word processing software
provides tools and resources used to create documents.
website
specific location
Functional business Systems
Support business operations; accounging, marketing, HR, etc.
Routers
are used to link networked computers so they can share resources and information.
internet and databases
What factors help e-business accurately target individual customers?
operational efficiencies
What helps e-businesses respond and react quickly to changes within the business environment, more than their traditional brick and mortar counterparts?
partitioning is done to improve performance
Why is partitioning done when administering relational database systems?
delivering quality systems on time, managing the budget, and planning for the unexpected
Why is project management essential for managing information technology?
computer network
is a collection of interlinked computers that can exchange information over links in the form of digital packets.
supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets. Employees sharing of their expertise and best practices across business units.
KM (knowledge management)
Human Resource management
Keep track of employees, skills, PD, achievements; identify staffing needs
A method used by hackers to develop a relationship to trick employees into revealing confidential information or passwords.
What is social engineering?
blacklisting
a process in which a company identifies certain types of software that are not allowed to run in the company environment.
strategic goals, objectives, or decisions are
typically developed by upper managers to directly support the organization's vision and mission.
Identify the three different types of outsourcing
See Pic
customer satisfaction
What is an intangible benefit when evaluating information systems cost and benefits?
External
What's going on in the enfironment surrounding the organization
sensitive.
When a project is determined to have multiple critical activities leading to multiple critical paths, the schedule is _____________________
View
helps see contents, make changes, sort, query
logic bombs
segments of computer code embedded within an organization's existing computer programs.
convergence
The ability for a telecommunication network to carry voice, data, and video is called .
What is the conceptual data model?
The conceptual data model is the highest level model, containing the least amount of detail within the data.
Which item below is NOT a database model? Relational Structured Object
Structured
Which of the following attributes or fields would be a good choice for a primary key?
Student ID
Downward information flow
Directives from upper management
Data mining is used by businesses to analyze internal factors in order to improve business performance.
True
Objective
raw facts and data, can be quantified
Content creator
the person responsible for creating the original website content.
Focus
target a specific customer segment with a certain type of product
the consequences of an event
What is the meaning of outcomes in decision theory?
password
a private combination of characters that only the user should know.
Certificate authority
a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
Identify the primary project planning diagrams.
Two primary diagrams used in project planning include PERT and Gantt charts
Throughput
amount of info that can pass through a system at once
Tactical management
develops goals and strategies
Database management system
create databases, manage users, general maintenance, makes it user friendly
Tangible User Interface(TUI)
A person interacts with digital data through a physical environment.
business
A systems analyst should try to have an understanding of _________________ processes.
URL (uniform resource locator)
A web browser is required to surf the internet. What other protocol is needed by a client computer to request a web site via HTTP or HTTPs?
Information systems
Combination of implementing data storage, processing, and communicating hardware
What is the process to update or backup a data warehouse?
Extract, transform, load
circuit switching
Fixed packet size and rates of transmission exist only in____________________
an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.
Hacktivist
Chapter 25 COS, 23 ebook
Hardware and Software Basics
Out/In information flow
Info to and from customers, supplyers, partners; yields competitive advantage
A group of two or more computers and other devices connected to each other. Choices: Hardware Software Data People Network
Network (page 8)
Chapter 27 COS, 25 ebook
Networks and Telecommunications
A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.
Platform as a service (PAAS)
Employees and the business owner communicate via emails using this protocol.
SMTP
application, presentation, session, transport, network, data link, and physical.
The seven OSI layers are:
one-to-one, one-to-many
Types of relationships in a relational database model
audit
an examination of information systems, their inputs, outputs, and processing.
Open systems
hardwar and software standards that make it possible for many different devices to communicate
tracking barcodes and wireless sensor networks, some used in supply chain operations.
radio frequency identification (RFID)
Radio transmissions travel through
the air or atmosphere.
Intelligent agents
ex auto fill boxes
consequential
What does network economics see the cost of adding new members as?
Sell-Source-Ship
Alternative to distribution chain; helps reduce fixed costs due to less storage space and wasted product
the cooperation of two or more companies to gain efficiency and growth
Define synergy
sniffing
Most prevalent hacker attack on wireless networks
Quality
Timeliness, location, form, validity
when conveying documentation
When should oral communication be avoided?
Chapter 23 COS, 21 ebook
BUSINESS BASICS
What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information
Collective Information
Competitive business strategies
Cost leadership, differentiation, innovation, growth, alliance
Chapter 2
Identifying Competitive Advantages
DAC1
Learning outcomes from all COS chapters
chronological evolution of computing in business.
Mainframe, minicomputers, microcomputers
Malware is spread through a variety of methods, direct download (intentional or not), as a part of another application or utility
Trojan Horse
True or False. Predictive analytics is used by businesses to predict trends or behaviors from customers.
True
fix bugs, are expensive and time consuming
What are software patches?
data access
What is the best reason to implement a database for a growing business?
more scalable than wired networks.
Wireless LAN networks are _____________
Testing
Write test conditions, and perform testing (unit, system, integration, user acceptance)
Packet Switched Networks
_______________________________________ group data in packets and are transmitted in multiple simultaneous communication sessions
phishing attack
an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
Computer
electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data.
Committee of Sponsoring Organizations (COSO)
key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting.
Legacy Information Systems
massive long-term business investment in a software system with a single focus; often brittle, slow
A hub is a networking device
that connects computer devices together in a LAN, sending data traffic to all networked components.
Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system
Network Operating System
4
Networks with __G provide IP-based voice, data, and multimedia traffic speeds between 100 Mbps and 1 Gbps (100 Mbit and 1 Gbit per second)
What are two fundamental elements that are used in modern networking infrastructure?
One is packet transmission and the other is the TCP/IP protocol.
Voice over Internet Protocol (VoIP)
modern telecommunications technology that offers convergence between voice and data networks
ERP Requirements
modular, contralized database, integrated functions, flexible best practices, real time functions, internet enabled
A network host is a _______ in a data communications network and is assigned an IP address.
node Correct! A network host or data terminal equipment is a node in a network.
True or False. A retail company such as Amazon.com uses DBMS to discover customers' past spending trends and to predict future shopping behaviors.
False
a. Supports data modeling e. Unstructured
35. What are two key features of object-oriented systems development? a. Supports data modeling b. Impedes reusability c. Monolithic nature d. Ease of design e. Unstructured
c. Frequent customer feedback
40. What is a primary characteristic of extreme programming (XP)? a. Increased risk during development b. Greater number of features developed c. Frequent customer feedback d. Detailed documentation
analyzing data to gain insight or intelligence
Describe the process of data mining
economic feasibility
Does a decision fit with the budget
Which of the following terms defines a database entity?
Something for which a business collects data
used to measure performance of data communications
What is QoS?
the entire recruitment community
Who does the the LinkedIn model benefit?
Collaboration system
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.
spam
unsolicited e-mail.
energy usage and reduces the operating costs in an organization
What does EMS (energy management system) manage?
systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams
What does Microsoft Visio enable?
Scrum
___________________is a type of agile software development with emphasis on planning.
Manual Keying
_________________is the simplest, but most protracted data capture method.
Second, 2
______________generation is ___G, with an ability to carry 64 kbps data rates
digital certificate
an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
cloud computing VPN
an exchange that provides more flexibility: an exchange that provides more security:
a. Ethics training for all employees b. Scenarios of unethical behaviors and their resolution
48. What should a company's code of ethics include? Choose 2 answers. a. Ethics training for all employees b. Scenarios of unethical behaviors and their resolution c. Ethics training for customer-facing employees d. Job descriptions and responsibilities
Which of the following is an example of a business or entrepreneur utilizing a customer relationship management (CRM) system? A chain of three pizza restaurants utilizing a Web-based software that keeps track of customer email addresses and uses that system to send out weekly coupons A doctor's office utilizing file folders with physical papers to keep track of patient information A hair salon keeping track of appointments and customer phone numbers in the salon owner's cell phone An author using a spreadsheet to keep track of fans' email addresses
A chain of three pizza restaurants utilizing a Web-based software that keeps track of customer email addresses and uses that system to send out weekly coupons (page 12)
Predictive analytics of multidimensional data can lead to better decisions and lower costs. What is a multidimensional database?
A relational database that is structured as a cube
Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B
B2B
promote and market their organizations
Businesses, news networks, government agencies,and nonprofit organizations are all actively using social media to primarily do what?
What information is enclosed in transmission packets? Select the most accurate statement.
Data packets include destination address, relay information, and error detection.Correct! Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.
PPP stands for Point-to-Point protocol.
Encryption is used for this protocol to ensure the privacy of the content being communicated
The computer and all of its peripherals Choices: Hardware Software Data People Network
Hardware (page 8)
Joe is shy and is not one to go to bars to meet people, but would like to find a suitable companion. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Online Dating (page 9)
Due to age and fatigue, Barbara's mall days are over so this is a good option when buying gifts for the grandkids. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Online Shopping (page 9)
Students can buy e-books and access codes directly from the textbook publishers' websites.
Sell digital goods-Correct! Textbook publishers such as Pearson and McGraw-Hill yield a bigger profit margin from selling digital goods to students.
Relational Database Model
Stores information in the form of logically two-dimensional tables.
synchronous
These are forms of ________communication Instant message (IM) Video conferencing Online chat
Identify which description goes with which of Porter's competitive forces. Switching from one product or service to another similar product or service with little cost. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry
Threat of Substitutes (page 11)
What is virtualization in computer system infrastructure?
Virtualization is assigning part of a computer system to run different operating systems.The act of virtualization creates a virtual environment in a host computer to save space, reduce costs, and provide a safe test environment.
WEP is a legacy wireless encryption protocol that has been replaced by a more secure protocol called WPA.
WEP and WPA are protocols embedded in both hardware and the operating system; they are part of the wireless network's Open System Interconnection (OSI) layer of encryption and always in place for all wireless networks. What is the difference between the WEP and WPA encryption protocol?
speed is the ability to share information in seconds, and amplification is the re-posting news in a community.
What is meant by speed and amplification in social media?
MIS (management information systems)
Which system helps managers manage their departments more efficiently?
an authorized and ethical computer hacker**, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.
White Hat
enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer
Who does good IT planning help an enterprise achieve a competitive advantage?
data administrator
Who is in charge of determining and monitoring the employees' access to the company's DBMS?
they are simpler table relationships than hierarchical databases
Why did relational database models replace hierarchical database models in business applications?
An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. zombie B. Phishing C. Vishing D. Pharming
Zombie
Transmission Control Protocol/Internet Protocol Protocol
____________________ is the standard communication rule of the Internet. Internet __________________________ governs Internet data network rules.
Protocols
_________________________ are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.
Satisficing
a Decision making model, make a choice that is satisfactory, even if it is not the best; works for unseen issues where a decision needs to be made quickly
patent
a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.
whitelisting
a process in which a company identifies acceptable software and permits it to run, and either prevents anything else form running or lets new software run in a quarantined environment until the company can verify its validity.
risk mitigation
a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
firewall
a system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the internet, and private networks, such as your company's network.
Network interface cards
allow computers to connect to networks
An integral component of planning and organizing IT systems for businesses includes which of the following? blending the attributes of different IT system designs to meet the unique user needs of the business avoiding consultations with outside vendors and customers relying exclusively on expert IT consultants to evaluate all facets of the business operation duplicating IT systems models of competitive businesses in order to minimize start-up and development costs
blending the attributes of different IT system designs to meet the unique user needs of the business (Page 15)
You are managing a small business network. They have a web or database server so you will need to design their network as a _____ topology, while a large enterprise would best benefit from a ______ network to manage network moves and changes.
client-server virtual
Collective intelligence
collaborating and tapping into the core knowledge of employees, partners, and customers.
Output
components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).
identity theft
crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
A relational database which stores data in tables can be designed using a(n) ___________
entity-relationship model
External database
exists outside your direct control; fee based; ex marketing database
Optimization analysis
finds optimal value given certain constraints
Strategic management
focuses on overall direction and guidance
Query by example tools
graphically design answer to a question
Capability maturity model integration method
process improvement approach that contains 22 process areas.
When installing a wireless LAN,
the access points must be configured to TCP/IP, and the network must be configured to IEEE 802.11 standards and the IP address scheme.
security
the degree of protection against criminal activity, danger, damage, and/or loss.
one-bit CPUs
used only two connections, one for input and one for output, and allowed for the processing of thousands of bits per second. Later, in the 1970s, four- and eight-bit architectures allowed for parallel processing.
Data mining is sometimes referred to as ___________.
knowledge discovery
What are artificial neural networks?
nonlinear algorithm models used in data mining.
Query
process of requresting info out of a database
Workstation
A more powerful system used by individuals in order to run more resource-intensive applications.
Why an organization would need to understand global enterprise architectures when expanding operations abroad.
Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets An organization must manage its global enterprise architecture to support its global business operations
information systems
What accepts data as input?
Recommendation engines
based on likes, dislikes, past purchases
Coaxial cable
cable that can carry a wide range of frequencies with low signal loss.
Autonomous agent
can adapt and alter the manner in which it attempts to achieve its assigned task
Enterprise resource planning systems typically utilize one _______________. database manager computer employee
database (page 12)
Break even analysis
Determining at what point the financial impact of a resource becomes reasonable
Development
Build technical architecture, database and programs
analog packet-switched data networks (PSDN)
Early cellular networks, such as 1G, were ___________________Subsequent technological evolution produced _________________________________. Each evolutionary generation enabled faster data transfer rates with the current 4G broadband networks providing multimedia traffic.
Frameworks and standards were developed to help businesses manage the development of complex systems due to the explosion of the Internet. Which of the following is NOT a framework or standard developed to deal with the complex systems?
ISO 20 Correct! ISO stands for International Organization for Standardization. ISO 20 is not an ISO standard. The two frameworks are ITIL and COBIT and the standard is the ISO 20000.
Bluetooth is a wireless technology that allows the exchange of data. Why is this technology a benefit to business?
It is relatively easy to configure.Correct! Bluetooth is a benefit to business because it is wireless, allows for easier communication, and is very easy to configure.
In the beachwear clothing market, a number of key brands have been in the industry for a long time. An entrepreneur decides to start a new clothing line that is targeted at individuals who like the beach and who like dolphins. In terms of Porter's five competitive forces, the new clothing line is an example of Bargaining Power of Suppliers Threats of new Entrants
Threats of new Entrants (page 11)
Request for proposal
official request for bids from vendors
True or false. A core competency is an activity for which a business is a marketplace leader.
True (page 11)
software development, proving, and integration
What does the programming stage in the waterfall method of software development focus on?
provides more focus on individual transactions versus lasting relationships
What is a characteristic of a Net marketplace?
identify user system and software requirements
What is the objective of the systems analysis stage in the waterfall method?
smartphone
What portable device combines the functionality of the phone technology with the computing of a desktop or laptop?
petabyte
What size is big data database considered?
Compare the two types of network structures.
1) Peer-to-peer networks 2) Client-server networks
d. Differentiation e. Cost
22. What are the two primary criteria used to define the main strategies of Porter's generic strategies model? a. Government regulations b. Automation c. Consumer loyalty d. Differentiation e. Cost f. Asset requirements
Wearable Interface
A pocket projector, a mirror, and a camera contained in a head-mounted, handheld or pendant device that connects to a mobile computing device in the user's pocket.
Platform as a service (PAAS)
A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.
Server
A system used to provide services to other systems. need not be powerful computers
Describe artificial intelligence, and identify its five main types.
Artificial intelligence (AI) simulates human thinking and behavior, such as the ability to reason and learn. The five most common types of AI are: 1. Expert systems—computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. 2. Neural networks—attempts to emulate the way the human brain works. 3. Genetic algorithm—a system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. 4. Intelligent agents—a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. 5. Virtual reality—a computer-simulated environment that can be a simulation of the real world or an imaginary world.
Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar
Autonomic
Chapter 1
Business Driven Technology
databases, data warehouses, and analytics
Business intelligence consists of what?
How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems
By automating inventory and customer management systems
A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented
Data Warehouse
DNS
Domain Name Service. Server-based service that translates human language web address or URL into an IP address, which is used.
Identify the different computer categories, and explain their potential business use.
See Pic
Chapter 3
Strategic Initiatives for Implementing Competitive Advantages
LAN
Wireless _______networks are more scalable and can be configured in any topology and can be easily changed, provided that they are properly planned
Classification
assigns records to one of a predefined set of classes.
Data management
database to organize and store info
Customer resource management
focus on customer relationship/info about customers
Collaborative demand planning
helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability.
Server
manages network resources and services
Fuzzy logic
mathematical models for forming conclusions from vague information ex spam filters
Operational database
necessary for operation of business; ex HR personnel
Long-tail economics
niche products
three bits set to ____
on
asynchronous
one way communication, such as email and global overnight mail) communication.
Hardware
physical IT devices (i.e., equipment) that are integrated into an information system
Output devices
printer, monitor, speakers, etc.
Unstructured
several indefinate answers
Virtual reality
simulation of the physical world, ex flight simulators
Distributed database
stores info across many systems; fault toleratnt because data is stored in several places
Systems development life cycle
structured spproach for developing IS, Waterfall method
Summarization
sums, averages, other stats
More than _____ pins or connections (e.g., one input, one output) allows parallel processing (more than one bit is processed at once), and additional pins allow more bits to be processed at any given time.
two
synchronous
two way communications, such as audio/video teleconference and instant messaging
Complex instruction set computer chip (CISC)
type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly.
Three factors to consider when defining big data are:
volume variety velocity
cyberwarfare
war in which a countries' information systems could be paralyzed from a massive attack by destructive software.
CDMA (code division multiple access)
was developed as the protocol during the second generation cellular networks. he second generation is 2G, with an ability to carry 64 kbps data rates.
product and project.
what are the two primary type of requirements in SDLC?
the ability to GROW
what is meant by network scalability?
Replenishment frequency
when to move products and where
Decentralized development
where developers in different locations develop their own solutions independently
Select the best definition to describe a database.
A database is a set of data that are organized and easily searchable through queries.
A restaurant relied on an old manual ordering and accounting system. The restaurant owner decided to purchase a point-of-sale (POS) system to save time and money. This scenario is an example of an advantage of _____. Choices: Information Systems Information Technology Management Information Management
Information Technology Management (Page 16)
TPS (Transaction process system)
This system tracks the flow of daily routine transactions that are necessary to conduct business.
The information system professionals and users. Choices: Hardware Software Data People Network
People (page 8)
usually hold a bachelor's degree, have digital marketing experience, and excellent communication skills
Traits of a social media marketing manager
knowledge
Understanding why the poverty line increased in the city of Tampa is an example of
URL
Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.
benchmarking and metrics
The measurement function of business intelligence creates a hierarchy of what?
Identify the different media types found in networks
The two types of media are wired and wireless
Two - There are two methods for modeling and designing systems: object-oriented and structured.
There are _________ main methods for modeling and designing systems.
serve organizational goals
To be a strategic information system, an information system must ______________________ .
Sensitivity Analysis
Change one variable and see how the others change
make team assessments and evaluations, demonstrate leadership and have good communication skills, establish project milestone and deliverables
What are the responsibilities of a project manager?
Information, People, Input, Output, Processes, Data
What are the six major components of a computer-based information system?
one record or data set in a row. A record in a row or table
What are tuples and how are they used in databases?
hardware and software
What are two examples of information technology?
presentation and staging
What are two key elements that make up the data warehouse?
age
What customer attribute is not helpful for accurately pricing goods to increase profit margins?
Buying digital goods online makes the buyer more prone to online fraud.
What is a disadvantage of buying digital goods online?
new drug discovery
What is an example of big data analytics applications?
knowledge discovery
What is another term used to describe data mining?
what happens when the same attribute has different values because the data is stored in more than one location
What is data inconsistency
data is accurate and consistent through its use and application time
What is data integrity?
the measurement of probability and consequences of risks
What is qualitative risk analysis?
The process of identifying, analyzing, and responding to risk
What is risk management in system security?
authentication
a process that determines the identity of the person requiring access.
authorization
a process that determines which actions, rights, or privileges the person has, based on verified identity.
spyware
alien software that can record your keystrokes and/or capture your passwords.
EDI - electronic data interchange
an organization can utilize ________________________________ to transfer documents automatically without human intervention to their suppliers
Processes
and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS. must have clearly defined input and output guidelines. Other examples are equipment maintenance schedules and backup and recovery policies.
Expert systems
designed to apply human like reasoning to reach a conclusion
Operational feasibility
does a decision fit the needs and mission of the organization
Legal and political feasibility
does it comply with laws?
Basic reporting
everyday stuff
Massive Multi Player Online Role Playing Games
ex world of warcraft
Clickstream data
exact pattern of a consumer's navigation through a site.
Choice
examine options and select one
Regression
find a causal replationship between sets of data
Data manipulation subsystem
helps add, change, and delete info in a database and query it
POP stands for Post Office Protocol
in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.
packet
is simply a unit of data forwarded by a network
Telecommunications
is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.
The primary component categories that make up a computer-based information system (CBIS)
people, processes, hardware, software, networks, and data
information security
protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Keys
ways to access data, such as last name or phone number
Financial metrics
what is the financial impact
Distributed agent
works on multiple distinct computer systems
Compare the four categories of ebusiness models
See Pic
Explain the ethical issues in the use of information technology
See Pic
Six epolicies organizations should implement to protect themselves
See Pic
Differences among data, information, business intelligence, and knowledge.
See below
edge router
(also known as a boundary router) transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network.
Chapter 15
Creating Collaborative Partnerships
Decision support system
Helps make decisions
Chapter 7
Storing Organizational Information—Databases
central processing unit (CPU)
brain of the computer and carries out program instructions.
Core routers
gather, link, or route data from a business campus and aggregate it to optimize high bandwidth transmission.
Demand prediction
how much of something will be needed
Goal seeking analysis
makes repeated changes to variables until a chosen value is reached
Artificial Intelligence
making systems that can imitate aspects of human resoning and motion, ex weather prediction
Customer resource management system
not just software; total business objective; hardware, servers, support, etc
Cloud computing
refers to resources and applications hosted remotely as a shared service over the internet.
Hardware
refers to the physical IT devices (i.e., equipment) that are integrated into an information system
Capital
represents money whose purpose is to make more money.
Which organizational behavior leads to information system implementation failures?
resistance to change.Resistance to change by stakeholders is a primary reason for implementation failure.
Push dynamic info
today's web; tailored to individual needs; RSS, personalized recommendations (shopping carts, etc.)
offshore outsourcing
using resources that reside outside the country in another geographical region
e. Data flow
13. What does an arrow with a dashed line represent in a business process model diagram? Pg 364 a. Activity b. Decision c. Start d. Control flow e. Data flow f. End
A large part of IS management's main agenda changes every _____ year(s) due to the constant evolvement of information systems, confirming the highly dynamic nature of the IS management function. Choices: 1 3 4
3 (page 8)
packet analyzer or sniffer
A _____________ or _________________ is used to monitor or log traffic on a network for troubleshooting or analysis
Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security
Biometric Security
Surveymonkey.com is a good website for businesses to collect information from its customers.
Gain intelligence. Correct! There are several survey sites that allow businesses to collect opinions or information from their customers and potential customers.
mobile devices or laptops
How does web-based databases allow users to access information?
Transaction speed
How fast the system operates, ie response time
Recruiting, training, and maintaining employees and their records Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance
Human Resources (page 10)
Recruitment; training; employee records; benefits; payroll and employees' records; benefits administration; employee relationship management Choices: Production and Operations Accounting and Finance Human Resources
Human Resources (page 10)
HTTP
Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the world wide web.
structured query language
Info is processed to give correct answer
Which of the following involves employees from various business functions in an organization who share their information with others within the organization? Information systems management Information technology management Information management
Information management (Page 16)
data
Information systems accept _______________ as input.
Walmart utilizes SCM to order its inventories.
Interact with suppliers Correct! Supply chain management (SCM) allows retailers to order their inventories directly from the manufacturers.
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Employees Choices: Internal External
Internal (Page 15)
Customer relationship management (CRM)
Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability. This also allows a Company to gain insight into a customers shopping and buying behaviors in order to develop and implement enterprisewide strategies.
Management information systems (MIS)
Is a business function which moves information about people, products and processes across the company to facilitate decision making and problem solving
Human factors feasiliby
Is the decision accepted by staff
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?
It takes into account the needs of the end users.
This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly. Choices: EIS TPS MIS DSS
MIS (page 8)
Organizations are complex and have many similarities and differences. Having a motivated and knowledgeable team can make a business run smoothly and keep managers aware of what is happening at all levels and in all areas of the organization. Pick the most accurate statement below regarding managers. Managers need an MBA to understand organizational features to build and use information systems successfully. Managers need to understand the essential features of their organization to build and use information systems successfully. Managers need to undergo human resource training to understand organizational features to build and use information systems successfully.
Managers need to understand the essential features of their organization to build and use information systems successfully. (page 10)
virtual company model
Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries. is one that does not have any physical offices but a team of employees who work remotely.
_____ is the strategy of having tasks performed by companies in other countries using information technology advancements such as the Internet and cloud computing. Choices: Insourcing Outsourcing Offshoring
Offshoring (Page 17)
Systems design
Once logical model is finished, translate into appropriate information technologies
data
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida below the poverty line is an example of
standardized business procedures.
One of the key business benefits of enterprise resource planning is the foundation that it provides for a business to standardize its business procedures across all business units.
A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel
Phased
what is the DBMS?
The database management systems (DBMS) is the component of the database that enables and supports the decision-making process.
cellular wireless standards
The term "generations" is used to describe changes in which type of technology?
True or false. Information is data that have been organized to provide value to an organization.
True
True or False. A web developer is responsible for designing and coding the website to allow users to engage and navigate website information and services.
True (Page 14)
Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time
Usability
Component development
Use existing pieces of development to combine their functionality to produce new output
This approach values human behaviors that allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.
Virtue approach
Wireless Sensor Networks
What does WSN stand for?
webbed formats used by publishers
What is a rich site summary (RSS)?
a type of data diagram
What is the definition of a systems analysis logical model?
ETL (extraction, transfer, and load)
What is the process associated with data warehouse updates and backup?
direct-move
What is the process of transferring data that does not need to be transformed to the data warehouse?
A company's general evaluation of their MIS is to analyze the system performance against outlined objectives.
What is the purpose of a general MIS evaluation?
data warehouse analysis leads to business intelligence
What is the relationship between business intelligence and a data warehouse?
accounting and finance
What is the system that tracks and processes company revenues, purchases, and payroll?
circuit switch
When streaming data or voice, which type of switched network is used?
Lack of training or acceptance for new system
Why do users fail to adopt new information systems?
Clustering
discovering how groups of people are similar
static information
early web; users started internet, went to a website, found what they wanted
Redundance
goal is to remove this, making it easier to keep a database organized
Filtering
hide data that don't matter
Three Primary information security areas and an example of each.
1) People: Authentication and Authorization EX: Identity theft 2) Data: Prevention & Resistance EX: Encryption 3) Attack: Detection & Response EX: Intrusion detection software
b. Planning
31. Which phase of the systems development life cycle (sdlc) includes feasibility studies? Pg. 373 a. Maintenance b. Planning c. Analysis d. Design
documents
A process description tool __________________________ the functions of a process in a logical format.
Managing financial assets and maintaining financial records Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance
Accounting and Finance (page 10)
Issues created by the trustworthiness, accuracy, and legitimacy of information.
Accuracy issues
Vertical Application
An accounting software application is a ____________ _______________ because it is designed for a specific function, department, or industry.
agile
Collaborative, self organized, cross functional teams used to develop software systems represent the ____________________ methodology.
bus
Connection and data transfer between computer components
making sure that all data values are correct, accurate, and consistent
Define data integrity
Chapter 9
Enabling the Organization-Decision Making
True or false. Although information technology has increased the speed and number of processes that can be completed, it poses no risk to any employee's job because there is more IT to manage.
False (Page 16)
What is forecasting?
Forecasting analyzes a series of values in order to predict or forecast the value of other variables.
Revenue
How much you sell a product for
A(n) _____ consists of all the components that work together to process data into useful information. Choices: Outside Influence Business Information System
Information System (page 8)
1.Data 2.Information
Information systems accept ___________ as input and process it into information as ___________.
ensures that data is produced and modified in the correct way.
Integrity
Why would a school admin choose to utilize Microsoft Office?
It inegrates all department and functions into a single IT system
Open standards is a hot new career field as it relates to networking and/or servers. What technologies might you be an expert in that would fit the criteria of open standards with a web development and/or server emphasis?
Java and Linux OS
Pulled dynamic info
Late 1990, search for real time info, like stocks, travel sites; birth of e-commerce
A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.
Mainframe
Which of the following is not a database model? Hierarchical Object defined Relational Flat file
Object defined
What is the physical data model?
One or more physical data models may exist within the logical data model, containing greater detail, such as database tables and key indexes.
communication
One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example?
Which function is not performed by an IT professional? Online marketing Software development Database design
Online marketing (Page 14)
Information technology helps ensure quality new products reach the market faster and to more customers and suppliers. Choices: Globalization Communication Cost Effectiveness More Time Product Development
Product Development (page 9)
productive
RFID technology helps companies to be more ______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.
Which of the following is considered an efficient database backup strategy?
Reducing volume of data for regular backups
The potential for loss, commonly associated with the monetary and non-monetary impact to such a ,,,,,,,,,,, as well as the probability of occurrence.
Risks
Client-server networks
See Pic
Database Management System (DBMS)
See Pic
Which one of the following systems represents a strategic information system? Choices: Superior Real Estate Company created a mobile application to allow prospective clients to view information about listed properties from their smartphone. No other real estate agents in their area currently offer such technology. Superior Real Estate Company created a mobile application to allow its realtors to track their annual sales. This application will also calculate the realtor's commission on each sale.
Superior Real Estate Company created a mobile application to allow prospective clients to view information about listed properties from their smartphone. No other real estate agents in their area currently offer such technology. (page 11)
False - some businesses charge a fee the service
T or F: an information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.
Identify the advantages of using business intelligence to support managerial decision making.
The Problem: Data Rich, Information Poor Businesses face a data explosion as digital images, email in-boxes, and broadband connections doubles every year The Solution: Business Intelligence BI enables business users to receive data for analysis that is: ■ Reliable ■ Consistent ■ Understandable ■ Easily Manipulated Summary: BI can provide managers with the ability to make better decisions.
What is knowledge management? The process of sharing knowledge across business units and amongst employees of a business The process of combining customer data into one system
The process of sharing knowledge across business units and amongst employees of a business (page 12)
employees
There is a higher chance of failure in information system projects if ________________ do not use and leverage the system on behalf of their organization.
False - Cloud computing can be private, public, or a combination of the two.
True or False. Cloud computing relies on private resources to achieve economies of scale among users.
We are currently in the ______________ of wireless communication,
We are currently in the fourth generation (4G) of wireless communication, with the anticipated rollout of the fifth generation by the end of the decade.
all devices connected to the internet with sensors to be automatically re-filled or serviced when needed
What is the IoT (internet of things)
the integrated environments type of CASE tools
What is the most common SDLC analysis?
human resources
What is the system that helps improve employee productivity by managing the workforce?
TCP/IP Protocol
When installing wireless LAN, the access points must be configured to:
Intensity of Competitive Rivalry
When there are many competitors in an industry, this threat is high.When there are many competitors, firms have to compete aggressively for market shares, which can result in lower profits.
business process
When using the balanced scorecard method, quality would fall under what measurement?
Describe the Information Age
Where infinite quantities of facts are available to anyone who can use a computer.
internet
Which of the following is a great, free, and ubiquitous source of information for systems analysts?
They display data in a structured format
Why are DBMS reports a valuable database tool in helping managers make business decisions?
1G
______G networks were "voice only" analog communication networks
project
a set of tasks with a clear objective and an ultimate deliverable
Object oriented database
abstract related pieces of information into units; can easily be extended, promotes reuse of existing database architecture
Classification
aka prediction, evaluate historical data to make current predictions
Neural networks
attempts to simulate human ability to classify items and recognize patterns, ex handwriting and speech recognition
proprietary
belonging to a single organization, then
Which tool do store managers at Best Buy Electronics use to price their products appropriately and attract customers to make more purchases?
business intelligence
network controls
communications controls
Input
components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.
Data mining
computer searches large quantities of data for unseen patterns
Data dictionary
contains logical structure for the info in a database
piracy
copying a software program (other than freeware, demo software, etc.) without making payment to the owner.
Two factors that have contributed to the globalization of business are the availability of inexpensive communication and improved transportation. These factors have also contributed to the creation of a common global _____. Choices: Software Culture Information System
culture (Page 17)
Software as a service
delivery model for software where a company only pays for what it uses; like Cloud; reduces fixed costs
Intelligence
diagnostic pahse - detect and interpret that something needs attention
If you want to visit the Barnes & Noble website, you will type the _____ of barnesandnoble.com in the ______ of your web browser. The DNS will convert barnesandnoble.com into _______, and you will use the _____ protocol to communicate with the world wide web.
domain name URL IP address HTTP
Topline competitive advantage
focus on increasing revenue
Head Tracking
A display device, worn on the head, with a small display in front of each eye.
Grid computing
A form of supercomputer constructed from many smaller systems that have been connected together.
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software
Antivirus software
Which one of the following scenarios describes a strategic information system? Starfish Seafood Restaurant implemented a new system to help track transactions, manage employee hours, and help with routine questions about inventory. Big Bean Coffee shop implemented a new system to determine trends and identify new operational methods in order to improve customer service.
Big Bean Coffee shop implemented a new system to determine trends and identify new operational methods in order to improve customer service. (page 11)
2.4
Bluetooth wireless communications use the _____GHz band in the radio frequency spectrum to exchange data over short ranges
Maintenance
Build helpdesk support, provide environment to support changeds
which is the brain of the computer. Historically, this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.
Central Processing Unit (CPU)
Challenges of business mobility (wireless networks).
Challenges: Protecting against theft, Protecting wireless connections, Preventing viruses on a mobile device, and addressing privacy concerns with RFID and LBS.
The highest level executives in senior management usually have titles beginning with Hint, displayed below and are part of a "C-suite." Choices: President Chief Manager
Chief (Page 14)
What is clustering?
Clustering classifies events or entities when no known group exists for the data.
ISP
Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to an _________________
Enterprise Resource planning
Connects different departments
Which term describes the procedure in ETL (extract, transform, and load) that correlates the data with the data warehouse format?
Consolidates the algorithm
Explain the cultural, political, and geoeconomic challenges facing global businesses.
Cultural business challenges include differences in: Languages, Cultural interests, Religions, Customs, Social attitudes, and Political philosophies. Political business challenges include: Numerous rules and regulations surrounding data transfers across national boundaries (especially personal information), Tax implications, Hardware and software importing and exporting, and Trade agreements. Geoeconomic challenges: See Pic
an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.
Cyber Criminal
conceptual, logical, and physical
Data models used when mapping business processes, relationships, and data requirements
The decision to implement a relational database system depends mostly on two factors. The first factor to consider is the ________ he second factor to consider when implementing a relational database is users
Data, users
Risk avoidance
Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category
traffic, locations, taxes
Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which data is most useful in a GIS to help fight crimes?
What is a benefit of introducing knowledge management? Employees develop more of a personal role and feel empowered to be the only one with their expertise. Employees of a business more readily share information across business units.
Employees of a business more readily share information across business units. (page 12)
Group decision support systems (GDSS)
Executive management,who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support system?
Carly's Consignment shop keeps track of sales at the cash register and then downloads them into two spreadsheets at the end of the week to verify inventory sold and to calculate profits. This is an example of sales that are processed and tracked digitally in a database management system.
False
banking transactions must be encrypted to be safely communicated over the internet
For an individual or a business, data can be uploaded to the internet in many forms. What data should not be communicated on the internet?
Describe the relationships and differences between hackers and viruses.
Hacker—Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. EX: * Black-hat hacker * Cracker * Cyberterrorist * Hactivist * Script kiddies or script bunnies * White-hat hacker Virus—Software written with malicious intent to cause annoyance or damage
provides real-time, relevant, and user customized information that is easily shared
How does business intelligence make information actionable?
extranet
If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application connection is used?
Competitive advantage
Is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
employment and occupation related
LinkedIn posts and profile information is typically about what?
Accounting and Finance
Managing financial assets and maintaining financial records. Investment management, budgetary control, auditing; economic forecasting; global stock exchanges; managing multiple currencies
What are decision trees?
One data mining methodology is decision trees, which generate rules and classify data sets.
Along with their benefits and challenges.
Outsourcing Benefits: Increased quality and efficiency of business processes. Reduced operating expenses for head count and exposure to risk for large capital investments. Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products or services Outsourcing Challenges: * Length of contract * Threat to competitive advantage * Loss of confidentiality
Marketing and Sale
Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization
Database management systems help businesses manage and organize their information more efficiently. What tools organize a company's data into two-dimensional tables?
Relational DBMS A relational DBMS is a collection of files (tables) that are organized by columns (fields) and rows (records).
If you were setting up a new database, which of the following items would represent "objects" in your database?
Reports
A communication protocol is defined as a set of rules that does what?
Rules that allow communication systems to interact. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.
Explain the business benefits of a data driven website.
See Pic
What are sequences?
Sequences are events that take place in a specific order, like a customer purchasing a GPS device after purchasing an automobile.
Personal computers (PC)
Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems and integrated systems, such as laptops and tablet computers.
Software life cycle
Software is typically introduced to the market, grows in demand, matures as it is overcome by newer technology or tools, and declines in popularity and rate of adoption.
Software as a service (SAAS)
Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.
The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. This system is one in which businesses are interconnected and working to create a product or service for the customer. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System
Supply Chain Management (SCM) System (page 12)
Corrective Perfective Preventive Adaptive
The four types of maintenance are: ______________: to fix errors ______________: to increase efficiency _______________: to decrease the chance of future system failures _______________: to add new capabilities to the system
more complexity due to the need for more systems and better improvements in their processing capabilities.
The internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?
system development life cycle
The six formal steps that need to be followed to develop an information system is known as what?
Threat of New Entrants
The threat of new competitors is high when there are few barriers to prevent competitors from entering a business. If an industry is profitable and there are few barriers to enter that industry, then rivalry will be great as new businesses enter the market.
Communication among the users is most critical because communication is key for driving change acceptance.
There are six methods to increase user adoption and lower post-implementation costs. Which one is the most important for driving user adoption?
Computer networks enable circuit switching. What does this mean?
They create a point-to-point packet digital circuit in circuit switching. Correct! Computer networks create a point-to-point packet digital circuit in circuit switching, which allows point-to-point communication.
Proprietary software
is closed source because the owner does not usually reveal the source code. Microsoft Windows and Mac OS X are examples of proprietary software.
Cost leadership
lower price for same or better quality than competitors
Hypermedia database
media based database; ex youtube
organizations can communicate Hint, displayed below ______ with their clients via bulletin boards, blogs, and streaming videos.
organizations can communicate Hint, displayed below asynchronously with their clients via bulletin boards, blogs, and streaming videos. Asynchronously refers to events happening at different times
a. Setting user expectations c. Verifying full functionality of the product
33. What are two purposes of prototyping a product? a. Setting user expectations b. Minimizing development time c. Verifying full functionality of the product d. Performing large-scale testing e. Decreasing the time required to start testing
it provides automated data collection and reporting reducing labor cost
How does a corporation benefit from a business intelligence program?
Corporations have used private branch exchanges (PBX) for many years to manage their own internal phone systems. Which of the following statements about private branch exchanges (PBX) is false?
The Internet is the backbone for PBX. Correct! The PBX system is based on the telephone technology and does not require the Internet to function.
Software licensing
The acquisition of software typically requires organizations to recognize that due to copyright law, copying software or installi
Quality and Types of information
Time, content, form
There are many types of data warehouses with many different applications. Which of the following item is not a data warehouse application? Information processing Data mining Analytical processing Transaction processin
Transaction processing
False - Quality does prevent failure, but not system security breaches.
True or False. System-level security maintains the quality of the software and protects the system from events and processes that can exploit or violate the system.
uniform resource locater
URL
25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?
Larger networks consist of a ____ network, or multiple LANs and WANs, and can be managed more productively through virtual network capability.
WAN
Synergy
Where people, information, and technology come together
because users have more flexibility than they do with VPN
Why has cloud computing become more popular?
it is a tunneling encryption protocol that secures wireless data transmissions
Why is WPA critical to wireless networks?
radio waves atmosphere
Wireless communication is transmitted over ____________________________through the _________________________.
False-Correct. Software as a service (SaaS) is proprietary software that is stored in the cloud and can be accessed by users who have a license.
[True/False] Software as a service is an example of software that is loaded on existing hardware.
Functional flow
_____________________ diagrams emphasize element behavior, function, and flow.
hot sites
a fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near real-time recovery of IT operations.
copyright
a grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
warm site
a site that provides many of the same services and options of the hot site, but does not include the company's applications.
What is a key advantage in business in having a web-based database rather than a client-server traditional database?
access from anywhere
c. Hardware firewall d. Effective alarm system
52. What are two security options that protect the hardware component of an organization's information systems? a. Cloud-based backup system b. Offsite, offline backup system c. Hardware firewall d. Effective alarm system e. Disk drive locks f. Antimalware system
turns raw data into meaningful information based on the criteria specified by the user.
What does the query function do?
100,000 kbps
What is the typical broadband data speed of a 4G network?
smart phones
What will soon surpass desktop computers accessing the internet?
it is virtually connected not physically
Why is a virtual network easier to manage during moves and changes
IPv4
addressing scheme that uses dotted-decimal notation of four sets of octets. Each set is 1 byte totaling four byte=32 bits
adware
alien software designed to help pop-up advertisements appear on your screen.
spamware
alien software that uses your computers as a launch platform for spammers.
centralized
all IT services are coordinate from one source; can be inflexible
Capacities for data storage are written in
bytes
Secondary storage
is also called external memory, which includes the hard drive and other permanent devices.
A core competency
is an activity for which a business is a marketplace leader. This activity is central to how the employees of the business work. A core competency that is not easy to imitate creates competitive advantage
Google "Voice" Search
is an example of an application that was developed to allow smartphone and PC users to speak search instructions into their computer instead of using a keyboard.
AppDynamics
is an example of the evolution of application technology that includes application intelligence and analysis platforms, which allow companies to mine and monitor data in order to spot trends.
Information management
is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences.
Information management technology
is concerned with the management of resources that facilitate access to information. These resources include computers and the technical infrastructures such as software, hardware, networking, and data center technologies, and staff that support them, including the technicians, analysts, project managers, and others. Information technology supports and implements management systems objectives in order to increase an organization's competitive advantage.
1G
is considered the first generation with an ability to carry 2.4kbps data rates.
A good first step in selecting a computer system
is defining a list of jobs that the computer system is expected to accomplish (e.g., identifying the problem), as well as the benefits to the user.
The modern communication system
is digital (whereas earlier systems were analog), and relies on various technologies to perform fast and reliably.
Sniffing
is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network.
Synergy
is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently.
information repositories
knowledge centers, that provide helpful information to remote suppliers, partners, employees, and customers for free or as a revenue-generating service.
One key role of a system administrator is to _____________. select a database vendor design networks maintain computer systems
maintain computer systems (Page 14)
Data admin subsystem
manage overall data base enfironment like security, backup/recovery
Just in time manufacturing
method for delivering product at the exact time a customer wants; ex target having products on shelves so all a customer has to do is buy it
Relational database
most common; data presented as a series of values in 2-dimensions called tables; can create several relationships
Input devices
mouse, keyboard, touchscreens, voice recognition, microphones, scanner, etc.
External Hardware
peripheral devices that can be connected to the computer for specific purposes:
Spreadsheet software
provides tools and resources used to create tables, which help to organize, sort, calculate, and analyze data.
Content editor
the person responsible for updating and maintaining website content.
Two key elements that make up the data warehouse are
the presentation and the staging area.
encryption
the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Cartography
the science and art of making an illustrated map or chart.
Input
the value of an information system is found how it "collects data"
Why do communications networks use defined rules or standards called protocols?
to ensure communication between packets is accurate and understood. n communications networks, data are transmitted by devices, travel over a medium, and are received by other devices. Protocols are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.
Big data can be structured, semistructured, or
unstructured
Networked development
where development and operations are planned, combined, and coordinated between international locations
website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network
worm
Analysis
Gather business requirements, prioritize them
demilitarized zone (DMZ)
a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet.
management and coordination, production, operation, supply, distribution, global customers, and global marketing
What are the major contributions or factors that drive global systems and the internationalization of business?
keep passwords private, be alert to impersonators trying to get your information, and read privacy policies.
What is a good management technique for securing information?
buyer profiles, behaviors, and demographics
What is considered when determining the target audience of e-commerce?
scope
What is included or defined in a project, including goals, deliverables, costs, and deadlines?
Master data are objects shared across the enterprise.
What is meant by master data in entity-relationship modeling?
copper building wire
What is not practical for telecommunications, especially with the advent of wireless?
Poor data quality affects system output, which severely impacts management decisions.
What is one consequence of poor data quality?
Only some of the core systems should be shared initially, and then gradually share some of the other systems, but only if they share key elements.
What is one management solution to overcome global information system challenges?
to educate stakeholders on the company's mission and vision, production information, and community efforts
What is the primary purpose for publishing company information on the internet?
trend analysis
What reveals the patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market?
data mining, modeling, statistics, OLAP
What tools and techniques does business analytics consist of?
The part-time employees used this old and unsecured technology to transfer files between the bookstore's server and their home computers.
FTP
[True/False] Laptops and desktops come only with dual core CPUs, while server computers come only with quad core.
False
True or false. Data are more secure when they are stored in the cloud.
False (Page 16)
Information
(i.e., typically output) is data that has been transformed by a predefined process (e.g., organization, format, calculations, etc.), through which it takes on an additional informing quality, that adds value for the end user recipient.
SMTP, IMAP and POP3
3 popular email protocols
router
A __________ is a networking device used to pass packets to the next network node until the packets reach the ultimate destination
Extensible markup language (XML)
A computer language similar to HTML, makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.
have the most experienced workers complete tasks on the critical path
ABC playground company has been asked to build new playground at a local elementary school. The project must be completed before the first day of school. What steps would increase the likelihood of finishing the project on time?
What term is used to describe the properties of data components?
Attributes
a tool used by management to track and monitor staff and organizational activities
Balanced scorecards are often used in business. What is a balanced scorecard?
3) Information Quality
Business decisions are only as good as the quality of the information used to make them. Information inconsistency occurs when the same data element has different values.
What is Business intelligence?
Business intelligence is the term used to describe the infrastructure, data, and software tools that help to analyze, organize, and control access to data in order to enable managers and others in the enterprise to make better and more informed decisions.
Technical feasibility
Does it fit within employee skills, what about system maintenance
digital pricing strategies
Freemium involves what?
viral
How does social media enable distribution of information?
secured access
May businesses require their employees use VPN to gain remote access to the corporate network. What is an advantage of VPN?
Information systems simplify business processes and remove unnecessary activities. Select the choice that would NOT help a business. Removing controls to employee processes Eliminating repetitive tasks Increasing accuracy Project planning and implementation
Removing controls to employee processes (page 10)
This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.
Rights approach
Explain the four primary traits that determine the value of information.
See below
Summarize the different software development methodologies.
See below
On premises (private cloud)
Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.
SNMP
Simple Network Management Protocol. Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.
Horizontal Structure
The information systems structure is horizontal as it encompasses many different business functions within an organization.
the user knowledge and background of target audience
When communicating, what is important for IT professionals to understand during the system development process?
Network Access Point
Where severalc onnections converge on internet
UNIVAC
_____ was the first general purpose computer for commercial use.
64-bit processors are able to process _________
billions of bits per second
Knowledge management
centralized mechanisms for storing and querying info
Most technology companies have a _____to manage their technology development. A _____ oversees information systems matters in companies that specialize in information technology or that rely on it for supporting their infrastructure. Choices: chief information officer chief technology officer
chief technology officer chief information officer (Page 14)
alien software
clandestine software that is installed on your computer through duplicitous methods.
Assume you are are explaining the types of servers involved in databases to a group of coworkers. You note that a _________ is a dedicated computer that stores database files and database management systems.
database server
Metrics
measures used to indicate progress or quality
transport layer security (TLS)
see secure socket layer.
Compliance
the act of conforming, acquiescing, or yielding.
risk analysis
the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each betting compromised with the costs of protecting it.
Search engine optimization (SEO),
the process of ensuring the site is visible and highly ranked in search results, is a high priority.
privacy
the right to be left alone and to be free of unreasonable personal intrusion.
biometrics
the science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.
Processing
the value of an information system is found how it "converts that data"
five competitive forces
threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and intensity of competitive rivalry.
Supply Chain management system
tracks inventory and informtion among business processes
Genetic algorithms
trian and error to develot increasingly better solutions to a problem
Chipless RFID tags
uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without drying the chip.
data warehouse
What enables analytics of operational data from various sources?
d. A graphical representation of the relationship between components
15. What is process modeling? Pg 364 a. An application that changes inputs into outputs b. A database that is used to consolidate business operations c. An integrated series of processes d. A graphical representation of the relationship between components
DHCP
Dynamic Host Configuration Protocol. A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network.
is a process by which data is encoded so that only persons with a decryption code may unlock and retrieve stored messages.
Encryption
What is one tool a business can use to map process requirements and data to develop a supporting relational database?
Entity relationship diagram
Before selecting software applications, what requirements need to be reviewed?
Hardware
dumb terminals
Hybrid systems called thin- or zero-clients. Use input and output devices, such as a monitor, mouse, and keyboard, but connect to a centralized server for processing.
HTTPS
Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server.
Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities
Location-based services (LBS)
otherwise known as CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.
Primary Storage
government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.
Nation state
production and maintenance
System development life cycle (SDLC) consists of 6 stages. What is the last stage?
User adoption rates
System implementation success depends on a number of factors, but true system success is measure by :
diagrams, charts, and maps
Systems design models typically consist of:
False - models are NOT coded they are diagrammed
T or F: A model is an image of an item, system, or process that we code in order to imitate, follow, or duplicate whatever the model represents.
True or false. Enterprise resource planning involves utilizing computer technology to link various aspects of a business, including human resources, accounting, and inventory control.
True (page 12)
conversion, development, testing
What are the systems implementation phases?
Schema is a planned design of the data organization.
What is a database schema?
allow easy access to information
What is a key benefit to business organizations for using a relational database?
monitor network traffic
What is the purpose of a network sniffer?
cybercrime
illegal activities executed on the internet.
Bridges
in network topologies are used to connect or link separate networks together, but do not have data switching capability.
Carbon emission
includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems.
Intelligent agents
incorporates AI capabilities like learning and reasoning
Primary key
uniquely identifies only one key, ex employee id
secure socket layer (SSL)
(also known as transport layer security) an encryption standard used for secure transactions such as credit card purchases and online banking.
Top level domain
.com .net, etc.
Web 2.0
2nd generation of web focuses on online collaboration
b. Acceptance and filtering
69. What is the first step of the change management process? a. Building, testing, and implementing b. Acceptance and filtering c. Approval d. Classification e. Post-implementation review
firewall
A ____________ can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion
schema
A _____________ is a planned design structure database
internet
Among all the connections- internet, intranet, and extranet- which is the most widely used channel for business?
What is the difference between an analog signal and a digital signal?
Analog signals are continuous while digital signals are not continuous. Correct! Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms.
Business Intelligence
Business Intelligence: Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making EX: Lowest sales per week with the economic interest rates Best selling product by month compared to sports season and city team wins and losses.
This person, in partnership with the Board, is responsible for the success of Fred's Foundation, Inc. Together, the Board and this person assure Fred's Foundation's relevance to the community and determine the company's mission and vision statement. This person provides direction and enables the Board to to carry out its governance functions. Which of the following job titles best fits this description? CIO CFO CEO COO
CEO (Page 14)
The ___________ is in charge of the people who design, build, use, and manage information technology in the organization. CSO CEO CIO CTO CFO
CIO (Page 14)
There are many data management challenges created by big data. Which of the following items is NOT one of those challenges? Variety Size Cost Speed
Cost
Chapter 34 in COS, 32 in ebook
Global Trends
standards
Global business challenges are typically no worse than domestic business challenges except for the distance. What problem can be alleviated by knowing the challenges up front?
What company's computer popularized the term PC?
IBM
facilitate communication
IPv4 was created and standardized in the 1970s by the original ARPANET group to _______________ __________________
Biomimicry
Learn how people based systems behave, predict how they will behave, improve human systems to make them more efficient and effective
Chapter 26 in COS, 24 in ebook
MIS Infrastructures
or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system.
Motherboard
What kind of database management system enables businesses to create new records and update and delete records, providing real time information for decision making?
Online transaction processing
Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping
Prototyping
GANTT CHART
SEE PIC
PERT CHART
SEE PIC
Network Topologies
See Pic
To increase the number of unique IP addresses
The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?
Three years
The main agenda of information systems is expected to change every three years due to the dynamic nature of IS functions.
a data warehouse subset focused on a single area or function
What is a data mart?
Systems Software
an operating system, which will direct and control the hardware components of the IS
threat
any danger to which an information resource may be exposed
Horizontal applications
are more popular and general purpose, such as word processing, spreadsheets, and presentation software.
Operational processes
can outline the procedure for taking customer orders.
A project manager is responsible for _________________. developing organization goals communicating the project plan choosing strategic projects deciding who is a stakeholder
communicating the project plan (Page 14)
Critical path
estimates the shortest path through the project ensuring all critical tasks are completed from start to finish. The red line displays the critical path for the project.
Normalization
process of removing redundancy and ensuring consistency
Which organizational behavior leads to information system implementation failures? increased management layers resistance to change alignment of IT and business goals increased bureaucracy
resistance to change (Page 15)
Chief security officer
responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses.
TCP/IP stands for Transmission Control Protocol/Internet Protocol,
shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.
Computer-aided software engineering (CASE)
software suites that automate systems analysis, design, and development.
Semmi-structured
some measurable elements, some not measurable
Global information systems facilitate global business strategies by connecting and providing multiple modes of _____communication such as teleconferencing and instant messaging, and _____ communication, such as email and overnight mail. Choices: Asynchronous Synchronous
sychronous sychronous (Page 17)
Differentiation
Offer a product that is new and different
When designing a database, you must consider its use or function. One type of database is OLAP. What does it stand for and what is it used for?
OLAP stands for online analytical processing and are databases used to assist decision making.
Open System Interconnection seven
OSI Stand for________________ and consists of ___________ layers
historical data
What does predictive analytics use to better understand customers and other business entities in order to define areas of opportunities or areas of risks?
the unpredictable and less systematic aspects of decision-making
What does the behavioral model hope to a accomplish in management decision making?
the speed required to process or analyze big data
What does velocity mean when describing big data?
hierarchical database
Tree style with root nodes and child nodes; not easy to query
quality
What is the variable in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk?
a comprehensive list of all activities needed to complete a project.
What is the work breakdown structure (WBS)?
Query language
What is used to retrieve specific data from a database?
pointers (or linked lines)
What is used to show the relationship between data fields and tables in entity-relationship models?
structured
What kind of decisions involve an established procedure, are repetitive and routine, and can be handled in the same manner each time?
hierarchical
What kind of database is a tree-like structure?
telegraph technology
What led to the innovation of the telephone?
end user development
What method uses 4th generation computer languages?
help align the organization with business objectives
What must an effective business intelligence platform accomplish?
data cleansing
What occurs during the transformation step in ETL?
5-12 Mbps
4G data networks offer download speeds of:
Fine granularity
Info based on specific details
Why has information technology become critical to the success of business enterprise in the last 20 years?
Information technology has automated business operations and changed the economics of information. Information technology enables automation and faster response to market needs.
What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped system security D. Inability to adhere to taxation rules or regualtions
Product or service limitations
Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance
Production and Operations (page 10)
risk transference- shifting the risk to someone or something else.
Purchasing homeowner's insurance in case of a fire or hurricane is an example of what?
Compare LANs, WANs, and MANs.
See Pic
reporting- generate reports that have information or business intelligence
What are OLAP databases used for?
denial-of-service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
Tactical activities
are those that are performed to accomplish the overall strategy.
Which field continues to grow due to privacy threats and will be one of the most relevant in an Internet-based technology? Software engineering Web design Cyber security
Cyber security (Page 14)
VoIP
Delivers audio and sometimes video information in digital form using the packet switching technique
b. Planning d. Designing c. Coding a. Testing e. Listening
41. Place the phases of Extreme programming (XP) in order from first (1) to last (5). a. Testing: b. Planning: c. Coding: d. Designing: e. Listening:
a. Activity c. Resource
16. What are two key components of a business process? a. Activity b. Diagram c. Resource pg 360 d. Model
Database
A database maintains info about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
ERD (entity relationship model) describes the data and map processes to data requirements
A database schema can be represented by which model?
As a database administrator, you must avoid inconsistencies, which cause errors and integrity issues. Database inconsistencies are avoided by implementing what concept?
Referential integrity
Convergence
The ability for a telecommunication network to carry voice, data, and video is called
convergence
The ability for a telecommunication network to carry voice, data, and video is called
asynchronous
These are forms of ________communication: Bulletin boards, blogs, and streaming videos
The major components of projects
Time: the time allotted to complete the scheduled tasks of the project Scope: the specifically defined output or deliverable(s) intended at the end of the project Resources (cost): the necessary human (laborers), capital (equipment), and liquid (cash) assets necessary to complete the project's output Quality: the degree of satisfaction by which each of the above components is satisfied
public, private, and hybrid
What are the classifications of cloud computing?
resistance to change, user, technical ability
What are the factors that must be considered when implementing anew information system?
transnational, multinational, franchisers, domestic exporter
What are the for main global business strategies that form a global firm's organizational and information systems structure?
distributed denial-of-service (DDoS) attack
a denial-of-service attack that sends a flood of data packets form many compromised computers simultaneously.
Reliability
how consistently a system performs
Sarah is doing a presentation on big data at a company lunch and learning to help employees understand the ways IT can help the business. Which of the following is the best definition of big data?
Big data is used to describe large, complex data sets.
Design stage
Design technical architecture (hardware, software, telecommunications equipment), design system model, draw graphical representation of a design
Which of the following scenarios would benefit the most from a knowledge-based system? John has a lawn maintenance company and when he gets very busy, he hires extra workers to help with mowing, blowing, and trimming people's yards. It is not unusual for him to have a new helper each week during the busy season. Fred has worked for Selma's Training services for 20 years and is ready to retire. The company will be hiring a new employee to take over Fred's responsibilities. It will take the new employee a while to learn the many new job responsibilities.
Fred has worked for Selma's Training services for 20 years and is ready to retire. The company will be hiring a new employee to take over Fred's responsibilities. It will take the new employee a while to learn the many new job responsibilities. (page 12)
petabytes
What is the typical data size of big data?
NAT - network address translation
___________________ was introduced to allow private users to redefine network addresses to assign their own addresses, even within complex networks.
Managerial Consideration
business processes, strategies, and leadership. (solving business problems)
Transaction processing systems TPS
collect, store, update, and retrieve transaction data within an organization. Common business transactions include employee payroll, customer sales, and supplier payments. One of the earliest types of IS, are developed to decrease costs, decrease processing time, and increase accuracy. achieve these benefits by automating and recording routine business transactions that are too tedious and monotonous for front-line employees to process manually in an effective and efficient manner.
Portals and connections
consist of applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.
radio frequency identification (RFID)
enables a company to track merchandise or inventory by radio frequency signals, eliminating the need to physically handle each item during the inventory process.
electronic communications
examples include email, instant messaging, and video teleconferencing, which help a business to operate, reduce the need for travel, and even allow employees to work from anywhere.
Porter's Five Forces
existing competition, threat of new entrants, power of buyers, power of suppliers, threat of substitution
Threat of Substitute Products or Services
f there are lots of choices for consumers for a product, then this threat is high. For example, consumers can buy e-books instead of hard copies of a book and digitized music instead of CDs. These options are usually cheaper, and the quality is high.Switching from one product or service to another similar product or service with little cost.
chief technology officer (CTO)
has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. The ___ focus is on day-to-day operations, overall implementation of technology strategies, and efficiency of the IT systems. In most corporations, the ___ reports to the CIO.
Organization Consideration
include business procedures, culture, and organizational hierarchy. (solving business problems)
Operational activities
include the repetitive activities that occur at a basic level within the function.
Materials Requirement Planning II
included MRP and accounging and finance
What is a network host? This is also known as data terminal equipment in computer networking hardware.
is a physical node with an IP address.
radio frequency (RF) site survey
is a process used to determine the number and placement of access points that provide adequate coverage throughout a facility.
FTP stands for File Transfer Protocol
is a protocol used to transfer files from one computer to another
value chain
is a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace.
computer software
is a set of machine readable instructions that directs a computer.Computer programmers create __________ _________ to make computers execute tasks; this includes the operating system and applications on a computer.
Application software
is a set of one or more programs that allows a computer user to perform a group of coordinated activities, functions, or tasks.
Culture
is our collective experience, characteristics, and knowledge as a society and is important in global business. Having a global mindset and the creation of a global business culture will help businesses expand and become more profitable.
microprocessor
is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.
Knowledge
is the practical application of the information given.
supply chain
is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.
In which type of organization would information system development appear to follow the sun, with development occurring on projects until such time as the work might be handed off to the next division or location as their day ended? multinational exporting
multinational (Page 17)
The term Internet of Things (IoT)
refers to a future trend in which all devices—including appliances, cars, networks, and systems—will be connected to the Internet, which will facilitate servicing automation and e-commerce.
You are working on a project with a colleague in Los Angeles, and you have a technical question. You see that your colleague is currently logged into the company's instant messaging system, so you send her a message. She replies within one minute with the needed information. This is an example of ______________ communication. asynchronous synchronous
synchronous (Page 17)
dashboards
used to present information from multiple inputs in order to enable managers and staff to make better decisions and use of their time.
Porter's Three Generic Strategies
1) Cost Leadership 2) Differentiation 3) Focused Strategy Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either cost leadership or differentiation.
Transmission Control Protocol/Internet Protocol
TCP/IP
Network economics:
The cost of adding another business participant to a business venture is small, and the potential gain is great.
common functionalities of business intelligence
What are measurement, analytics, reporting, collaboration, and knowledge management?
the internet
What is the biggest impact to global business?
RFID WSNs
_________are typically used in logistics and inventory management applications whereas _______________are typically used to monitor physical or environmental conditions.
WPA2
________has replaced WPA as the standard Wi-Fi encryption protocol.
least privilege
a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
it provides high level information in KPI format for executive level monitoring and decision making.
How does executive management use executive support systems (ESS)?
By providing information about the company's vision, mission, and community efforts.
How does the internet help to improve a company's reputation?
Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.
How is voice or video information carried on digital networks?
Operating systems, programming languages, and computer hardware
In what areas should a systems analyst be a subject matter expert? Embedded software, databases, and microchip Operating systems, programming languages, and computer hardware Network design, electronics, and databases
Data mining
a logical collection of information gathered from many different operational databases, used to create business intelligence
visual private network (VPN)
a private network that uses a public network (usually the internet) to securely connect users by using encryption.
risk transference
a process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.
What is the name of the notation used to diagram the relationship between entities?
Crows foot
Which database model connects or relates different data tables using common fields called primary keys?
Relational
True or false. One benefit of a supply chain management system is to plan daily operations of the company.
True (page 12)
jargon and terminology
What should be avoided in effective written communication?
Operational management
day to day operations
Conditional formatting
highlights individual cells that match criteria
Consolidation
involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
trap doors
see back doors.
creating a believable scenario (e.g. whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks, and asks them to respond with their credentials in order to ensure their validity.
Pretexting
Chapter 20
Developing a 21st-Century Organization
a. Purchasing product parts
10. Which activity is an example of a business process? Pg 80 a. Purchasing product parts b. Signing accounts payable checks c. Maintaining inventory d. Calling a customer
single character=______ bits
8 bits
Risk reduction
Acting to reduce the potential for a risk to occur or affect damage to the project.
A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems
BI
Online Analytical Processing
BI info about customers; uses analytics, integratd use of technology tools and stats to create real-time high quality info
What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card
CPU
Graphin information system
DSS method, displays map-based infor
Output
Processed data into meaningful and actionable information that forms the basis of action.
targeting
Social media benefits to businesses are made possible because social media offers both location specific and time time specific ____________________ .
True or False. Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.
True Correct! Data packet switching can be broken up and sent throughout the entire network to be reassembled at the destination.
Describe Web 3.0 and the next generation of online business.
Web 3.0 is based on "intelligent" web applications using natural language processing, machinebased learning and reasoning, and intelligent applications. Web 3.0 is the next step in the evolution of the Internet and web applications. Business leaders who explore its opportunities will be the first to market with competitive advantages. Web 3.0 offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics.
False-small biz can run with just a router
You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?
False-Managing software licenses is a concern for modern organizations because licenses usually have expiration dates or limited downloads and the free software is more limited in capability.
[True/False] Because a lot of free software is available, managing software licenses is not a concern for modern organizations.
core router
A _____________________ is used to connect the enterprise to the Internet in the backbone in order to handle large amounts of data traffic
What is rule induction?
A third type of data mining is rule induction, which is a technique based on statistical importance.
Frank works as a database administrator and focuses a lot of time and attention on data integrity and the quality of data in the database. What are some of the desirable characteristics of data integrity that he should look for in his work? (Select all that apply.) Accuracy Duplication Consistency
Accuracy Consistency
What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar
C. Podcasting
True or false. Differences in language, culture, and technology do not present a challenge for a company implementing a global information system.
False (Page 17)
is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.
Microprocessor
Partner relationship management
Relationship between business and channel partners
Data design
User doesn't see it, analyst identifies the underlying structures of the system
project structure, size, and team technical background
What are 3 levels of risks associated with system design and implementation?
Competitive click-fraud
a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
risk management
a process that identities, controls, and minimized the impact of threats, in an effort to reduce risk to manageable levels.
Competitive advantage
a product or service that an organization's customers place a greater value on than similar offerings from a competitor.
cyberterrorism
can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
Design
develop as many solutions as possible
Electronic communication consists of
emails, instant messaging, audio clips, video communications, and unified communications.
social engineering
getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
software engineer
higher level programmer. Someone in this position not only writes the code but is responsible for designing a new application, developing specifications, overseeing the implementation, and supporting users after implementation.
Cloud fabric controller
individual who monitors and provisions cloud resources similar to a server administrator at an individual company.
A customer relationship management system provides a business with the opportunity to: analyze common contract elements to streamline the contracting process. allow customers to know which products are currently available by displaying them on a website. integrate information about each client's likes and dislikes to be able to tailor conversations with them.
integrate information about each client's likes and dislikes to be able to tailor conversations with them. (page 12)
A virtual company _____ Choices: is not limited by physical location or geography provides only virtual services
is not limited by physical location or geography (page 11)
Production and operations
is responsible for converting inputs, such as raw materials and labor, into useful outputs, such as products and services.
accounting and finance department
is responsible for managing the flow of cash through an organization
System aviailability
measure of reliability; average amount of time a system is usable
A software package is a
prewritten set of software programs that performs a specific business function, such as accounting or order management.
exposure
the harm, loss, or damage that can result if a threat compromises an information resource.
WAN stands for wide area network
typically connects business campuses consisting of computer systems across large distances. transmitted through the "cloud,"
LAN stands for local area network,
typically connects computer systems of an organization or a floor of a building
The impact of the Internet on the scope of information systems is large. Which of the following statements about the impact of the Internet is false?
**1.The Internet has created a simplified network of client-server computers. 2.The Internet is an enabler to business intelligence and data mining tools. 3.At the very least, the Internet is little more than another channel through which businesses do business. 4.The Internet's effect on the scope of information systems is that of a multiplier. Correct! The impact of the Internet has resulted in a very extensive and complex interconnected network that spread out over the entire globe.
Identify the three primary areas associated with an information MIS infrastructure
- Backup and Recovery - backup: exact copy of sys info; recovery: get it up and running after crash - Disaster Recover Plan - details process for recovering info - Business Continuity Plan - HOW a company recoveres and restores operations
Three components of sustainable MIS and their business benefits
- Grid computing: collection of computers that are geographically dispersed, that are coordinated to solve a common problem. With grid computing, a problem is broken and sent to many machines allowing for faster problem processing that could occur with a single system. - Virtualized computing - creates multiple virtual machines on single device. - Cloud computing - is a model for enabling on demand network access to a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned with minimal management effort or service provider interaction. Cloud computing connect people and resources from any location where an internet connection is available.
Identify the environmental impacts associated with MIS
- Increased energy consumption - Increased carbon emissions -Increased electronic waste
Major structures and functions used by the DBMS include:
-Data dictionary: defines and manages the data types and structures that dictate how the database is organized. -Data management: the creation, update, and deletion of the data within the database. -Data retrieval: using queries, data is retrieved and combined. -Data administration, including maintaining data integrity: recovering corrupted information, and managing users and group access to the data.
Three hierarchical levels may exist in the development of entity-relationship diagrams:
-conceptual data models -logical data models -physical data models
select two other types of primary storage
1-Cache and on-board memory 2-CD and DVD 3-Flash drive and hard drive (Cache and on-board memory are high-speed memory and are considered primary storage since they are internal and easily accessed by the CPU.)
a. Data b. Information c. Information d. Data
1. Classify each example as being either data or information. a. The price of a book at a bookstore: b. The average final exam grade for a class: c. The top-selling book for the month: d. The grade achieved on a final exam:
Which of the following is NOT a computer network hardware device?
1.Hub 2.Switch 3.Sniffer correct 4.Router
a. Fully automated b. Partially automated c. Manual d. Manual e. Partially automated
11. Classify each business as fully manual, partially automated, or fully automated. Pg. 13-14 a. Nationwide office supply store: b. Fast-food franchise: c. Farmer's market produce vendor: d. Small owner-operated bakery with only one location: e. Boutique retail store that features locally produced products:
b. Suppliers, customers, and inventory are items of value represented in a business process.
12. Which phrase explains the relationship between business processes and information systems? a. Business process modeling and its components make information system design more difficult. b. Suppliers, customers, and inventory are items of value represented in a business process. c. Business processes provide the information required for creating an information system. d. Organizations create an information system regardless of the business process model.
d. Decision
14. What does a diamond shape represent in a business process model diagram? Pg 364 a. Control flow b. Data c. Start d. Decision e. Activity
b. To solve a major problem c. To achieve goals and objectives
18. What are the two main reasons that organizations create information systems? Pg ix 403 a. To develop an organizational strategy b. To solve a major problem c. To achieve goals and objectives d. To address tactical challenge e. To formulate an organizational mission
c. Value chain
19. Which management model was developed by Michael Porter to help organizations identify opportunities to save money and integrate information systems? a. Competitive strategies b. Five forces industry analysis c. Value chain d. Generic strategies
c. Information is created when meaning is applied to data.
2. What is the relationship between data and information? a. Data is defined as meaning applied to information. b. Data consists of processed information. c. Information is created when meaning is applied to data. d. Information is to data like gasoline is to an automobile.
a. Threat of new entrants
20. Which component is part of Porter's five forces industry analysis model? a. Threat of new entrants b. Automation c. Generic strategies d. Value chain
a. Customer bargaining power
21. Which component of Porter's five forces industry analysis model describes an influence that can restrict an organization's ability to raise prices without losing customers? a. Customer bargaining power b. Buyer cost switching c. Buyer substitution propensity d. Customer brand loyalty
b. Narrow differentiation
23. A small business wants higher profits and does not want to compete with larger businesses for lowest cost. Which strategy from Porter's generic strategies model should the business implement? a. Narrow cost leadership b. Narrow differentiation c. Broad differentiation d. Broad cost leadership
b. Operations c. Inbound logistics f. Service
24. Which three activities are primary activities of Porter's value chain model? a. HR management b. Operations c. Inbound logistics d. Procurement e. Infrastructure f. Service
a. Primary b. Support c. Primary d. Support
25. Classify each activity by its value chain level. Primary or Support. a. Marketing and sales: b. Procurement: c. Operations: d. HR management:
a. Automation
26. An organization wants to gain a competitive advantage by maximizing staff efficiency. Which method should the organization use to accomplish this goal? Pg 12 a. Automation b. Broad cost leadership c. Prototyping d. Broad differentiation
d. Management preferences c. Technological changes
27. What are two primary factors to consider when developing a new information system for an existing organization? Pg 15 a. Personnel requirements b. Minimum asset requirements c. Technological changes d. Management preferences
a. Configuration control
28. Which term describes the use of policies, practices, and tools by systems developers to manage a project's resources? Pg 383 a. Configuration control b. Critical path c. Work breakdown structure d. System development life cycle e. Agile development
d. Decreased communication between the company and its clients
29. What is a possible drawback of outsourcing the development of an information system? Pg 415 a. Increased cost of employee benefits b. Increased cost of facilities c. Decreased employee productivity d. Decreased communication between the company and its clients
Web 2.0
2nd generation of web focusing on online collaboration, users as both crators and modifiers of content
agile - adaptive planning and fast delivery. scrum(incremental form of agile) - recognizes that customer needs and wants can change throughout the project. Prototyping -quick modules that can be tested, deployed, and fixed.
3 options that Companies have different for what method to use when developing an information system and their benefits
sniffing, spoofing, probing
3 risks to wireless networks
b. Procedures
3. Which information system component provides the instructions for using a system or for backing up system data? Pg10 a. Hardware b. Procedures c. Software d. People e. Data
b. To provide evidence of usability
30. What is the purpose of prototyping, in the context of systems development? a. To model nonfunctional system elements b. To provide evidence of usability c. To provide indirect user experience d. To lower development costs
d. Analysis
32. Which systems development life cycle phase includes defining specific system functions and application operations to meet project goals? Pg 373 a. Planning b. Design c. Implementation d. Analysis e. Maintenance
a. User involvement provides valuable feedback to developers b. It increases user expectation of the final system
34. What are two benefits of using a prototype approach for information systems? a. User involvement provides valuable feedback to developers b. It increases user expectation of the final system c. The final system is likely to meet user requirements d. Limited functionality of a prototype allows users to focus on singular tasks
a. i. The ability to appear in different forms b. c. d.
36. Match each term on the left with its corresponding characteristic on the right as it relates to object-oriented systems development. a. Polymorphism i. The ability to appear in different forms ii. The act of storing data and procedures together iii. The ability to interact with other entities b. Encapsulation i. The act of storing data and procedures together ii. The ability to appear in different forms iii. The act of storing similar components together c. Classes i. Entities that can interact with one another ii. Collection of similar components iii. Data and procedures that are stored together d. Objects i. Entities that appear in different forms ii. Entities that can interact with one another iii. Collections of similar components
a. Prototyping
37. An IT team is trying to identify the appropriate methodology for an upcoming development project. The methodology must have sample business requirements and support a narrow project scope, a short development time frame, and a low number of users. Which development methodology fits the requirements? a. Prototyping b. Rapid application development c. Object-oriented development d. Extreme programming (XP)
a. Iterative
38. What is a characteristic of the activity planning process when using agile systems methodology? a. Iterative b. Strategic c. Centralized d. Predictive
c. The project is collaborative
39. What are two characteristics of a project that uses an agile method such as extreme programming (XP)? a. The project develops incrementally b. The project requires large development teams c. The project is collaborative d. The project has a rigid schedule
c. Procedures d. Data
4. What are two components of a business information system? pg 10 a. Strategic decision b. Information c. Procedures d. Data
a. Defining a mission statement for an organization e. Replacing legacy systems with new systems that use emerging technologies
42. What are two purposes of information systems management? a. Defining a mission statement for an organization b. Maintain data integrity within an organization c. Coordination the release of public relation information d. Formulating functional requirement for a business unit e. Replacing legacy systems with new systems that use emerging technologies
a. i. Keeps systems from becoming obsolete by deciding to replace legacy systems with new systems that use emerging technologies b. ?
43. Match each group on the left with the corresponding information systems management task(s) it performs on the right a. IS steering committee i. Keeps systems from becoming obsolete by deciding to replace legacy systems with new systems that use emerging technologies ii. Owns the hardware, installs and maintains the software, and manages permissions. iii. Endures a well-planned, approach to all information needs. b. IT department i. Keeps systems from becoming obsolete by replacing legacy systems with new system that use emerging technologies ii. Owns the hardware, installs and maintains the software, and manages permissions. iii. Endures a well-planned, approach to all information needs.
b. Don't release any information on the customer's co-worker, but explain the return policy in case they find they've made duplicate purchases.
45. A pharmacy customer wants to purchase an over-the-counter medication, but only if his coworker did not make a similar purchase earlier the same day. The customer asks the pharmacy clerk to retrieve the coworker's purchase records to verify whether the medication was purchased. How can the clerk assist the customer in an ethical manner? a. Require the customer to sign a waiver of responsibility b. Don't release any information on the customer's co-worker, but explain the return policy in case they fin they've made duplicate purchases. c. Require the customer to provide the coworker's personal identifiable information d. Provide the coworker's purchase records to the customer because the medication does not require a prescription
c. Ensuring information security d. Ensuring information accuracy
46. What are two ethical concerns in regard to information systems? a. Preventing employee discrimination b. Filling government paperwork c. Ensuring information security d. Ensuring information accuracy
a. Use and promote specific rules and guidelines for each line of business d. Conduct formal ethics training
47. Which two approaches can business mangers use to help manage ethics? a. Use and promote specific rules and guidelines for each line of business b. Focus training on the decisions that have the most customer interaction c. Form cross-department ethics committees d. Conduct formal ethics training
b. Physical
49. The electricity in a company's main office building often fluctuates. Which type of threat does this present to the company's information systems? a. Environmental b. Physical c. Natural disaster d. Insertional human threat e. Unintentional human threat f. Unintentional technical threat
c. Coarsely granular
5. Which type of information do executives require to make strategic decisions? pg. 38 a. Speculative b. Detailed c. Coarsely granular d. Finely granular
d. Theft of computer equipment
50. Which threat source is categorized as an intentional physical threat to information systems? a. Terrorist attack against company headquarters b. Purposeful flooding of an office c. Theft of other users passwords d. Theft of computer equipment
b. Optical media
53. A company is developing a backup strategy for small amount of data. Backup files must be created and stored at the organizations head-quarters, and copies must be stored offsite. Which backup should the company use? a. Magnetic tape b. Optical media c. Cloud data storage d. Semiconductor data storage
a. Magnetic tape
54. A company is developing a backup strategy for large amount of data. There are no specific data restoration time requirements, but the company must minimize costs. Which backup media should the company use? a. Magnetic tape b. Cloud data storage c. Optical media d. Semiconductor data storage
a. Credit card number c. Driving license number d. Home address
57. Car rental agencies collect personal information and payment information from customers. Which three types of information should be protected? a. Credit card number b. Reason for rental c. Driving license number d. Home address e. Age range f. Make, model, and color of car
b. Internal financial information
58. Which type of corporate information should be protected because it would be useful to the company's competitors? a. Annual shareholder reports b. Internal financial information c. Better business bureau reports d. Employee work contact information
a. Protect the company and its customers b. To limit the possible damages
59. What are two reasons that employees should report all security compromises? a. Protect the company and its customers b. To limit the possible damages c. To prosecute the offender d. To warn upper management
a. Software
6. Which type of component controls the system resources and productivity applications of an information system? a. Software b. Data c. Hardware d. Procedures e. Information
a. To prove the effectiveness of severity policies and procedures c. To bring attention to a potential security breach d. To limit damages to the company
60. Jill made plans to attend a family reunion. Jill's coworker, Mary, exercised seniority and took her vacation during the week of the reunion, so Jill could not attend the event. Jill and Mary share a cubicle. Jill recently overheard a telephone conversation in which Mary implied that she plans to leave the company soon. Jill has also seen Mary copy files from her office computer to portable USB drives. What are three reason Jill should report Mary to her supervisor a. To prove the effectiveness of severity policies and procedures b. To improve her annual review c. To bring attention to a potential security breach d. To limit damages to the company e. To even the score with Mary about last year's vacation f. To get Mary transferred to another cubicle
d. ID badges
61. Which security management technique helps to protect a physical workplace from unauthorized personnel access? a. Cubicle design b. Firewall c. Unique ID's and passwords d. ID badges
d. Software firewall
62. An information system administrator connects from his workstation to several remote servers that host sensitive and protected data. What should the administrator use to protect against web-based hackers and malware? a. Biometric authentication b. Smart card authentication c. Frequently changed password d. Software firewall
b. Record the issue c. Categorize the issue e. Check the issue against known issues a. Track the issue d. Close the issue
63. Place the basic problem-management process steps in order. a. Track the issue: b. Record the issue: c. Categorize the issue: d. Close the issue: e. Check the issue against known issues:
d. Record the incident b. Categorize the incident e. Verify whether the incident is part of a known problem a. Track the incident c. Provide closure
66. Place the techniques a customer service representative should use to manage problems in chronological order from first (1) to last (5). a. Track the incident: b. Categorize the incident: c. Provide closure: d. Record the incident: e. Verify whether the incident is part of a known problem:
Wireless technology can be described in terms of technological evolution and generations. Which of the following is not a wireless technology generation?
6G Correct! The next cellular wireless network will be the fourth generation.
b. Data
7. Which business information system component can be processed and then converted into meaningful information? a. Hardware b. Data c. Procedures d. Software
d. Acceptance and filtering c. Classification a. Approval e. Building, testing, and implementing b. Post-implementation review
70. Place the stages of the change management process in order from first (1) to last (5). a. Approval: b. Post-implementation review: c. Classification: d. Acceptance and filtering: e. Building, testing , and implementing:
d. Computer user
8. Which role represents the first step toward mastering computer skills? a. Expert user b. Super user c. Power user d. Computer user
Describe an example in a business where a strategic information system was implemented. How did this provide a key competitive advantage in the marketplace?
A Florida electrical distributor stocks thousands of products from hundreds of manufacturers. The company recently implemented a new system to streamline the process of customer orders. Instead of looking at all of the individual manufacturer inventory reports, the company now merges data from all of its manufacturers. Sales reps are now able to recognize ordering trends and make better predictions about future inventory needs. This new system has improved customer satisfaction, increased sales, saved employee time, and increased annual profits. The company is getting the products into the hands of the customers faster and cheaper than any of its competitors. (page 11)
information system
A ______________ consists of all the components that work together to process data into useful information.
denial-of-service
A ______________________ attack is a means to disrupt, interrupt, or suspend services of an Internet host computer. These attacks do not turn off the host, but instead overwhelm the host with queries, rendering the website unavailable.
Systems Analyst
A _____________________________uses analysis and design techniques to solve business problems, then develops and implements the systems using information technology.
work breakdown structure (WBS)
A ___________________________is a broken down list of all deliverables showing what the customer will get at the end of a project. The ____________ concept was developed along with the Program Evaluation and Review Technique (PERT) by the U.S. Department of Defense in 1957.1
What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly
A blend of computers and wireless telecommunications technologies.
Which of these choices best describes an ERP system? A bookkeeper enters information into the bookkeeping system, which feeds the necessary information into the accounting system, where the accountant can perform his or her tasks and run financial reports for top management. A foreman conducts a warehouse inventory using a mobile barcode scanner, which compiles product quantities and types in a mobile database. He then takes the mobile scanner to management where the barcode data are uploaded into an inventory database. A receptionist and a secretary at a law firm both input and access client information in separate databases, related to legal issues, in order to complete their specific tasks.
A bookkeeper enters information into the bookkeeping system, which feeds the necessary information into the accounting system, where the accountant can perform his or her tasks and run financial reports for top management. (page 12)
The rules allow communication systems to interact and communicate with and transmit information to each other. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.
A communication protocol is defined as a set of rules that does what?
Large business enterprises require core routers in their telecommunications computer network to support multiple telecommunications interfaces of the highest speed. What else does a core router do?
A core router operates in the Internet backbone.A core router is very powerful (and expensive), and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.
A business owner opens a new store and begins collecting customer information at the register. This information includes email addresses and other information that the customers are willing to share. The business owner also starts to create paper contracts for special orders that involve embroidery and personalization. These papers are stored in a folder in the store location. Which of the following systems will help the business owner manage their this type of information? Management information system (MIS) A customer relationship management (CRM) system An enterprise resource planning (ERP) system
A customer relationship management (CRM) system (page 12)
Zappos
A data driven website model
What is a data quality audit?
A data quality audit should be executed to ensure that a database efficiently, consistently, and accurately accepts, stores, and produces information. The data quality audit helps database administrators to find and ascertain the source of problems caused by poor data quality.
Companies rely on data to drive information and decision making. Why would a business or enterprise implement a data warehouse?
A data warehouse improves decision making.
Consumers use data warehouses everyday, many times without even knowing it. Facebook is an example of a data warehouse that most consumers use on a daily basis. Which of the following best defines a data warehouse?
A data warehouse is a collection of business data from multiple systems used for data analysis and mining.
levels
A decision tree tool is not viable when data contains a different number of
Mainframe
A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.
node
A network host is a ___________________________ in a data communications network and is assigned an IP address.
Business ecosystems
A network of businesses, such as suppliers and distributors, are involved in providing delivery of a service or product through cooperation. The ecosystem must be flexible and adaptable to meet market demands. The rapid changes in technology have caused businesses to work together, aligning talents and resources, to reach a common goal or vision in a mutually beneficial relationship.
ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.
A network protocol designed to handle broadband integrated services such as voice and video is
Why do home office or small business computer networks sometimes use a peer-to-peer topology?
A peer-to-peer topology allows file sharing between computers.Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.
Gesture recognition
A person would point a finger at the computer screen to make the cursor move according to their finger direction.
What is the difference between a dual core and quad core chip?
A quad core offers more power, allowing more multitasking capabilities.
a secure platform for internal use
A reliable intranet connection provides organizations and their suppliers and vendors with __________________________________
Infrastructure as a service (IAAS)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.
Explain how Business 2.0 is helping communities network and collaborate.
A social network is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0. Social networking is the practice of expanding your business and/or social contacts by constructing a personal network. Business 2.0 simplifies the way individuals communicate, network, find employment, and search for information.
Virtual computing
A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems.
Supply chain management system
A system where businesses work together to create a product or service for a customer.works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer. software provides tools to help the business manage supplier relationships, develop strategies to ensure quality products or services, create production schedules, procedures for returning defective products, and delivering the product or service to the customers. systems help lower expenses by providing for supplies to be available at just the right time and in the right quantity.
Managing information systems is a challenging role because of the constant changes and threats to computer based information systems. Which of the following can be a major threat to information systems? Choices: Floods Earthquakes Power outages All of the above
ALL (page 8)
A network protocol designed to handle broadband integrated services such as voice and video is
ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.
Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Joe has a beautiful home on a golf course. He has done nothing to protect his home from poorly hit golf balls. Choices: Acceptance Avoidance Sharing Reduction Transferance
Acceptance (Page 15)
Risk acceptance
Accepting that a risk will occur and doing nothing to avoid or prevent it.
Chapter 8
Accessing Organizational Information-Data Warehouse
List and describe the seven departments commonly found in most organizations
Accounting department - provides quantitative information about the finances of the business including recording, measuring, and describing financial information. Finance - deals with the strategic financial issues associated with increasing the value of the business while observing applicable laws and social responsibilities. Human resources management (HR) - includes the policies, plans, and procedures for the effective management of employees ('human resources'). Sales - the function of selling a good or service and focuses on increasing customer sales, which increases company revenues. Marketing - the process associated with promoting the sale of goods or services. Operations/production management - includes the methods, tasks, and techniques organizations use to produce goods and services. Management information systems (MIS) - the function that plans for, develops, implements, and maintains IT hardware, software, and applications that people use to support the goals of an organization
Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Although the availability of information on a wide basis is generally a positive attribute, property rights and the propriety of information sharing may cause and perpetuate conflict.
Advanced networking
Agile Methodology
Agile Methodology—Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. Agile methodology is what it sounds like: fast and efficient, with lower costs and fewer features.
social networking
Allowing people to connect and express themselves, from the comfort of their computers, when otherwise they may have been too shy or introverted to do so, is an example of what?
Information repositories
Also known as knowledge centers, provide helpful info to remote supplier, partners, employers and customer for free or as a revenue generating service
Which of the following is an effective use of predictive analysis?
An insurance company is analyzing medical records to determine malpractice rates.
systems development life cycle (SDLC) consists of seven stages.
Analysis Phase 1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system
Explain the three challenges associated with Business 2.0.
As much as Business 2.0 has positively changed the global landscape of business, a few challenges remain in open source software, user-contributed content systems, and collaboration systems. These challenges include individuals forming unrealistic dependencies on technology, vandalism of information on blogs and wikis, and the violation of copyrights and plagiarism.
In a project, which of the following best describes risk management? Assessing and acknowledging unknown factors Assessing staff and evaluating offshoring options Reducing tasks and increasing timelines
Assessing and acknowledging unknown factors (Page 15)
What are associations?
Associations are data that are linked to a specific event, such as how frequently customers purchase jelly when they purchase peanut butter.
Ethernet replaced token rings as a data communications
Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?
Businesses invest in information systems for a number of reasons. Of those listed, which one is NOT essential enough for a business to make the costly investment in an information system. Choices: Promote competitive advantage Attain customer information Improve decision making Achieve operational excellence Develop new products and services
Attain customer information (page 10)
Identify which description goes with which of Porter's competitive forces. Buying in large quantities results in lower prices for the buyer and lower profits for producers. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry
Bargaining Power of Buyers (page 11)
Many credit card companies offer loyalty programs and reward points that can be used to purchase extra items. Airline points can be a big draw in the credit card industry. In terms of Porter's five competitive forces, this is an example of Choices: Bargaining Power of Buyers / Customers Threats of new Entrants
Bargaining Power of Buyers / Customers (page 11)
Identify which description goes with which of Porter's competitive forces. There are few suppliers, but many buyers and this affects the buying firms' profits because it has to pay more for materials. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry
Bargaining Power of Suppliers (page 11)
action specific verbs
Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?
Classify the different operational support systems, managerial support systems, and strategic support systems, and explain how managers can use these systems to make decisions and gain competitive advantages.
Being able to sort, calculate, analyze, and slice-and-dice information is critical to an organization's success. Without knowing what is occurring throughout the organization there is no way that managers and executives can make solid decisions to support the business. The different operational, managerial, and strategic support systems include: ■ Operational: A transaction processing system (TPS) is the basic business system that serves the operational level (analysts) in an organization. The most common example of a TPS is an operational accounting system such as a payroll system or an order-entry system. ■ Managerial: A decision support system (DSS) models information to support managers and business professionals during the decision-making process. ■ Strategic: An executive information system (EIS) is a specialized DSS that supports senior-level executives within the organization.
improves decision making, delivers business intelligence
Benefits of data warehousing to businesses
flexibility, consistency, and organization
Benefits of database normalization
Benefits of business mobility (wireless networks).
Benefits: Enhances mobility, Provides immediate data access, Increases location and monitoring capability, Improves work flow, Provides mobile business opportunities, Provides alternative to wiring.
competitors' public pricing information
Besides customer attributes, what factor can be used by an e-business to accurately price goods?
Customer relationship management (CRM) is a strategy that a companies use to handle customer interactions. The business benefits of a CRM system include all except which of the following? Focused marketing effort Better internal communication Better customer experience Automated reporting
Better internal communication (page 12)
Horizontal information flow
Between departments and functional work teams
2.4Ghz
Bluetooth is a wireless protocol that connects nearby devices with peripherals at what spectrum band?
differentiating products, customer lock-in, and barrier to competitors
Business strategy is how a business achieves its goals and outperforms its competitors. Strategic Information Systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include:
technology
Businesses face difficult decisions regarding their hardware needs. Constant changes in ___________________________ can lead to obsolescence.
businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Can also lead to business intelligence when combined with market, economics, and other government regulations.
Businesses uses databases for many reasons, so it is important to understand their basic fundamentals such as...
Computer-aided software engineering
CASE is a method used to organize and control software development on big projects. What does CASE stand for?
typically second in command, also known as the vice president of operations. Reports to the CEO or president and makes sure all company operations run smoothly.
CIO (chief information officer)
ABC Nonprofit is seeking to dramatically accelerate growth. The board and executive director are looking for a mission-focused, seasoned, strategic, and process-minded leader with experience leading an executive management team and developing a performance culture among a group of diverse individuals. This person must be a leader who is able to help others at ABC deliver measurable, cost-effective results that make the company's vision a reality. This person will have the skills, sensitivity, and personal confidence to tap into the power that each employee brings to ABC's mission. Which of the following job titles best fits this description? CIO CEO COO CFO
COO (Page 14)
Primary Storage
CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.
focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs. For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers. Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas.
CRM (customer relationship management
Effectiveness metrics
CRM SCM Call center performance
What strategic role has emerged as critical in recent years in large organizations due to cyber attacks? Knowledge of information technology Chief Database Officer Chief Legal Officer Chief Security Officer
Chief Security Officer (Page 14)
Which of the following is one approach to selecting a strategic project? Allow customers to choose the project. Choose projects based on company goals and return on investment. Let the project manager choose the project. Let IT staff select the project.
Choose projects based on company goals and return on investment. (Page 15)
one approach to selecting a strategic project
Choose projects based on company goals and return on investment. good approach to selecting a strategic project is to categorize projects based on organizational goals.
What are classifications?
Classifications look for patterns that indicate customer or entity behavior in order to target marketing efforts.
Swarm intelligence
Collective behavior of groups of simple agents
This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.
Common good approach
With the help of information technology, video conferencing has become cheaper, quicker, more collaborative, and more efficient. Choices: Globalization Communication Cost Effectiveness More Time Product Development
Communication (page 9)
database integrity
Companies must maintain _______________ by keeping their data safe from unauthorized changes.
systems development life cycle (SDLC)
Companies should use ___________________________ to gain control and monitor large information system projects.
Why are competitive advantages often temporary?
Competitors quickly seek ways to duplicate the product.
The Internet has become a valuable tool for businesses. Which of the following is NOT a business benefit of the Internet?
Conduct personal matters. Although access to the Internet allows employees to save time and potentially improve productivity, using the Internet for personal matters can cause employees to waste time and the business may lose productivity to personal aims. For this reason, many businesses restrict employees from accessing part of or the entire Internet.
What is the purpose of the Domain Name System?
Converts domain names to IP addresses Correct! Every host connected to the Internet has a unique IP address that is difficult to use and remember. Therefore, the Domain Name System (DNS) converts unique IP addresses to domain names, such as Google.com to its IP address (i.e., 216.58.217.206).
Information technology has helped to computerize businesses to streamline processes that increases productivity and profits. Choices: Globalization Communication Cost Effectiveness More Time Product Development
Cost Effectiveness (page 9)
Run-Grow-Transform
Cost leadership to simply exist, focus and differentiate to increase market, innovative project to find a new market
radio frequency identification (RFID)
Countless businesses are deploying___________________________________ technology to help manage information technology assets or with business operations—specifically inventory management and supply chain operations.
Chapter 13
Creating Innovative Organizations
Critical Success Factors (CSFs)
Critical success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies. EX: Create high quality products, reduce product cost, increase customer satisfaction.
Enterprise Businss Systems
Custom built to meet specific needs of an organization; very expensive, work to integrate internal processes with external entitites
The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. These systems entail all aspects of interaction that a company has with its customers, including contacts, clients, contract wins and sales leads and more. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System
Customer Relationship Management (CRM) System (page 12)
Database management systems can be used in businesses and at home to store and manipulate important data ranging from complex customer information to kitchen recipes. Microsoft Access is an example of what kind of DBMS?
DBMS for personal computer systems
This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends. Choices: EIS TPS MIS DSS
DSS (page 8)
The input the system accepts to produce useful information Choices: Hardware Software Data People Network
Data (page 8)
Information systems accept _____ as input and process it into _____ as output. Choices: Information Data
Data Information (page 8)
4) Information Governance - Data Governance
Data Governance Refers to the overall management of the availability, usability, integrity, and security of company data. A company that supports a data governance program has a defined a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, timeliness, and completeness. The policy should clearly define the processes concerning how to store, archive, back up, and secure the data. In addition, the company should create a set of procedures identifying accessibility levels for employees. Then, the firm should deploy controls and procedures that enforce government regulations and compliance with mandates such as Sarbanes-Oxley.
Describe the roles and purposes of data warehouses and data marts in an organization.
Data Warehouse—A logical collection of information gathered from many different operational databases - that supports business analysis activities and decision-making tasks. The primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository for decision-making purposes Data Mart—Contains a subset of data warehouse information.
Which of the following is a major function of a database management system?
Data administration
Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart
Data flow diagram
Information
Data is input in a computer and then processed into _______________.
What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information
Data is processed to get information
What is data mining?
Data mining is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.
multiplexer
Data signals and data packets travelling over computer networks from multiple devices are combined together into a single signal, or aggregated by this device
circuit switching packet switching
Data transmitted in a virtual circuit is known as ______________________________, like a voice communication, whereas ______________________________ is used for data.
Data
Data: raw facts that describe the characteristics of an event or object. EX: order date, amount sold, customer number, quantity ordered.
Management information systems will require expertise in what type of distributed systems to connect users to information? Virtual private networks (VPN) Desktop support Database
Database (Page 14)
A database administrator is responsible for which functions? Chose all that apply: Database design Security and access Testing
Database design Security and access Testing (Page 14)
Explain the importance of decision making for managers at each of the three primary organizational levels along with the associated decision characteristics.
Decision-making skills are essential for all business professionals, at every company level, who make decisions that run the business. At the operational level, employees develop, control, and maintain core business activities required to run the day-to-day operations. Operational decisions are considered structured decisions, which arise in situations where established processes offer potential solutions. Structured decisions are made frequently and are almost repetitive in nature; they affect short-term business strategies. At the managerial level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change. Managerial decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for the firm. These types of decisions are considered semistructured decisions; they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision. At the strategic level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. They also monitor the strategic performance of the organization and its overall direction in the political, economic, and competitive business environment. Strategic decisions are highly unstructured decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. They are infrequent, extremely important, and typically related to long-term business strategy.
You are a database administrator defining the major functions of a DBMS. These include a data dictionary, data management, data retrieval, and data administration. What is the purpose of a DBMS's data dictionary function?
Defining and managing the data types
It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations
Definition of a private industrial network
A method or algorithm that uses statistics and data mining to forecast models.
Describe predictive analytics.
The benefit of applying critical path analysis is that it defines the longest paths for each task, as well as calculates the earliest and latest dates each task. This process identifies tasks that are critical and those that cannot be delayed; it also identifies the tasks that can incur delays without adversely affecting the project.
Describe the benefits of applying critical path method (CPM) to complex projects.
Data mining is used to analyze business databases, while big data analyzes big data sets.
Describe the difference between data mining and big data?
a social media communication strategy
Despite security risks, businesses must implement what?
Which is not a function of a database administrator? Ensure database performance. Develop firewall strategy to protect data. Develop database strategy.
Develop firewall strategy to protect data. (Page 14)
Chapter 17
Developing Software to Streamline Operations
What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus
Differentiation
they can be purchased and downloaded instantly, they do not have a physical presence to acquire
Digital goods provide several benefits for e-commerce. What is a benefit achieved from digital goods?
Compare the disruptive and sustaining technologies, and explain how the internet and WWW caused business disruption.
Disruptive Technology: A new way of doing things that initially does not meet the needs of existing customers. Disruptive technologies tend to open up new markets and destroy old ones. Sustaining Technology: Produces a new product customers are eager to buy, such as a faster car or larger hard drive. ■ How the internet caused business disruption: The internet caused many business distractions when it hit big. Many people didn't think that the internet was going to be so widely used and that it would be such a big part of business. Now people are able to easily go online and order products without ever having to leave their house. Now companies are able to increase their profit margins while also cutting costs by using the internet.
Thousands of fields use information technology to boost effectiveness. The need for health care is especially important to everyone, and technology has helped the medical field meet the demand. Of the items listed below, select the primary growing benefit of information technology to the health care industry. Choices: E-learning has become very popular in the medical field to help support the health care demand and supply the field with the necessary workers more quickly through the use of information technology. Information technology helps to ensure the safety and privacy of a patient's records and then use that information to treat them properly. Information technology helps reduce human error in medicine and gives health care workers the tools they need to diagnose and treat patients with new devices and methods. Communication plays a huge role in healthcare and information technology is able to provide the communication tools to reach patients and staff more easily through the Internet.
E-learning has become very popular in the medical field to help support the health care demand and supply the field with the necessary workers more quickly through the use of information technology. (page 9)
This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends. Choices: EIS TPS MIS DSS
EIS (page 8)
standardized business procedures that allow for more consistency within the business and remove redundancy. Typically uses one database to store all information needed by various business units and increases operational efficiency. Implementing this system and automate tasks so employees could do their jobs more efficiently.
ERP (enterprise resource planning)
It is critical to build a data integrity check algorithm to ensure the quality of data in a database before the Hint, displayed below _________ scheduled activities. Therefore, it is important to apply effective _________
ETL, Partition
Chapter 14
Ebusiness
What is the most recent federal bill that addresses computer monitoring of employees?
Electronic Communications Privacy Act of 1986??
SMTP (simple mail transfer protocol) the popular mail protocols include IMAP and POP3
Electronic communications has predominantly become the primary form of communications in first world countries. What protocol is used to mange and monitor the massive amount of emails that we receive every day?
PPP stands for Point-to-Point protocol.
Encryption is used to ensure the privacy of the content being communicated.
Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance
End user training failure
The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. These systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System
Enterprise Resource Planning (ERP) System (page 12)
Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?
Ethernet replaced token rings as a data communications standard in LAN applications.
Chapter 29 in COS, 27 in ebook
Ethics
A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system
Executive information system
A local college has just upgraded to a new, more user-friendly learning management system (LMS). An LMS is a software platform used for the administration and delivery of electronic educational courses and programs. Moving the entire college to a new system requires training for all faculty, students, and support employees, and it requires upgrades to the database, computer server, and network system. Think about this scenario and what you have learned about information technology and information systems. Identify which components listed above in the local college upgrade are information technology and which are information systems components?
Explanation: The information technology components in the above scenario are the LMS, database for student, instructor, and course information, computer server, and network system. The information system consists of the faculty, students, support employees, training, procedures, processes, and all of the information technology items previously listed. (page 9)
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Community Choices: Internal External
External (Page 15)
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Customers Choices: Internal External
External (Page 15)
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Government Choices: Internal External
External (Page 15)
Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network
Extranet
If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application is used?
Extranet. ! Internet, intranet, and extranet are excellent means of communications for businesses, customers, and suppliers, but typically the extranet is used to communicate with suppliers and vendors to manage their inventories.
This approach values individual moral rationality, otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you," asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.
Fairness approach
Consider how your doctor's office creates, organizes, and stores your medical information. They might be stored digitally or in paper form. Medical records kept in a doctor's file cabinet file is an example of the old traditional file environment, but is just as efficient as those stored in a database management system, so there is no need to convert to a DBMS.
False
True or false. Two disadvantages of information technology management are time and cost.
False (Page 16)
True or false. The amount of organizational oversight is not dependent on the centralized or decentralized nature of the global business type.
False (Page 17)
True or False. There is considerable organizational resistance to implementing new information systems because they change many important organizational dimensions, such as culture, structure, politics, and information technology.
False (page 10)
True or false. If a student decides to switch classes because she wants a different teacher, this would be considered a transaction to the college's information system but would not involve any interaction with its accounting or human resources systems.
False (page 10)
True or false. There are four major business functions: sales and marketing; production and operations; finance and accounting; and technology and systems.
False (page 10)
True or false. Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked dependently.
False (page 11)
True or false. The term "business ecosystem" describes the relationship between the various departments within a firm.
False (page 11)
True or false. One benefit of a supply chain management system is for U.S. businesses to lower costs by relocating their operations to cheaper, overseas locations.
False (page 12)
True or false. Information technology and the systems they serve impact every facet of our lives. However, to use information technology efficiently and benefit from all its features, you must have a degree in the subject area and work in the IT field.
False (page 9)
True or false. The great advancement in information technology is due to the development in information systems.
False (page 9)
True or False. You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?
False Correct! Large business might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.
True or False. The telecommunications innovation is nothing new; it started 30 years ago with the founder of the telephone, Mr. Samuel Morse.
False Correct! Mr. Samuel Morse and others invented the telegraph in the 1820s. Mr. Alexander Graham Bell was the inventor of the telephone more than 130 years ago, which evolved from the telegraph.
True or False. The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), is also known as the Internet standard.
False Correct! The TCP/IP, which defines how data are relayed between networks, is the Internet standard. 802.3 is an Ethernet standard and defines local area network (LAN) connections.
True or false. The amount of organizational oversight is not dependent on the centralized or decentralized nature of the global business type.
False, The amount of organizational oversight is dependent on the centralized or decentralized nature of the global business type.
True or false. There is considerable organizational resistance to implementing new information systems because they change many important organizational dimensions, such as culture, structure, politics, and information technology.
False-Although information technology is a subset of information systems, it is not an organizational dimension that would cause organizational resistance to information systems.
True or False. For referential integrity to be enforced in a relational database, a primary key does not need a corresponding entry of equal value in the referenced table.
False. A row value or primary key in a table only exists if an item with an equal value (foreign key) exists in a referenced table.
Which of the following is a governing agency that determines what is and is not acceptable on the Internet?
Federal Communications Commission (FCC)The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.
Systems Analysis
Figures out how hardware, software, network, people, data, and information work together
FTP
File Transfer Protocol is an insecure method used to transfer files from one computer to another.
The European Union Data Protection Directive (1998) restricts the transfer of personal information from participating nations into other nations that do not maintain the same information privacy standards. Which industry would be the most affected by this law? Automotive manufacturing Financial services Mining
Financial services (Page 17)
Describe the five characteristics of competitive priorities.
Five key competitive priorities which a company can add value to its OM decisions including: 1) Cost: There can be only one lowest-cost producer, and that firm usually establishes the selling price in the market 2) Quality: Is divided into two categories product and process quality - Six Sigma Quality - Malcolm Balridge National Quality Awards - ISO 900, ISO 14000 - CMMI 3) Delivery: a firms ability to provide consistent and fast delivery 4) Flexibility: a firms ability to offer a wide variety of products 5) Service: high-quality customer service adds tremendous value to an ordinary product
Process design
Flow of application logic is determined; can't be overly complicated
Data cleansing and normalization
For the DBMS of a financial institution to function properly, ____________ should be performed after a data quality audit on tables that are merged or imported.
List and describe the four 21st century trends that businesses are focusing on and rank them in order of business importance.
Four technology areas where organizations are focusing: * IT infrastructures * Security * Ebusiness * Integrations * IT infrastructure - the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals. * Security - Physical security integration and best security practices * Ebusiness Mobile commerce - the ability to purchase goods and services through a wireless Internet-enabled device. Telematics - blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations. Electronic tagging - a technique for identifying and tracking assets and individuals. Radio frequency identification (RFID) - chips or smart labels that can store unique identifiers and relay this information to electronic readers. Integration - A new series of business success factors and challenges are emerging. *Organization agility *Focus on core competencies and processes *Redefinition of the value chain *Instantaneous business response *Ability to scale resources and infrastructure across geographic boundaries
mobile phone apps and games, free product samples and trial versions offered to users, product quality and available features can be tightly controlled
Freemium is not a new concept in doing business. What is true of freemium?
Production and operations
Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance.Warehouse operations, inventory management, quality control, materials requirements planning; resource planning; in-house logistics and materials management; product lifecycle management
An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. intelligent agents D. Genetic algorithms
Fuzzy Logic
Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements
Gathering the business requirements
_____ is/are making technology and information more difficult to manage because the barriers of language and geography have been broken down. Choices: Information Systems Information Technology Management Cultural Issues Globalization
Globalization (Page 16)
IT has brought the world closer together and made the world's economy a single interdependent system. Choices: Globalization Communication Cost Effectiveness More Time Product Development
Globalization (page 9)
Describe governance and compliance and the associated frameworks an organization can implement.
Governance is a system for management and control. Compliance is agreeing, accepting and yielding. See Pic for Frameworks
Graphics tools
Graphics, video, animations, and interactive multimedia are popular elements in web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.
Two types of business strategies include _____ Choices Growth and Product Differentiation Growth and Synergy
Growth and Product Differentiation (page 11)
Growth
Growth can include adding new products or new enhancements to existing products. Growth can also include acquisition whereby one business purchases another.
The bookstore customers use this method to visit the website to order books and check on their order status.
HTTPS
The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization. Choices: Horizontal Diagonal Vertical
Horizontal (page 8)
Horizontal and vertical partitioning are the two most common processes in partitioning databases. What is horizontal partitioning?
Horizontal partitioning restricts the rows to replicate in a back up process.
Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.
Hot sites
Via the Internet, private networks, and the public switched telephone network
How are WANs connected
manual or automated
How are methods of data capture categorized?
by employees who travel a lot for business
How are portable decision support systems utilized?
create direct channel for doing business, advertise through product or brand marketing using integrated applications, and develop salable mobile applications
How can mobile e-commerce help businesses actively market to their customers?
people can use this medium to influence reserved bystanders
How do social media platforms play an increasing role in shaping events?
to find flaws, fix processes, and boost efficiency of its production
How does FedEx use big data?
enabling collaboration and interaction among users
How does Web 2.0 sites create a virtual online community?
allow for distribution of information with external business entities, allow mobile and external resources to access information which allows for better communication with business partners and a good use of information technology
How does the use of internet-based technologies help businesses?
7- physical, data, network, transport, session, presentation, application
How many layers are in the standard OSI model?
4- user basic requirements, development of prototype, using prototype, and revising prototype
How many steps are in the prototyping software development method?
There are six types of CASE tools and they include business, graphic modeling, development, verification and validation, metrics, project management, and configuration.
How many types of CASE tools are there?
is a system used to convert plain-text document into one optimized for viewing as a Web page, integrating colors, graphics, fonts, and links.
Hyper Text Markup Language (HTML)
In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network?
IP address Correct! IP stands for Internet Protocol. An IP address is a unique address assigned to a computer or device connected to the Internet.
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Online reservation booking
IS (page 9)
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Predicting future sales patterns
IS (page 9)
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Track customer activities
IS (page 9)
Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to which of the following?
ISP Correct! ISP stands for Internet Service Provider. It is a paid service, whereby individuals and organizations can subscribe to the provider to have access to the Internet services.
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Computer peripherals
IT (page 9)
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Telephone and radio equipment
IT (page 9)
cost effectiveness
IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify?
product development
IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example which IT benefit?
which requires each individual in an organization to be appropriately identified and authenticated at specific entry points to an organization and its information systems, and which help with the enforcement of access control, with the appropriate authorizations pre-selected for them.
Identity management
domain name URL IP address HTTP
If you want to visit the Barnes & Noble website, you will type the ___________________of barnesandnoble.com in the ___________________of your web browser. The DNS will convert barnesandnoble.com into an__________________ , and you will use the ______________protocol to communicate with the world wide
Supply Chain management
Improve process of obtaining sourece materials, manufacturing, delivery, manages entire life cycle of a product
IP address -
In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network?
input
In information systems, what is the act of capturing data for processing called?
methodical and process oriented
In systems modeling and design, the structured systems model is _________________
Carrie works for a software company and is in charge of communicating with the clients about their business needs pertaining to their software. Carrie helps her clients identify and describe their business needs in such a way that the software development team can take that information and turn it into a useful piece of the software system. Carrie plays an important role in the _____ function of her company. Choices: Information Systems Management Information Management Information Technology Management
Information Management (Page 16)
Chapter 28 in COS, 26 in ebook
Information Security
_____have shown tremendous growth in the last few decades, leading to more sophisticated _____ Choices: Information Technologies Information Systems
Information Technologies Information Systems (page 9)
Keith works at a software company and is in charge of the computer server room. He is also in charge of keeping track of which employees have certain computers and monitors and other various technology associated with their roles. Keith plays a key role in the _____ function of his company. Choices: Information Systems Management Information Management Information Technology Management
Information Technology Management (Page 16)
_____ is concerned with the management of resources that facilitates access to information. Choices: Information Systems Management Information Management Information Technology Management
Information Technology Management (Page 16)
What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers
Information is processed data
Why has information technology become critical to the success of business enterprise in the last 20 years? Information technology has automated business operations and changed the economics of information. Information technology increases management layers for better decision making. Information technology creates more data and information for decision making.
Information technology has automated business operations and changed the economics of information. (Page 15)
online banking
Information technology is used everywhere; where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?
Information
Information: data converted into meaningful and useful context. EX: best-selling product, best customer, worst selling product, and worst customer.
components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.
Input
Assume you are an IT Project Manager dealing with competing priorities, stakeholders and budgets. Many times, one or more stakeholders wants to outsource a specific element of a project to save time, money or both. From the project management perspective, how would you explain the difference between insourcing and outsourcing to non-technical team members? Insourcing is internal development, while outsourcing involves contracting out development. Insourcing is contracting development, while outsourcing is doing the project in another country. Insourcing is the act of launching a project, while outsourcing is the act of ending a project. Insourcing is hiring employees, and outsourcing is laying off employees.
Insourcing is internal development, while outsourcing involves contracting out development. (Page 15)
Chapter 16
Integrating Wireless Technology in Business
Identify which description goes with which of Porter's competitive forces. When there are many competitors, firms have to compete aggressively for market shares, which can result in lower profits. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry
Intensity of Competitive Rivalry (page 11)
The website for healthcare corporations, such as Anthem Blue Cross Blue Shield, contains tons of medical information and ways to stay healthy.
Interact with customers Correct! Corporations often utilized their websites as a means to communicate important information to their customers.
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Managers Choices: Internal External
Internal (Page 15)
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Owners Choices: Internal External
Internal (Page 15)
environment
Internal and external elements that effect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature?
Small office or home office routers enable computers to access the _______. Connection to the web is enabled by service providers called _______> .
Interntet ISP
Systems Thinking
Is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.
Business process reengineering (BPR)
Is the analysis and redesign of workflow within and between enterprises. The goal is to make all business processes best-in-class.
address specific issues or concerns that a security policy is needed, or even controversial areas where the company takes a given position on an issue. Examples include policies for:
Issue specific policies
What can happen when the testing phase in system development projects is skipped? A. It can lead to a lack of business requirements B. It can lead to unfound errors C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives
It can lead to unfound errors
reduce
It is a good practice to _________________ data that is backed up on a regular basis.
What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increaes the time needed to market for products
It leads to a loss of confidentiality
In database modeling and design, what is meant by database normalization?
It means removing redundancy in conceptual model.
Why would a vendor choose to utilize electronic data interchange (EDI)?
It permits secure transmission of business information
What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database
It provides relational integrity for the database
Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system
It supporst change through iteration
What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy?
It would decrease errors in medicaitons
Internet Corporation for Assigned Names
Keeps track of internet domains
Key Performance Indicators (KPIs)
Key performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific than CSFs. EX: Turnover rate of employees and percentage of help-desk calls answered in the first minute are examples of a key performance indicators.
The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. This system creates the process of sharing knowledge among people for the benefit of the business. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System
Knowledge Management System (KM) (page 12)
Small networks are usually _____ networks and are managed physically.
LAN
Business managers often review the financial costs of a decision as a normal part of the planning and execution process when determining what to outsource in information technology. However, less frequently identified are the cultural costs or benefits related to the offshore outsourcing strategy. Which of the following are elements of the cultural cost? Choose all that apply: Language barriers Cultural incompatibility Working remotely Perceived lack of talent
Language barriers Cultural incompatibility Perceived lack of talent (Page 17)
online learning
Learning and research with a computer and the internet from anywhere, anytime is an example of what?
is the legal state of being responsible. An example would be the CEO and CFO who have certified the accuracy and validity of financial documentation and who would be legally penalized should errors be found.
Liability
LDAP
Lightweight Directory Access Protocol. Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlook's global address list and Microsoft Active Directory.
Open standards is a hot new career field as it relates to networking and/or servers. What technologies might you be an expert in that would fit the criteria of open standards with a web development and/or server emphasis? Choose all that apply: Linux OS Java Windows 10
Linux OS Java (Page 14)
In contrast with a ________, a _________ uses a flexible model in which data are distributed among several machines, often in a cloud-computing format.
Machine-based relational database, web-based database
malicious software applications
Malware One high-profile example of a malware threat is SQL Injection, which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.
Materials Requirement Planning
Management knew what was needed when
Managerial
Managerial Decision Making— Managers evaluate company operations to identify, adapt to, and leverage change
Describe the correlation between operations management and information technology.
Managers use IT to heavily influence OM decisions including : What: What resources will be needed and in what amounts? When: When should the work be scheduled? Where: Where will the work be performed? How: How will the work be done? Who: Who will perform the work?
Chapter 19
Managing Organizational Projects
Web design tools
Many graphical and traditional text-based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWYG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.
Information systems are used in many functional business areas. Select the most common. (Select all that apply.) Choices: Marketing Maintenance Human resources Accounting
Marketing Human resources Accounting (page 10)
Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance
Marketing and Sales (page 10)
Which of the following describes a virtual office? Choices: Mary works for Happy Charities. She calls and emails potential donors each day. She is able to work from home because her entire job is based on using Web and phone services. Jane works for Living Well Vitamins. Her store is located in Miami. She has a 30 minute commute each day to get to her job.
Mary works for Happy Charities. She calls and emails potential donors each day. She is able to work from home because her entire job is based on using Web and phone services. (page 11)
Which of the following is not a responsibility of a CIO? Strategic alignment of IT with business objectives Knowledge of information technology Merger and acquisition strategy Ensuring information systems availability, reliability, and effectiveness
Merger and acquisition strategy (Page 14)
With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. This availability of information allows benefits, such as localization and personalization, but direct and specific invasions of privacy require faster reputation management and for information controls in more places.
Mobile Information Availability
coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.
Moore's Law
says that computing power and storage capacity will continue to increase or double approximately every two years.
Moores Law
Information technology helps eliminate repetitive tasks and increases accuracy, allowing employees to concentrate on more high-level functions. Choices: Globalization Communication Cost Effectiveness More Time Product Development
More Time (page 9)
manufacturing and production
Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into car frame is...
Upward information flow
Moves from the actual information up to upper management. Ex, selling a product, flows to different departments
Change brings about fear and fear causes employees to resist (and even undermine) implementation.
Name one key reason why a large majority of system implementations result in failure.
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Technology upgrades
Neg (page 9)
_____ is and will continue to be a highly paid and a high demand IT career. Choices: Project Coordinator Helpdesk Specialist Network Specialist
Network Specialist (Page 14)
WAN - wide area network
Network interconnected via the internet, private networks or public switched telephone networks
Which of the following statements are true regarding Voice over Internet Protocol (VoIP)? (Select all that apply.)
No 1.It uses the standard public switched telephone network (PSTN) connection. *2.It is based on a high-speed Internet connection to *deliver voice communications. 3.It results in lower phone charges for businesses because long-distance calls are toll free. Check My Answer Correct! To use the VoIP effectively, a high-speed Internet connection must be in place. VoIP uses the Internet connection. It does not require a landline to make phone calls; therefore, all long-distance calls are toll-free, resulting in lower operating costs.
One goal of a database administrator is to have a database that has the same entities and values in one or more tables. The database should go through what process to optimize?
Normalization
__________ is a process or practice to eliminate data redundancy, and ___________ is the process of establishing relationships between tables using keys.
Normalization, Referential integrity
communication style
North americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in what?
lengthy ETL load phase
OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database?
associate with other companies, without being physically tied to them
One network-based strategy is that of virtual companies that can do what?
Rachel needs to deposit a check, but the bank is closed. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Online Banking (page 9)
Sally wants to take classes, but has a disability that does not allow her to leave the house. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Online learning (page 9)
is software whose source-code is freely available to developers and users. .............. is developed not by single users or companies, but by communities of connected users and groups.
Open Source Software
Operational
Operational Decision Making— Managers develop, control, and maintain core business activities required to run the day-to-day operations
Chris is explaining to management some ways in which an operational database can be used to improve performance and business decision making. What is a common business use of an operational database?
Operational databases can be used to track real time inventory.
Chapter 28 in ebook
Operations Management **EXTRA CHAPTER**
Explain the operations management's role in business.
Operations management is the systems or processes that convert or transform resources (including human resources) into goods and services.
A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking
Optimization
retrieve
Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access can __________________ data from the server
Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below ______ in real time, with their clients using online chat or instant messaging applications.
Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below synchronously in real time, with their clients using online chat or instant messaging applications. Synchronously refers to happening at the same time.
Identify global system development issues organizations should understand before building a global system
Organizations should be sure to understand the global standardization of data definitions. Difference in language, culture, and technology platforms can make the global data standardization quite difficult. They must also support a diverse base of customers, users, products, languages, currencies, laws, and so on. Developing efficient, effective, and responsive information systems for multiple countries, differing cultures, and global ebusinesses is an enormous challenge for any organization.
Network Service Provider
Owns Network access points
US Department of Defense
PERT - Program Evaluation and Review Technique, was developed by:
What is a required process in implementing and maintaining a data warehouse?
Partitioning
What is partitioning?
Partitioning means dividing the database into more manageable parts.
Risk sharing
Partnering with groups or individuals who have more experience and who will accept or absorb some or all of the risk involved.
Information technology leaders must take into consideration many factors when determine what, if anything, to outsource or offshore in their technology process or services. What are some of the factors to consider when deciding if a product, service, or element of technology should be outsourced? Choose all that apply: Working remotely Perceived lack of talent Language barriers Cultural incompatibility
Perceived lack of talent Language barriers Cultural incompatibility (Page 17)
When considering data mining and its benefits to business, what is required for an enterprise today to be competitive and gain business intelligence from day-to-day operations?
Perform analytics on enterprise data stored in data warehouses.
Describe the different wireless networking categories.
Personal Area Networks. Personal Area Networks (PAN)—Provides communication over a short distance that is intended for use with devices that are owned and operated by a single user. EX: Bluetooth Wireless LAN (WLAN)—A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. EX: WIFI Wireless MAN (WMAN)—A metropolitan area network that uses radio signals to transmit and receive data EX: WiMax Wireless WAN (WWAN)——Cellular Communication System A wide area network that uses radio signals to transmit and receive data EX: Smartphone
Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge
Plunge
new market entrants, substitute products, customers, suppliers, and competitive rivalry
Porter's 5 competitive forces include
new market entrants, substitute products, customers, suppliers, and competitive rivalry
Porters 5 competitive forces include
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Competitive advantage
Pos (page 9)
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Opportunities for the disabled
Pos (page 9)
A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device
Primary Storage
Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.
Privacy issues
Warehouse operations, inventory management, quality control, materials requirements planning; resource planning; in-house logistics and materials management; product lifecycle management Choices: Production and Operations Accounting and Finance Human Resources
Production and Operations (page 10)
(aka strategic level) frameworks are documents that establish the security program, define specific or general risks that it will be responsible for handling, and specify its purpose, extent, objectives, responsibilities (including the command structure within the security department), and enforcement.
Program/Charter level policy
A company has recently acquired a former distribution competitor in another country. The new subsidiar uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?
Prohibitions gainst the transfer of certain technologies across national boundaries
Issues created by the association of rights of property ownership to tangible and intangible goods and information.
Property issues
politics
Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature?
Wireless Network Business Applications
Radio-Frequency Identification (RFID)—Uses electronic tags and labels to identify objects wirelessly over short distances. EX: Retain stores utilize RFID to track and manage inventory. Global Positioning System (GPS)—A satellite-based navigation system providing extremely accurate position, time, and speed information EX: Automatic Vehicle Location Geographic Information System (GIS)—Consists of hardware, software, and data that provide location information for display on a multidimensional map EX: Finding what is nearby - restaurants, gas stations, etc.
Additional Methodologies
Rapid Application Development (RAD) Methodology—Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process Extreme Programming (XP) Methodology—Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete Rational Unified Process (RUP) Methodology—Provides a framework for breaking down the development of software into four gates Scrum Methodology—Uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal
Which of the following terms represents a set of data, typically aligned as a row in a table?
Record
Human Resource
Recruiting, training, and maintaining employees and their records. Recruitment; training; employee records; benefits; payroll and employees' records; benefits administration; employee relationship management
Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. The IT department keeps the server room cool for the equipment. Choices: Acceptance Avoidance Sharing Reduction Transferance
Reduction (Page 15)
Network of businesses that are connected to provide products and services more efficiently to customers, accommodate rapid growth, and meet requirements of retailers and distributors. Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow. Diane's Designer clothing wants to be the price leader in the industry by cutting out the middleman, renting warehouse space, producing easier clothing designs, and bringing products to market in less than 3 weeks.
SCM (supply chain management)
Which of the following companies has created a network-based strategy with other businesses? Choices: Jamie's Jewels, Inc., is an upscale jewelry store. Jamie and her husband search for rare gemstones and then design and create original jewelry pieces. Due to their artistic abilities in jewelry design, Jamie's Jewels, Inc., has been recognized worldwide. Their clients always give them five star reviews on the Jamie's Jewels website. Furry Grooming is a mobile dog grooming business. The business goes to the client's home to groom their pets. For an extra charge, the business is happy to exercise the dog before grooming. The business has been so successful that the owner is considering buying another van to grow the business. Savvy Smartphones is a business that sells smartphones and smartphone accessories. The business works with various cell phone carriers to offer a few products from each carrier. The result for consumers is that they can go to one store and learn about the options available from multiple companies, including pricing and available smartphones.
Savvy Smartphones is a business that sells smartphones and smartphone accessories. The business works with various cell phone carriers to offer a few products from each carrier. The result for consumers is that they can go to one store and learn about the options available from multiple companies, including pricing and available smartphones. (page 11)
SFTP
Secure File Transfer Protocol. Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.
Information systems executives must make difficult hardware decisions regarding _____ issues that pose possible outside threats to the system. Choices: Security Capacity Performance
Security (page 8)
Explain the many different global information issues an organization might encounter as it conducts business abroad
Security is a very important issue when organizations begin to conduct business abroad. They must have appropriate levels of authentication, access control, and encryption in place to ensure (1) that only authorized individuals can gain access to the network, (2) that they have access to only those applications for which they are entitles, and (3) that information cannot be understood or altered while in transit.
Business advantages of a relational database
See Pic
Describe characteristics of Agile MIS infrastructure
See Pic
Explain why understanding trends and technologies can help an organization prepare for the future.
See Pic
Four global IT drivers that should be included in all IT stategies
See Pic
Identify the technologies that will have the greatest impact on future business.
See Pic
Identify the trends that will have the greatest impact on future business.
See Pic
Peer to peer networks
See Pic
Six ebusiness tools for connecting and communicating
See Pic
Wired
See Pic
Wireless
See Pic
IOS (International organization for standardization), ARPANET (creator of the original internet in 1967), IETF (internet engineering task force)
Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. What are the 3 governing bodies that recommend and decide communications standards?
Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. The Lakeview Community Festival has included vendors to participate in this new community event. Each vendor will contribute money to participate in the festival. Choices: Acceptance Avoidance Sharing Reduction Transferance
Sharing (Page 15)
Risk transference:
Shifting risk to another party. For example, in the case a risk cannot be avoided, shared, or reduced to an acceptable non-damaging level, insurance can be purchased to provide restorative reimbursement for damaged equipment or services and, potentially, lost revenue.
SMTP
Simple Mail Transfer Protocol. One of several popular email protocols in use today (others include IMAP and POP3).
client-server. virtual
Small businesses with computer server needs should design their networks as ____________________ Large enterprises can manage moves and changes more productively with __________________________ network capability.
While both networks can be sniffed, because wireless network traffic is airborne, it can be more readily intercepted.
Sniffing can occur in any type of network. Why is it easier to sniff a wireless network than a wired, landline network?
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.
Social Engineering
social e-commerce allows customers to shop and buy products online.
Social e-commerce has become an important internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?
real time
Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ____________________.
Which factor does not influence the interaction between a business enterprise and its information system? Organization Processes Social networks Culture
Social networks (Page 15)
The programs comprised of pre-coded instructions written in a programming language which the end user typically uses to interact directly with the IS. Choices: Hardware Software Data People Network
Software (page 8)
What are two of the six major components of a computer-based information system? Choices: Telecommunication and hardware Software and data Data and external influences Software and telecommunications
Software and data (page 8)
Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.
Software as a service (SAAS
Define the three common business forms
Sole Proprietorships - one person owning and operating a business (Advantages: ease of start/ending business, own boss, less regulation / Disadvantages: unlimited liability, limited financial resources). Partnerships - legal business with two or more parties (Advantages: financial resources, shared risks, no special taxes / Disadvantages: unlimited liability, profits shared, disagreements). Corporations - legal entity with authority to act/have liability separate from owners (Advantages: limited liability, more money to invest, talented employees / Disadvantages: double taxation, expensive to incorporate, hard to terminate).
Spoofing
Spoofing is penetrating a network by disguising intruding data packets.
Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor
Spreadsheet
An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse
Spyware
components include primary temporary storage and secondary long-term storage devices.
Storage
A _____ is created to meet a specific business goal and to provide a competitive advantage. Choices: Strategic Information System Transaction Processing System
Strategic Information System (page 11)
Which of the following best describes disruptive technology? Substitute products cost less and have less capabilities, but eventually displace legacy, established products. Substitute products cost less but have more capabilities and replace established products. Substitute products are based on chaos and fuzzy logic.
Substitute products cost less and have less capabilities, but eventually displace legacy, established products. (Page 15)
Which of the following best describes disruptive technology?
Substitute products cost less and have less capabilities, but eventually displace legacy, established products.Disruptive technology is usually cheaper and not as capable as established products before they emerge as leading options.
A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning
Supply chain management
Chapter 31 in COS, 29 ebook
Sustainable MIS Infrastructures
Identify the two main types of software.
System Software - controls how the various technology tools work together along with the application software. System software includes both operating system software and utility software. Application Software - is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others. See pic for examples.
feasibility feasible
Systems analysis necessitates the performance of a __________________study to determine whether the solution is financially, technologically, or organizationally ____________
True - passive tags are small and inexpensive because they have no internal power source
T or F: Passive tags leverage energy from radio signals
False - WSNs wireless sensor networks are sensors located in strategic locations to monitor conditions.
T or F: RFID are located in strategic locations and used to monitor physical or environmental conditions
False - Sensors in WSNs are able to transmit and receive signals via built-in antennas.
T or F: WSNs have sensors that need to be wired into a network in order to transmit and receive signals.
True
T or F: Wireless Wi-Fi access points built before 2003 have WEP encryption protocol and cannot be upgraded to the more secure WPA standard.
False - In wireless networks, WEP is being replaced by more secure Wi-Fi Protected Access (WPA).
T or F: Wireless network security is improving because of the new security protocol called WEP.
False - Domain names have four parts but if the website is located in a foreign country it will have a 5th part indicating the country code
T or F: all domain names have 4 parts
What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL
TCP/IP
This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing. Choices: EIS TPS MIS DSS
TPS (page 8)
A four-level pyramid depicts different types of information systems, as they relate to different hierarchical levels within an organization. Select the correct ascending ordered list of four systems (i.e., bottom to top of the pyramid), that relates to the end users' increasing hierarchical level within an organization. Choices: TPS, MIS, DSS, EIS TPS, DSS, MIS, EIS EIS, MIS, TPS, DSS EIS, DSS, MIS, TPS
TPS, MIS, DSS, EIS (page 8)
Because of limited funding, the bookstore employees are still using this very old and unsecure method to log on to the company's server from home.
Telnet
local area network (LAN) connections.
The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), defines ____________________________________________________________________
Why does the ETL process run in parallel and not in sequential order?
The ETL process to update a data warehouse runs in parallel because the extraction step is lengthy.
waterfall model
The _________________ is not a good model for complex and object-oriented projects, and is a poor model for long and ongoing projects.
architecture
The _________________ of a global information system is the basic structure of the information required to coordinate international business activities.
critical path method (CPM)
The _____________________ is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.
waterfall model
The ______________________is the traditional systems development method, so named because each stage must be completed before moving on to the next stage.
Which of the following describes information management? The acquiring and managing of information systems within an organization The acquiring and managing of information within an organization and the sharing of that information with its stakeholders The acquiring and managing of technology resources within an organization
The acquiring and managing of information within an organization and the sharing of that information with its stakeholders (Page 16)
information management?
The acquiring and managing of information within an organization and the sharing of that information with its stakeholders Correct. Information management refers to the collecting and sharing of information within an organization.
information technology management
The acquiring and managing of technology resources within an organization
What is information technology management? The acquiring and managing of technology resources within an organization The acquiring and managing of information systems within an organization The acquiring and managing of information within an organization and the sharing of that information with its stakeholders
The acquiring and managing of technology resources within an organization (Page 16)
The application layer
The application layer is where applications create and communicate user data to other applications on the same or another host
The sales, purchasing, and accounting departments at a wholesale restaurant distributor each maintain their own separate information systems. Recognizing the benefits of sharing data among departments, the company decided to develop and implement a new centralized information system. The new system would allow all employees to access, analyze, and modify data stored in one central location. What are some of the advantage/benefits or disadvantages/challenges of information technology management or information management in this scenario?
The departments in this scenario are interdependent and would benefit from the ability of each department to share information. Each of these business functions impacts the other (purchasing must purchase products to fulfill sales orders, and accounting must bill the sales customers and pay for the purchased products). One advantage of this new system is the ability to assist the separate departments with their planning. A disadvantage of this system is that incorrect information entered by one department might adversely impact another department. For example, if the sales department did not delete or remove an order that had been cancelled by a customer, this would result in the purchasing department buying unwanted product(s). If the products were custom manufactured or non-returnable, the company could be stuck with excess inventory. One of the challenges presented by the centralized option is to ensure all information is updated on a timely basis. (Page 16)
What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values
The field must have unique values
connect
The first internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile to __________________ with other users.
strategic-oriented
The focus of _________________________ evaluation is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.
discovery
The intelligence phase in the decision making process consists of the ____________________, identification, and understanding of the problem.
. What is the logical data model?
The logical data model contains more detail than a conceptual data model, often defining operational and transactional entities for the database
Critical Path Method - CPM
The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed is the:
Supply chain management (SCM)
The management of information that flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.
information
The number of people in Florida with incomes below the poverty line increased in the city of Tampa between 2010 and 2015 is an example of _______________________ .
synergy
The output from area is used to create input for another, thereby lowering costs and generating more profit is what?
There are five rules that pertain to the relational database model. Which one of the following examples breaks one of the rules?
The primary key of the orders table is the video title.
problem solver
The primary role of a systems analyst is
CDMA (code division multiple access) was developed during the second generation cellular networks.
The second generation, or 2G, launch used which digital standard for data and voice communication?
Knowledge
The skills, expertise, and experience, coupled with information and intelligence, that creates a person's intellectual resources. EX: Choosing not to fire an employee who is underperforming knowing that person is experiencing family problems. Listing products that are about to expire first on the menu or creating them as a daily special to move the product.
ENIAC
The____ is considered the first electronic, digital computer and was called 'Great Brain' by the press; was the first general purpose computer for commercial use.
EIS executive information systems is at the top of the hierarchy.
There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?
Bargaining Power of Suppliers
There are few suppliers, but many buyers and this affects the buying firms' profits because it has to pay more for materials.
benchmarking, teaches best practices usability testing, testing is critical user communication, MOST CRITICAL, drives acceptance forming an internal user group, builds support infrastructure planning, leveraging existing resources, drives costs down
There are six methods to increase user adoption, and lower post-implementation costs. The methods include: benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources
project structure, project size, and staff technical capabilities
There are three levels of risk associated with system design and implementation:
extranet
This connection which allows an organization to communicate directly or provide specific resources to suppliers, customers, regulatory entities, and other external users.
Windows
This operating system is the market leader for workstations and servers. It has its own internal software and a graphical user interface that is easy to use.dominates the world of personal computers, running on more than 90 percent of home and business user machines.
Hardback textbooks are no longer as in demand because of the creation and quick distribution of e-books. In terms of Porter's five competitive forces, e-books are an example of Choices: Threat of Substitute Products or Services Intensity of Competitive Rivalry
Threat of Substitute Products or Services (page 11)
Identify which description goes with which of Porter's competitive forces. If an industry is profitable and there are few barriers to enter that industry, then rivalry will be great as new businesses enter the market. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry
Threats of new Entrants (page 11)
RF site survey -To ensure optimal network performance, it is critically important to conduct a radio frequency (RF) site survey
To determine the best location for access points, what assessment should be conducted?
intranet - an internal connection w/ in the organization to facilitate internal biz affairs
To facilitate efficient and effective business, corporations utilize the ________________ to mange employee affairs
all aspects of cost from the inception to decommissioning, along with associated maintenance, upgrades, support, and training.
Total cost of ownership (TCO) is a useful strategy when evaluating information systems costs and benefits. What does TCO entail?
Cross functional systems
Transcends different divisions to change how info is used and increase efficiency by eliminating redundancy
Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Bob recently purchased long-term disability insurance. Choices: Acceptance Avoidance Sharing Reduction Transference
Transference (Page 15)
Describe the protocols and the importance of TCP/IP
Transmission Control Protocol/Internet Protocol - the most common telecommunications protocol - provides technical foundation for the public internet as well as for large numbers of private networks - uses special transmission method that maximizes data transfer and automatically adjust to slower devices and other delays met on a network - TCP provides transport functions, ensuring among other things that the amount of data rec'd is the same as the amt transmitted...IP provides the addressing and routing mechanisms that acts as a postmaster - contains five protocols: FTP (file transfer protocol), SMTP (simple mail transfer protocol), telnet, HTTP (hypertext transfer protocol), and SNMP (simple network mgmt protocol) See pic for importance of TCP/IP
Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse
Trojan horse
True or false. Information technology has increased the speed and volume of information that can be communicated within and between businesses, and managing this information has become very challenging.
True (Page 16)
True or false. Companies, such as 24x7 helpdesk operations, use centralized information systems, in which work occurs on projects until such time as the work might be handed off to the next division or location as their day ended. When a client calls or continues a helpdesk call, the next group can pick up the call without any break in the work flow.
True (Page 17)
True or false. The benefit of having multiple locations working on the same development project is that work does not need to stop when the workday ends.
True (Page 17)
True or false. The political climate in a country can have an impact on globalization.
True (Page 17)
True or False. Implementing information systems within an organization should be carefully considered. It can be quite costly, but the long-term benefits can be even greater.
True (page 10)
True or false. One of the advantages of information systems for businesses is to take raw data and turn them into valuable information, and then help transform that information into organizational knowledge.
True (page 10)
True or false. A Real Estate Company has a website that is integrated with a software system that keeps track of all the realtor's sales leads and listing information. The system keeps track of each person's name and contact information. This software system is an example of a customer relationship management system.
True (page 12)
True or false. One challenge of introducing knowledge management is that employees are often not willing to share information that they perceive gives them unique value to a business.
True (page 12)
[True/False] One of the most important IS management issues facing businesses today is hiring skilled IS workers.
True (page 8)
True or false. Even though information technology functions in the background, it is the backbone of most organizations.
True (page 9)
True or False. The increasing complexity of the new computer systems resulted in the development of two frameworks Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT). .
True Correct! The Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT) framework were created to allow businesses to better plan their infrastructure, manage IT services, control changes, and reduce complexity as the scale of their information systems grew.
True or false. A risk mitigation activity in project management is implementing a "lessons learned" process after each project.
True (Page 15)
True or false. One of the challenges in today's IT advances is the development of varying screen display sizes for computer monitors, tablets, smartphones, and PDAs.
True (Page 16)
True or false. An information technology manager should seek to standardize software and hardware when developing a global information system for an organization.
True (Page 17)
True or false. One management solution for addressing the challenges posed by implementing a global information system is to outsource the project to an offshore company that has global information system development expertise.
True (Page 17)
[True or false] Information is data that have been organized to provide value to an organization.
True (page 8)
True or false. The political climate in a country can have an impact on globalization.
True. Globalization can be defined as the integration of international economies, and it does benefit from general political stability around the globe.
[True/False] Integrated circuits consist of sets of electronic circuits on a chip or plate of semiconductor material and replaced vacuum tube transistors.
True:Old electronic computers were powered by vacuum tubes until the invention of the integrated circuit.
[True/False] The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes.
True:The earliest computers took up entire rooms and consisted of vacuum tubes for transistors.
Management Information systems
Use to manage business processes in a business/department for decision making, managing data, people, and projects
Customer communication - An intranet is a network connection meant for internal use only, not to communicate with customers.
Using a web server to connect to the corporate databases on the cloud, an intranet can provide many benefits. Which of the following is NOT a benefit of an intranet? Email and collaborative software Customer communication Centralized storage repository Centralized information sharing
142 and 212
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?
This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.
Utilitarian approach
culture
Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature?
software
Various types of _____________________ enable companies to utilize their information systems hardware and networks more effectively.
Big data has many characteristics, each with their own challenges. What is meant by "velocity" when discussing big data characteristics?
Velocity is the speed required to process or analyze big data.
In the dead of winter in Minnesota, Jim has the option of working from home. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Virtual Office (page 9)
Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM
VoIP
How is voice or video information carried on digital networks?
Voice and video data are transmitted using circuit switching methods.Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.
A real estate office has several divisions located in different areas. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN
WAN
Waterfall Methodology
Waterfall methodology—A sequence of phases in which the output of each phase becomes the input for the next.
Explain web 2.0 and identify its four characteristics.
Web 2.0, or Business 2.0, is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Web 2.0 encourages user participation and the formation of communities that contribute to the content. In Web 2.0, technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business. The four characteristics of Web 2.0 include: ■ Content sharing through open sourcing. ■ User-contributed content. ■ Collaboration inside the organization. ■ Collaboration outside the organization.
Pushed static info
Websites provided static info (SPAM)
DBMS (database management system)
What application does one use to query and administer databases?
web enabled storefront
What application provided by the internet allows an online retailer to conduct business?
packet transmission and TCP/IP protocol
What are 2 fundamental protocols that can describe modern telecom networks?
detailed staged process, ability to monitor large projects
What are benefits of using SDLC when implementing an information system program?
small in comparison to private industrial networks, online platform host where transactions may take place between a seller and a buyer, provide more of a focus on individual transactions versus lasting relationships
What are characteristics of a net marketplace
participate, share, shape, and influence discussions
What are discussion actions that social media users can perform while immersed in an activity or current event?
provide a venue for the sale of physical goods, can be traditional brick-and-mortar retailers
What are e-Tailers?
new market entrants, substitute products, customers, suppliers, competitive rivalry
What are examples of competitive forces?
functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, user satisfaction
What are factors that influence the success of an information system?
facilities
What are needed for information systems infrastructure?
connect each user in a network directly
What are peer-to-peer network topologies?
ETL load phase
What are pitfalls when maintaining a data warehouse database?
audio files that contain educational content
What are podcasts, and why are they a good source of information for systems analysts?
modular design, decision tables, decision trees
What are process description tools?
to entice potential customers to shop, to educate stakeholders on product status, specifications, features and capabilities, and to inform customers of upcoming sales and events
What are reasons for providing company information on the internet?
eliminates data redundancy, reduces data complexity
What are reasons to normalize a database?
define problem, develop alternatives
What are steps in the decision-making process?
1NF, 2NF, and 3NF
What are the 3 norms in normalization?
goal selection, attainment measurement, and achievement intervention
What are the 3 primary activities associated with business performance management?
application, presentation, session, transport, network, data link, physical
What are the 7 layers of the OSI model?
consolidation, slicing and dicing, and drilling down
What are the basic analytical operations?
data manageability
What are the benefits of partitioning when maintaining a data warehouse database?
interpersonal roles, decisional roles, informational roles
What are the categories from Henry Mintzberg's management behavior roles?
data mining, predictive analytics, OLAP
What are the categories of business intelligence?
automation, rationalization, process redesign, and paradigm
What are the four categories of an organizational change?
processes and employees
What are the key factors to consider when planning and organizing information technology in business?
system design, programming, testing, conversion, and production and maintenance
What are the stages in the waterfall model?
1st. collect information about the proposed system, 2nd. development of functional flow diagrams, functional specifications, and a flow dictionary, 3rd. functional flow diagram presented to customer, user input obtained, model is revised, and user approval is obtained
What are the steps in building a logical model of a system?
Tools, workbench, and environment
What are the three CASE software classifications?
algorithms
What are used in most cases to look for relationships, patterns, and trends.
Non-relational database
What are used to handle large amounts of data in a database, and the databases can be stored in multiple locations?
User requirements means documenting all user needs, wants, and requirements.
What are user requirements in the SDLC process?
the classical management model supports planning and controlling
What best describes the classical model in management decision making?
What business earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?
corporations
What business structure is a legal entity that can encompass a big number of shareholders?
corporations
What business structure is an individual not help personally accountable for any liabilities, risks, and debts from business operations?
redirect/redistribute funds, build schools, approve commercial sites, demographic analysis to predict sales
What can a GIS (Geographic Information System) be used for?
product marketing
What can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?
predictive analysis
What can be used to predict future outcomes or trends, but it does not tell you what will happen in the future?
workbenches
What category of CASE does Microsoft Visual Basic fall under?
CASE (computer aided software engineering)
What combines multiple tools or workbenches to support the complete software cycle?
structured query language
What computer language is used with relational database applications?
client/server configuration
What configuration does the server control the traffic going back and forth the network, thereby maximizing the traffic on the network.
relational database
What data is stored in related tables that can be accessed and joined in many different ways without having to reorganize the tables?
logical, physical and analytical
What data models are used by businesses to map processes to data requirements?
corrupted data
What data should be scrubbed so that they are consistent with the design of the database?
data governance
What defines the policies and processes to manage and maintain the data integrity and security of a government agency?
internet search and social media sources
What do hiring managers use to identify inconsistencies in a candidate's background?
confidentiality, integrity, and availability
What do the letters CIA stand for?
social media
What do you call the web-based applications that allow user content to be created and shared over the internet?
Online transaction processing
What does OLTP stand for?
packet switched data networks
What does PSDN stand for?
helps the CPM visualize the activity diagrams that define the critical path
What does WBS (work breakdown structure) do?
code software to solve problems or perform tasks
What does a software engineer do?
looks for patterns that indicate customers' shopping behavior in order to target marketing efforts
What does classification do?
corrects or removes duplicated, incomplete, or inaccurate data
What does data cleansing do?
breaks a big table into several smaller tables, which will in turn modify the structure of the existing or any new tables
What does data normalization do?
analyzes a series of values in order to predict or forecast the value of other variables.
What does forecasting software do?
network based thinking, pooling resources, and expanding contracts to be more successful and competitive
What does network strategies involve?
radio waves over the radio spectrum
What does wireless communication use to send and receive signals?
passwords and Login ID's
What information can be gained by sniffing a wireless network?
Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.
What information is enclosed in transmission packets
normalization
What involves correctly defining keys, tables, columns, and relationships?
A database of possible employees or candidates
What is LinkedIn?
a multidimensional database that is used for analyzing business data to discover and gather business intelligence
What is OLAP (online analytic processing)
RFIDs are small, removable tags attached to objects that emit a radio frequency signal for the purpose of being identified. Identification is usually carried out by handheld wireless readers. RFID helps companies increase productivity because the need to physically handle material during inventory management is reduced or completely eliminated.
What is RFID and how does it work?
a general purpose modeling language (unified modeling language)
What is UML
a modeling language used to help model systems
What is UML?
interact with suppliers, often via an SCM
What is a benefit of an extranet?
Public cloud computing reduces capital expenditures because resources are leased.
What is a benefit of public cloud computing?
a collection of loosely coupled, interdependent industries that provide related services and products across many industries.
What is a business ecosystem?
they carried continuous electronic waveforms
What is a characteristic of a legacy or old analog network?
technical and economic
What is a component of a feasibility study?
Used to analyze a business unit, or a single unit
What is a data mart business application?
A hacker attempt to tie up network host resources making them unavailable
What is a denial of service attack?
they are very difficult to return
What is a disadvantage for purchasing digital goods?
single table with no structured relationships
What is a flat file database?
An expensive application used by large businesses to improve computer network performance without having to physically change the network. It is not necessary for small businesses
What is a hypervisor?
economic, compatibility, limitations
What is a key factor to consider when evaluating system alternative?
introducing business process changes slowly will make the transition to the new system less disruptive, and there will be less resistance to the change
What is a management solution when developing global systems?
Explain why a business would use metrics to measure the success of strategic initiatives
What is a metric? A metric is nothing more than a standard measure to access performance in a particular area. Business leaders want to monitor key metrics in real time to actively track the health of their business.
a physical node with an IP address.
What is a network host? This is also known as data terminal equipment in computer networking hardware.
arbitrator and consultant
What is a primary role of a systems analyst?
a major corporation in the industry that can provide leadership and resources to the smaller counterparts.
What is a private industrial network?
a signal strength detection process to identify the best wireless access point locations.
What is a radio frequency survey?
VPN (virtual private network)
What is a secure tunnel through the internet using a public infrastructure?
clickstream
What is a series of human or user Web visitor page requests?
Caseficio Scalabrini
What is a successful business that uses big data to find flaws, boost production, and rootlet counterfeiters?
TCP/IP
What is a universal telecommunication network protocol that most operating systems can recognize?
it allows visitors to access the internet
What is an advantage of a wireless LAN?
the ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes.
What is an advantage of information management?
brainstorming
What is an alternative tool that requires a group of users to collectively review and analyze the alternative, prior to making a decision.
databases that contain multimedia files or executable code in records or fields.
What is an object oriented database?
data terminal equipment
What is another name for a network host?
easy access to information
What is both an advantage and disadvantage to information management?
it is characterized by noticeable impact to the organization
What is considered to be low level security risk during system post implementation?
the management of resources that facilitate access to information
What is information technology management concerned with?
college computers, logins, network access, help desk support, and keeping the technology maintained, upgraded and secure
What is information technology management responsible for in a college setting?
describes Internet sites that emphasize usability, interoperability, and active user-generated content.
What is meant by Web 2.0?
Informal user support means training, communication, and acceptance.
What is meant by informal user support when a system comes into production?
How stakeholders respond to system changes
What is meant by the political aspect of a feasibility evaluation?
Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.
What is more efficient data packet switching or circuit switching?
allowing users to experiment with the system during development.
What is one way to define user requirements?
channels and analyzes to assist executives in making orders, pricing, and inventory decision.
What is supply chain management software used for?
scalability
What is the ability of a network to grow user and services without forklift upgrades?
denial of service
What is the act of bringing a network host down?
information management
What is the application of management techniques to collect, communicate, and process information in order to make better management decisions?
connect large business to backbone of internet
What is the definition of a core router?
a discrete, non continuous electrical waveform
What is the definition of a digital signal?
dividing database for manageability
What is the definition of a partition in database concepts?
records where a user clicks on a web page
What is the definition of clickstream?
getting data from data sources
What is the definition of data extraction?
a process to ensure data is not corrupted
What is the definition of data integrity?
single table database
What is the description of a flat file database?
ICR (intelligent character recognition) is an intelligent or advanced form of OCR. (optical character recognition
What is the difference between ICR and OCR?
primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables.
What is the difference between a primary key and a foreign key in a relational database?
Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms..
What is the difference between an analog signal and a digital signal?
Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the internet.
What is the difference between data mining and web mining?
to evaluate the quality and functionality of information and output
What is the focus of a functional evaluation of a management information system?
it serves as the depository of all extracted data for the load function of the data warehouse
What is the function of the data integration service in business intelligence?
The most important activity is determining access points and locations. - Access point number and location have significant impact on performance.
What is the key planning activity when setting up a wireless network?
provide vision and leadership for IT initiatives
What is the key role of the CIO
maintaining corporate security, both physically and digitally
What is the main role of the chief security officer (CSO)?
analyze and modify software systems, implement and test programs, and document software requirements
What is the main role of the software analyst?
social engineering
What is the method used by hackers to develop a relationship with users in order to extract information?
analysis, design, and implementation
What is the overall job function of the systems analyst?
1G enabled mobile voice telecommunication while 4G offers voice, data and video
What is the primary difference between a 1G cellular network and the current 4G network?
decision making
What is the primary role of information systems managers?
an analysis to determine if a proposed system is possible, evaluates cost, return on investments, and the likelihood of project success.
What is the relationship of a feasibility study to an information system development project?
fiber optics, ethernet, radio frequency
What is the required mediums for communications
manage company workflows, identify and fix network issues, and maintain equipment and software
What is the role of the computer systems administrator?
Controller
What is the title of the cloud fabric person who monitors and provides cloud resources to users?
a study to determine economic feasibility
What is the total cost of ownership? (TCO)
scrum
What method can address unexpected changes or challenges that cannot be addressed effectively with SDLC?
Any post or activity that represents discriminatory behavior
What social media activity should be avoided by job seekers?
documentation
What step in system implementation documents all system specifications
Group decision support system (GDSS)
What system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?
ESS (executive support systems)
What systems do upper management use for decision making?
normalization
What takes place during the database design process to eliminate data redundancy?
RFID
What technology is used to track inventory and can be read hundreds at a time, even if the tag is covered?
internal enterprise data, as well as external data from financial, industry, and trade databases
What type of data is included in executive support systems? (ESS)
transactional processing systems
What type of management information systems do operational and middle management use for structured decisions?
Bargaining Power of Customers (Buyers)
When consumers have many options of where to buy a product this threat is high. Some businesses will implement customer loyalty rewards to encourage a buyer to continue using their products. Many credit card companies offer perks to encourage you to do business with a particular lender. If there are few purchasing options for a consumer, then this risk is low.Buying in large quantities results in lower prices for the buyer and lower profits for producers.
perform a strategic analysis
When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits?
A feasibility study looks at financial, technical, and organizational issues that could impede success.
When performing systems analysis, why is a feasibility study important?
data dictionary
Where would metadata about customer and product tables be stored?
The waterfall model
Which model is appropriate when system requirements are clear, well-documented, and unlikely to change. This model is also useful when the technology is understood and will not change, when the project is relatively short term, and when sufficient resources and expertise are available to support the process.
DSS
Which system helps support business decision making activities by manipulating and building upon the information from the systems below it in the hierarchy?
value chain analysis
Which views a firm as a series of business processes that each add value to the product or service. The goal of value chain analysis is to identify processes within a firm that the company can add value for the customer and thus create a competitive advantage for itself, with a cost advantage or a product differentiation.
instant message
While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which internet application?
they can be mined or analyzed for trends or patterns
Why are data warehouses beneficial to business managers?
Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable. peer-to-peer allows file sharing
Why do home office or small business computer networks sometimes use a peer-to-peer topology?
to capture this new community of users and to address issues of social care
Why is it imperative that modern businesses have a social media marketing strategy?
Alternative solutions should be evaluated for system compatibility with existing architecture and organization, return on investment, and scalability.
Why is it important for companies to evaluate various alternatives to a system development program?
analytics would affect the database performance
Why is it not good practice to perform analytics on an online transaction processing database?
budgets are reduced, and the implementation team takes on new tasks.
Why is providing user support after system production a challenge?
they must be able to communicate system capacities and benefits.
Why must a systems analyst be a good communicator?
Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC
WiFi
Signals that travel through the air can be intercepted and decoded using sniffing techniques. Sniffing wireless networks can lead to network spoofing and probing, giving hackers access to the network.
Wireless networks enable communication via the air through the radio frequency spectrum. These signals are easily intercepted because they are travelling through open space, in contrast with wired networks. Identify the key risks to network security using radio frequency spectrum or wireless networks.
Wireless sensor networks (WSN)
Wireless sensor networks (WSN) are location or spatially distributed sensors that emit wireless signals with specific information.
direct implementation
With ________________________, the old system is replaced by the new system without any rollout or overlap.
Cultural difference can have an impact on the successful implementation of a global business strategy, which includes in part offshoring and/or outsourcing. Which of the following elements of cultural differences can play a role in the successful implementation of the global business strategy? Choose all that apply: Workforce motivation Cultural Norms Perceived lack of talent Language barriers Check My Answer
Workforce motivation Cultural Norms Perceived lack of talent Language barriers Check My Answer (Page 17)
A company wanst to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently
Write guildlines for usage of technology
Which of the following are common organizational features that should be considered when building and using information systems? Structure Incentives Environment Culture Politics
Yes No Yes Yes Yes (page 10)
unit testing, system testing, and acceptance testing.
You are testing a new system implementation. What are the three elements of the testing phase?
Product ID
You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. What would be an appropriate field to sort the data?
False Correct. Analytic applications are a type of application, not an operating system; they are used to measure and improve business performance.
[True/False] Analytic applications are a type of operating system that are used to measure and improve business performance.
WSN's WSN's Wireless sensor network
________ are networks composed of sensors located in strategic locations and are able to transmit and receive signals via built-in antennas, but they are NOT considered antenna mesh. __________ are sensor networks, not wireless network access points. A company that wants to monitor a warehouse temperature across various locations can deploy a _________________________ to relay temperature information.
WEP Wi-Fi Protected Access
_____________ is a legacy wireless encryption protocol. WPA is a newer more secure encryption protocol for wireless networks and stands for ________________________. .
Wireless LAN
______________ can offer businesses greater productivity, cost savings and can be easily changed and configured. They are more scalable than wired networks and can be easily configured and changed in any topology.
Quality Reliability
_______________ refers to the factors that affect system design, behavior, and the user experience. _____________ is concerned with inconsistent output, system failure, and system unresponsiveness.
Job recruiters
_________________ have mentioned that inappropriate or provocative photos or information and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities
Decision trees
__________________ are graphs that use a branching method to illustrate every possible decision outcome.
Sniffing
__________________ is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding
Prototyping
____________________ is a four-step process in which an experimental system is quickly and inexpensively built and provided to end users for evaluation, and is then refined based upon user feedback.
Rapid application
__________________________ development allows adaptability because specifications are developed during the process.
Parallel adoption
___________________________ is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented
Systems analysis
___________________________ looks at an organizational problems and determines if it can be solved with an information system.
Total cost of ownership (TCO)
____________________________ is one method for determining the economic feasibility of a system or project. ______takes into account the total costs over time, including hardware, software, labor, lease fees, and licensing.
Information Repositories
__________________________________ also known as knowledge centers, provide helpful information to remote suppliers, partners, employees, and customers, either for free or as a revenue-generating service. It does not transfer documents for businesses.
Function-oriented
____________________________evaluation examines the performance of data, hardware, software, networks, and human resources.
Voice over Internet Protocol (VoIP)
__________________________is a technology that enables the traditional use of a telephone, but with only a high speed Internet connection instead of a standard telephone circuit connection
Prototyping
_____________________is a four-step method that results in quick module development. This methodology develops software modules quickly and inexpensively for user evaluation.
Automation
______________is one of the desired critical outcomes of business implementation of a new or upgraded information system.
cold site
a backup location that provides only rudimentary services and facilities.
computer network
a collection of interlinked computers that can exchange information over links in the form of digital packets.
privilege
a collection of related computer system operations that can be performed by users of the system.
Multi channel service delivery
a company's offering multiple ways in which they interact with customers; ex email, fax, phone, web
Wi-Fi Protected Access (WPA),
a newer, more secure encryption protocol for wireless networks.
tunneling
a process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
Cold site
a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster.
What is the best definition of a project? a set of tasks that have no deadline and a constantly changing objective a planning activity a set of tasks with a clear objective and an ultimate deliverable
a set of tasks with a clear objective and an ultimate deliverable (Page 15)
trojan horse
a software program containing a hidden function that presents a security risk.
risk acceptance
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
risk limitation
a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
certificate authority
a third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
Interoperability
ability of 2 or more vomputer components to share info and resources, even if made by different manufacturers
Scalibility
ability of a ssytem to meet increased service demands
Click-fraud
abuse of pay-per-click, pay-per-call, and pay-per-conversation revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Central processing unit (CPU)
actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.
Global exporting
all services from the organization's home location means not changing the centralized structure and requiring all but production to stem from the centralized domestic location, including systems and data storage.
Collaborative engineering
allows an organization to reduce the cost and time required during the design process of a product.
FTP stands for File Transfer Protocol
and is a protocol used to transfer files from one computer to another.
OSI stands for Open System Interconnection
and is the foundation for data communication protocols
older Open System Interconnection (OSI) protocol that consisted of seven layers:
application, presentation, session, transport, network, data link, and physical. Before OSI became the standard protocol, computer networks used proprietary protocols.
Transmission Control Protocol, or TCP protocol, consists of four abstraction layers
application, transport, Internet, and network access
Consumer-to-business (C2B)
applies to any consumer that sells a product or service to a business over the internet.
Consumer-to-consumer (C2C)
applies to sites primarily offering goods and services to assist consumer's interacting with each other over the internet.
Implementation
apply selected option, monitor results, make corrections
Data
are more than just raw material; they are facts that are a valuable organizational resource that must be well managed to benefit all end users in an organization. typically input) can take on many forms, including alphanumeric data, text data, image data, and audio data.
Barcodes
are passive encoded images that have been used in logistics and inventory management applications.
Application Software
are programs that are commonly used by end users as a means of increasing their productivity by directly applying them to specific tasks inherent in the work they are responsible for accomplishing. Examples of application software include word processors, electronic spreadsheets, and presentation software.
Web developers
are responsible for creating and maintaining a company's website. This includes layout design, programming, and website usability studies. The web developer must have a good understanding of design (i.e., what customers find visually appealing), function (i.e., satisfying technical objectives), and form-factor (i.e., how to optimize the website for mobile devices).
Sales and marketing
are responsible for forecasting and creating demand for the products and/or services being offered and for making sure that customer needs and demands continue to be met.
Information security analysts
are responsible for the security of a company's network, data, and information. Security analysts must determine where a company might be vulnerable to a cyber attack and install or recommend protection against these threats, such as firewalls, data encryption programs, and changes to training or operational policy.
tactical goals, objectives, or decisions
are set or made by middle managers to support the organization's strategic direction.
Information systems specialists
are the people who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel.
Strategic activities
are those that are key to the overall strategy or direction in which the company is moving.
Growth and Product Differentiation
are two different types of business strategies.
Cloud computing and mobile platforms
are two of the fastest growing trends in MIS because mobile platforms for consumer and business applications are driving the need to move data to the cloud.
Protocols
are used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device.
Satellite communications
are used to link telecommunications networks over long distances.
Firewalls
are used to prevent intrusion into a network and are not related to data communication protocols. It can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion.
Sales force automation systems
automatically trachs steps in sales process; contact management, empower sales reps
Organizations gain many benefits with knowledge management systems, but one of the most important benefits is that the systems make _____ available for employees at any time so they can learn the most effective and efficient ways of doing things. Choices best practices data
best practices (page 12)
An integral component of planning and organizing IT systems for businesses includes which of the following?
blending the attributes of different IT system designs to meet the unique user needs of the business.A blended IT organization takes the attributes of different IT designs to meet the unique user needs of a business; these attributes may include delivering and maintaining IT infrastructure as well as optimizing important business assets, such as production, services, customer relations, and information management.
Database administrators (DBA)
build databases to store data to meet business needs. This is a growing profession because data are a tremendous business asset. designs the databases, ensures that the databases operate efficiently, maintains data security, and applies upgrades as needed.
Product differentiation strategy
can include offering a higher quality product or service. This product differentiation strategy is built on a business identifying a core competency and basing their business strategy around that core competency.
Mobile agent
can relocate itself onto different computer systems
Step #2 in selecting a computer system
categorizing, prioritizing, and finding conflicts in this list
WAN
collections of remote business campuses that use the Internet, private, and public switched networks.
Computer simulation
complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to determine "what if" analysis.
Storage
components include primary temporary storage and secondary long-term storage devices. Other storage includes peripheral devices such as external hard drives and removable media (floppy disks, optical discs, and flash drives).
Processing
components include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.
A bus enables
computer components to communicate with one another.
Client
computer that is designed to request information from a server.
internal bus
connects motherboard components to CPU
communications controls (network controls)
controls that deal with the movement of data across networks.
physical controls
controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
access controls
controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
Internet, video/audio communications, and PSN resulting in VoIP and smartphone applications
converged communication structure is based on what
Data resource management
database structures and how info is linked through primary keys
controls
defense mechanisms (also called countermeasures).
Communication plan
defines the how, what, who regarding the flow of project information and is key for managing expectations.
subjective
describes something; interpreted data
worms
destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
Capacity planning
determines the future IT infrastructure requirements for new equipment and additional network capacity.
Communication device
equipment used to send information and receive it from one location to another.
Supercomputer
fastest category of computer available.are purpose built to handle vast amounts of information very quickly.
Management information systems focus on technology, people, and organizations. They primarily serve _______. Choices: first level managers front-line staff consumers executives
first level managers (page 8)
RAM
gets instructions from ROM to launch the operating system during bootup.
Data definition subsystem
helps create and maintain data dictionary and define structure of files in a database
hyper text transfer protocol
http
coarse granualrity
info based on summaries of time periods; used by strategic management
Network and computer system administrators
install and repair computer systems, as well as identify and fix network issues. These IT professionals ensure a company's web pages are loading and emails were sent. Examples of professionals in this role might be server administrators, email administrators, capacity analysts, and network analysts. Network engineers design the system's network configuration.
trade secret
intellectual work, such as a business plan, that is a company secret and is not based on public information.
Decision making model
intelligence, design, choice, implementation
fax machine
invented before the internet, but developed based on telephone technology
chief information officer (CIO)
is a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects. This position requires strong organizational and interpersonal skills. The job focus is strategic in nature: developing and implementing the corporate IT strategy. The ___ must have a broad knowledge of IT.
Multicore processor
is a chip with multiple, independent, CPUs. Correct. A chip with multiple CPUs is called a _______. This typically provides more computing power for they can run multiple instructions in parallel.
Information Technology Infrastructure Library (ITIL)
is a common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change.
A service level agreement (SLA)
is a formal contract between a customer and the service provider detailing the level of service expected from the provider.
OS X
is a graphical user interface used on Mac computers since the early 80s.Used on Apple computers and runs on a UNIX engine, but with an easy to use graphical interface.
An intranet
is a network connection meant for internal use only, not to communicate with customers.
A router
is a networking device used to pass packets to the next network node until the packets reach the ultimate destination. _______ are used to connect multiple networks together and forward data packets between those separate networks to the destination host.
Unix
is a widely used operating system for multi-users.Primarily used on servers but does not support the range of applications that most users need on a desktop.
A standard
is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate.
Random access memory (RAM)
is temporary or short-term storage used by the processor.
Project management
is the application of planning, organizing, time management, leadership, communication, and problem-solving skills to accomplish an objective and deliverable on time and on budget.
chief operations officer (COO)
is the director of operations, responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas. The ___ ensures that the limited resources are used to provide the maximum value for stakeholders. This role communicates the organization's mission statement to employees.
COBOL (Common Business Oriented Language)
is the first computer language developed in the 1950s for business computing .
system bus,
is the medium through which communications between the input, processor, storage, and output occur.
Internet of Things (IoT)
is the network of products (or things) that can be connected, communicate with each other and with the environment, and transfer data over a network.
Knowledge management
is the process of sharing knowledge among people for the benefit of the business.
Offshoring
is the strategy of having tasks performed by companies in other countries using information technology advancements such as the Internet and cloud computing.
public switch telephone network (PSTN)
is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell.is a wired infrastructure, composed of wires, cables, switches, repeaters, and other telecommunication components.
The frequency
is the wavelength or position on the radio frequency spectrum in which the signals are exchanged. The _____ is measured in cycles per second, or hertz (named after the scientist who discovered wavelengths).
category 5 (Cat5) cable
is typically made of copper but is much smaller than copper building wire that is used to carry electricity.
Quality of Service (QoS)
is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.
A packet analyzer or sniffer
is used to monitor or log traffic on a network for troubleshooting or analysis. can be used by hackers to obtain authentication information needed to hack a network
Globalization
is/are making technology and information more difficult to manage because the barriers of language and geography have been broken down. Correct. Globalization is an advantage of information technology because it has broken down the barriers of language and geography; however, it is also making technology and information more challenging to manage.
Child Online Protection Act (COPA)
law that protects minors from accessing inappropriate material on the internet.
Wired Equivalent Privacy (WEP).
legacy wireless protocol, The earlier wireless encryption protocol was known as
End-user development
let users themselves create what they need; IT support is crucial!
In some cases, internal attackers, such as disgruntled employees, may introduce malware
logic bomb
A hard drive is
long-term storage that acts as a reserve aide for short-term storage or to store output data.
malware
malicious software such as viruses and worms.
viruses
malicious software that can attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection.
chief financial officer (CFO)
manages the company's cash flow and evaluates and communicates financial risks. The ___ is the financial planner and is responsible for analyzing the company's financial strengths and weaknesses. This individual must be transparent and accountable, providing financial data and advice to stakeholders. The ___ often works as a strategic partner with the CEO. For example, the CEO and ___ might work together in merger and acquisition strategies. (Mergers are when two companies join as one company; acquisitions are when one company buys another company as the new owner.)
Choose the two essentials for successful project management. Choose 2: managing people managing communications managing information systems
managing people managing communications (Page 15)
Association or dependency modeling
market basket analysis
multinational organization
means that organizational divisions would be headquartered in different locations, whether partially with an international organization or completely with a transnational organization.
denial-of-service attack
means to disrupt, interrupt, or suspend services of an Internet host computer.
Client/server network
model for applications in which the bulk of back-end processing, which involves communicating with the users, is handled by the clients.
Network database
more flexible than hierarchical, data defined in sets, must define ALL potential relationships ahead of time
computer systems analyst
must combine business knowledge with technical expertise. to analyze a user's needs and determine the most efficient and effective solution.makes hardware and software recommendations, performs cost analysis, and oversees the implementation and troubleshooting of new systems.
A Converged
network is able to carry data, voice, and multimedia information.
One business owner specializes in Web design and graphic design. A second business owner specializes in email marketing and social media marketing. A third business owner focuses on Web programming. The three business owners work together with some clients and refer some clients to each other. These business owners have a created a _____ among their businesses. Choices: Network-Based Strategy Merger Competition
network-based strategy (page 11)
error rate
number of mistakes a system generates per thousand or million transactions
Host-to-host communications
occur on the transport layer on the same or different hosts, as well as on the local network or any network remotely connected through a router.
A spoofing attack
occurs when network access is obtained without authorization, and can occur on both wired and wireless networks.
five bits set to ___
off
asynchronous
one advantage of ________________ communication is sending or replying to messages at a time that is convenient and not in real-time.
Motherboard
or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system
asynchronously
organizations can communicate ____________ with their clients via bulletin boards, blogs, and streaming videos.
synchronously
organizations can communicate ________________in real time, with their clients using online chat or instant messaging applications
IT managers, project managers, and architects
organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization. These individuals often have many years of general (for IT managers and IT project managers) or specific (for IT architects) work experience or training in IT in one or more disciplines, such as software development, information security, networking, and database or systems administration.
Non-management
perform daily tasks
Storage devices
portable hard drive, flash drive, tape drive, Cloud, etc.
chief executive officer (CEO)
president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund. In larger companies, this position deals with high-level strategies and overall business growth planning.
Test analytics
process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)
Text analytics
process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)
Utility Software
programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring.
Web forms
provide direct data input into a business from a remote location.
Specialized application software
provide tools and resources used to facilitate specialized functions, including smaller examples of more powerful enterprise applications.
The accounts payable, accounts receivable, payroll, and other processes
provide valuable information for the overall organization for the purposes of budgeting, planning, and control.
computer support specialist
provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues.
Database software
provides tools and resources to create and manage small databases.
Collaboration software
provides tools and resources used to connect and facilitate electronic communication and collaboration between users.
Desktop publishing software
provides tools and resources used to create professionally printed materials. Examples include Microsoft Publisher, QuarkXPress, and Adobe InDesign.
Presentation software
provides tools and resources used to create slideshows, presentations, and narrative videos
Multimedia software
provides tools and resources used to create, edit, or manipulate photos, images, animations, videos, and three-dimensional objects.
Development software
provides tools and resources used to create, edit, or manipulate web pages and software applications.
Report generators
quickly define formats of reports
Wireless communication is transmitted over _________ through the _________.
radio waves atmosphere
Repeaters
receive and retransmit data at higher power so it can travel over long distances. They strengthen or amplify signals for long transmissions, but do not serve a broadcast function in a network and do not store data.
Software
refers to pre-packaged sets of coded instructions that end-users directly interact with, in order to indirectly communicate with the other major components of the information system to get tasks done.
File storage and hosting
refers to repositories of information, storage for retrieval, or archival of documents.
Technical Consideration
relate to hardware, software, data management, and networking (solving business problems)
Data warehouses can be described as repositories of data from several sources and are mostly used for _______ and for________ to help management decision making.
reporting, analysis
Moden management
representation of a situation, statistical models or equations
Capacity
represents the maximum throughput a system can deliver;i.e., capacity of a hard drive represents the size or volume.
Chief knowledge officer (CKO)
responsible for collecting, maintaining, and distributing the organization's knowledge.
Chief privacy officer (CPO)
responsible for ensuring the ethical and legal use of information within an organization.
Chief technology officer
responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.
Chief information officer (CIO)
responsible for overseeing all uses of information technology, ensuring strategic alignment of IT with business goals and objectives.
Integrity Constraints
rules that help ensure the quality of the information
Open source software
s developed collaboratively, and the source code is available to anyone. The Linux operating system and Mozilla Firefox are examples of open source software.
chief security officer (CSO), sometimes also called the chief information security officer (CISO),
s the highest level executive concerned with the overall security functions and policies of a business. identifies business protection goals, works with the other executives to identify and analyze risks, and prioritizes security needs. works with vendors and consultants to ensure both physical and data security.must have up-to-date knowledge and experience in information security because it is a rapidly changing field. Important traits for this position include good judgment and excellent planning ability. Due to recent security breaches, the chief security officer job has become more critical to organizations. The U.S. president recently declared cyber-threats, breaches to critical technology infrastructure, a national emergency.
Clustering
segmenting a heterogeneous population of records into a number of more homogeneous subgroups.
Community cloud
serves a specific community with common business models, security requirements and compliance considerations.
Communications protocol
set of rules every computer follows to transfer information
Because data warehouses consist of data from__________ systems with different formats, the ETL process must be carefully designed to ensure data_______ during the load process
several, integrity
Simulation software
simulates actual systems and is typically used for training, entertainment, or research.
cookie
small amounts of information that web sites store on your computer, temporarily or more or less permanently.
software agent
small piece of software that acts on your behalf
Cache memory
small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.
anti-malware systems (antivirus software)
software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
Internal
specific operational aspects of an organization
A business benefit of enterprise resource planning systems is standardized business procedures. ease of implementation. ease of use. higher salaries for executives.
standardized business procedures. (page 12)
Moore's Law
states that the number of transistors in an integrated circuit doubles every two years. _________coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.
Knowledge management systems (KMS)
strive to reach organizational goals by making the best use of corporate knowledge. These systems focus on methods of capturing, refining, developing, and storing this knowledge.use technology, such as the Internet, collaboration software tools, and databases, to facilitate the capturing of corporate data.
Electronic communications,
such as email, instant messaging, and video teleconferencing, help a business to operate with a reduced need for travel, and even allow employees to work from anywhere.
Pivot table
summarizes by sorting, counting, totalling cells
A system where businesses work together to create a product or service for a customer is called a _____ Choices: supply chain management system customer relationship management
supply chain management system (page 12)
A bank software company purchases another bank software company and begins utilizing employees from both development teams to create a new software product for their clients. The bank software company is benefitting from the _____ created through the acquisition. Choices: synergies Core competencies
synergies (page 11)
employee monitoring systems
systems that monitor employees' computers, e-mail activities, and internet surfing activities.
False: The PBX system is based on the telephone technology and does not require the Internet to function.
t or f: The Internet is the backbone for PBX. (private branch exchanges)
Cloud analysis
technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different group as far apart as possible.
One of the trends that is influencing the globalization of business is the increased role played by ________. technology offshoring outsourcing
technology (Page 17)
network of physical devices exchanging data in real-time with embedded chips to communicate performance over the internet.
the IoT (internet of things) is a growing topic in business and a hot IT career field. What best describes IoT?
POP post office protocol
the application layer of the Internet standard protocol and is used to retrieve email from a mail server
Confidentiality
the assurance that messages and information are available only to those who are authorized to view them.
The two objectives of data normalization are
the elimination of redundant data and ensuring that data dependencies are related.
Competitive intelligence
the process of gathering information about the competitive environment, including competitor's plans, activities, and products, to improve a company's ability to succeed.
User interface
the way for the decision maker to interact with the system
Enterprise resource planning systems (ERP)
tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. The focus for ERP is more internally focused on the business functions.
Relational database models were first developed in the 1970s. It has become the most widely used database model in business. Which one of the following traits is NOT one of the benefits leading to widespread use of relational database?
tree-like structure
Strategic information systems
use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage. The competitive advantage might involve better prices, better service, or perhaps a more innovative product.
Customer relationship management (CRM) systems
use technology to merge marketing with business processes to strengthen customer relationships and organize customer information. CRM begins with marketing to earn customers. Once a purchase is made, the business works to create a high-value customer who generates a revenue stream for the company. CRM manages the customer relationship, often in a very personal way, to develop a long-term relationship with that customer.
Predictive Analysis
uses infor and business analysis to build a predictive model for a given application
structured query language
uses relational databases to look for info
Data inconsistency is prevented by?
using referential integrity rules that ensure that the relationships of data between tables is consistent. Referential integrity rules prevent a user from adding a record to a table containing a foreign key unless there is a similar record in the linked table.
What does offshore outsourcing mean? using internal resources and contractors using internal and external resources to staff projects using resources that reside outside the country in another geographical region using contractors to staff projects
using resources that reside outside the country in another geographical region (Page 15)
Tertiary storage
usually consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. With the intention of storing unchanging data, regular and frequent snapshots or backups of data are placed on magnetic or optical media and then stored and/or removed from the automated system and archived.
Large organizations leverage _____ network management applications to better handle changes and moves.
virtual
John Von Neumann
was the first to write about the computing structure
Cloud bursting
when a company uses its own computing infrastructure for normal usage and access the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes.
Duplicated systems development
where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations
web-enabled storefront
which enables the facilitation of e-commerce, yet another channel for a business to conduct business through.
he most common protocol is TCP/IP
which establishes the connection, and data packet quality transmission.
Electronic Data Interchange (EDI),
which is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. It is most commonly used to exchange reports, purchase orders, or view invoices.
Database management systems allow businesses to organize large amounts of information. What is a popular online, collaborative database that contains a massive collection of data, categorized according to keywords and topics?
wikipedia
Computer programmers
write code to instruct computers to perform certain tasks.must have an eye for detail, along with strong analytical and problem solving skills.
Implementation stage
write detailed user documentation, provide training
Different Departments in Companies ■ Accounting ■ Finance ■ Human Resources ■ Marketing ■ Operations Management ■ Sales For the firm to be successful, all departments must work together as a common unit and share information, and not operate independently or in a silo.
■ Accounting - Monetary Data - Records, measures, and reports monetary transactions. ■ Finance - Monetary Data - Tracks strategic financial issues including money, banking credit, investments, and assets. *Human Resources - Employee Data -Maintains polices, procedures and plans for the effective management of employees. ■ Marketing - Transactional Data - Support sales by planning, pricing, and promoting goods and services. ■ Operations Management - Production Data - Manages the process of converting or transforming resources into goods or services. ■ Sales - Transactional Data - Performs the function of selling goods or services.
Four challenges associated with ebusiness.
■ Identifying Limited Market Segments. The main challenge of ebusiness is the lack of growth in some sectors due to product or service limitations. ■ Managing Consumer Trust. Internet marketers must develop a trustworthy relationship to make that initial sale and generate customer loyalty. ■ Ensuring Consumer Protection ■ Adhering to Taxation Rules. Companies that operate online must obey a patchwork of rules about which customers are subject to sales tax on their purchases and which are not
1) Information Type TRANSACTIONAL AND ANALYTICAL
■ Transactional information encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. Organizations need to capture and store transactional information to perform operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry. ■ Analytical information encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. Analytical information is useful when making important decisions such as whether the organization should build a new manufacturing plant or hire additional sales personnel. Analytical information makes it possible to do many things that previously were difficult to accomplish, such as spot business trends, prevent diseases, and fight crime.
Describe web 1.0 along with ebusiness and its associated advantages
■ Web 1.0 - Web 1.0 refers to the first stage in the World Wide Web, which was entirely made up of Web pages connected by hyperlinks. ■ See pic for ebusiness advantages
public-key encryption
(also called asymmetric encryption) a type of encryption that uses two different keys, a public key and a private key.
Mr. Alexander Graham Bell
_____________________________________was the inventor of the telephone more than 130 years ago
database applications enable businesses to store and analyze essential sales data
How can database applications help managers respond to changing market conditions?
Porter's Five Forces Model
1) Knowledgeable customers can force down prices by pitting rivals against each other. (buyer power) 2) Influential suppliers can drive down profits by charging higher prices for supplies. (SUPPLIER POWER) 3) Competition can steal customers. (RIVALRY AMONG EXISTING COMPETITORS) 4) New market entrants can steal potential investment capital. (THREAT OF NEW ENTRANTS) 5) Substitute products can steal customers. (THREAT OF SUBSTITUTE PRODUCTS OR SERVICES)
Information Partnership
2 or more companies cooperate by integrating IT systems, offereing customers the best of what each can offer
1. mobility 2. less expensive to deploy and maintian 3. scalability and flexibility in configuration
3 Reasons why businesses are deploying wireless networks
Computer Network
A group of two or more computers and other devices connected to each other, is a telecommunications network that enables computers to exchange data resources and information. They support the interactions between people, as well as the interactions between end users and the other components of an information system (e.g., hardware, software, and data resources).
A grocery store has an extensive inventory control process. They carry thousands of products and shelf-space for those products is competitive. If the grocery store is out of a particular item, then they are losing money. They need to keep all of their products in stock to meet customer demand and make a profit. This grocery store should consider looking into which system to help manage this type of information? A knowledge management system An enterprise resource planning (ERP) system A supply chain management (SCM) system A customer relationship management (CRM) system
A supply chain management (SCM) system (page 12)
Investment management, budgetary control, auditing; economic forecasting; global stock exchanges; managing multiple currencies Choices: Production and Operations Accounting and Finance Human Resources
Accounting and Finance (page 10)
65 years and older
Although teen usage of social media exceeds that of adults, what adult demographic is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?
TELNET
An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure, and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP).
Why an organization would want to integrate its databases
An integration allows separate systems to communicate directly with each other.
is a control known by quite a number of divisions and departments within an organization. to an accounting department implies that an impartial and independent third party will determine if policies and procedures have been followed, and whether fraud exists within the organization's finances.
Auditing
Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Mary has dinner plans with friends after work. Due to heavy traffic she realizes she will not be able to get to the restaurant at 6 p.m. as planned. She texts her friends and moves the dinner to 7 p.m.. Choices: Acceptance Avoidance Sharing Reduction Transferance
Avoidance (Page 15)
What are the two fastest growing trends in MIS that are impacting IT careers? Cloud computing and mobile platforms Centralized database and closed standards Mainframes and legacy software
Cloud computing and mobile platforms (Page 14)
Business Intelligence
Collective info about customers, competitors, business partners, competitive environment, own internal operations; used to make effective strategic decisions
What do database management systems provide?
Database management systems provide support for data integrity, keeping the database accurate and safe from unauthorized changes. Some organizations enforce a principle of least privilege, which suggests that to avoid fraud, abuse, and theft, personnel are given only enough access to a database in order to complete tasks within their job.
Enterprise resource planning systems typically utilize one _______________.
Database. Enterprise resource planning systems typically utilize one database to store all the information needed by the various business units. This allows for consistency within the business.
Planning
Define system to be developed, scope, and plan
Which of the following examples represents a one-to-one type of relationship between entities?
Each person has one social security number
Joe's Tire Store has been in business for 20 years. Last month, a new warehouse store opened a mile away. The warehouse store is able to sell tires at a bigger discount, and this is very concerning to Joe. Businesses must operate in the midst of many pressures. Which of the following pressures represent Joe's current dilemma? Economic pressure Political pressure Cultural pressure Technological pressure
Economic pressure (Page 15)
You need to design information systems that serve the existing organization, but you must be ready and willing to restructure the organization to take advantage of the improvements an information system can offer. Which takes precedence, the organization or the information system? Explain your reasoning.
Explanation: Neither takes precedence. The goal in designing and implementing information systems is to try and adapt the system to the organization and vice versa. Change is challenging for most organizations, so it must be done carefully and strategically. Changing the way things have been done in the past too quickly could create chaos, so implementing organizational changes and new systems incrementally will help and allow adaptation to occur more smoothly. Communication and training to all those involved is key. Introducing the changes gradually will be less disruptive for the business, if that is possible. (page 10)
communication and training
How are user expectations best managed during system implementation?
When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Supplier Choices: Internal External
External (Page 15)
Which industry would be the most affected by The European Union Data Protection Directive (1998)
Financial services, healthcare, and travel industries are industries most affected by the European Union Data Protection Directive because they involve a large amount of personal customer information.
Describe the seven phases of the systems development life cycle
Following are the seven phases of the SDLC: Planning (1), Systems Analysis (2), Systems Design (3), Development (4), Testing (5), Implementation (6) and Maintenance (7)
Which main business function is responsible for maintaining employee records? Human resources Finance and accounting Sales and marketing Production and operations
Human resources (page 10)
Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Data, voice, and video equipment
IT (page 9)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.
Infrastructure as a service (IAAS)
Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail _________________ in number of users and user management.
Enterprise resource planning (ERP)
Integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations, at all times.
Explain why software problems are business problems.
MIS project failures can cost companies financially or even ruin business reputations. The primary reasons for project failure are: ■ Unclear or missing business requirements ■ Failure to manage project scope ■ Failure to manage project plan ■ Changing technology
Chapter 18
Methodologies for Supporting Agile Organizations"
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Digital divide
Neg (page 9)
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Misinformation
Neg (page 9)
Information systems support an organization's many functional business areas. These functional areas can be grouped into what two main categories? Marketing and sales Operations and management Finance and accounting
Operations and management (page 10)
transmit discrete, parsed data in small packets
Packet switching refers to a computer networks ability to do what?
Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Globalization
Pos (page 9)
Explain project management and identify the primary reason projects fail.
Project Management—The application of knowledge, skills, tools, and techniques to project activities to meet project requirements. Primary reason for failure: ■ Unclear or missing business requirements ■ Failure to manage project scope ■ Failure to manage project plan ■ Changing technology
You are helping to design a spreadsheet table for accounting. You explain to the team that a spreadsheet table is similar to a database; the difference is that database tables have ________
Relationships
Prototyping
Sample of final design, users try it and give feedback
field- describes one piece of information for each record.
Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title _______________ for a listing of the book
Describe the relationship between information security policies and an information security plan.
See Pic
Describe the six major categories of hardware and provide an example of each
See Pic
Describe the three Business 2.0 tools for collaborating.
See Pic
Explain MIS infrastructure and its three primary types
See Pic
Explain topology and the different types found in networking.
See Pic
A system used to provide services to other systems. Servers need not be powerful computers. Server operating systems may be used on personal computers, including desktops or laptops, though usually servers are built on more resilient and reliable components.
Server
Tara has a blog about celiac disease and has many followers that want to discuss recipes and share with her. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping
Social Media Networking (page 9)
Assume you are leading a team of project managers and conducting training for your group. Your objective for the day is to identify reasons that projects fail, with the ultimate goal of having each of your project managers assess their projects for potential risks. Identify reasons that projects fail from the list below. Choose all that apply: Stakeholders not supporting project manager through project milestones. Too much or too little planning and evaluation prior to project launch. Lack of stakeholder engagement during planning and implementation.
Stakeholders not supporting project manager through project milestones. Too much or too little planning and evaluation prior to project launch. Lack of stakeholder engagement during planning and implementation. (Page 15)
Strategic
Strategic Decision Making—Managers develop overall strategies, goals, and objectives
2) Information Timeliness
Timeliness is an aspect of information that depends on the situation. Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to requests. The growing demand for real-time information stems from organizations' need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully. Information also needs to be timely in the sense that it meets employees' needs, but no more.
Search engine optimization
Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.
True or False. Relational database systems give organizations the ability to analyze data to make better and faster managerial decisions.
True
True or false. The decision to outsource or go offshore with a project is based on a lack of core competencies inside the business or where there is financial savings in labor cost.
True (Page 15)
True or False. If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a multiplexer.
True Correct! Data signals travelling over computer networks are combined together by the use of a multiplexer.
UI design
User interface, keep end user in mind, get feedback from users to create clear, intuitive controls
RFID tags can be passive but not inactive. That is, they must respond or be powered by readers or interrogator signals.
Which of the following is NOT applicable to RFID tags? RFID tags can be inactive. RFID tags can be passive. RFID tags can be active. RFID tags can be active via battery power.
FCC The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.
Which of the following is a governing agency that determines what is and is not acceptable on the Internet?
distributed model
connect separate components at different locations or within different units
Data generation sybsystem
contains facilities to help develop transaction-intensive applications
Variable
costs that change to acquire and product the product
The revolutionary Internet innovation has provided corporations with many applications to conduct business. For instance, an organization can utilize ______ to transfer documents automatically without human intervention to their suppliers. They can communicate with their stakeholders via ______. Their suppliers can access product and inventory information from the ______ and their customers can shop 24/7 via the _______. .
electronic data interchange electronic communications information repositories Web-enabled
The Internet layer
exchanges data sequences (known as datagrams) across network boundaries, providing a uniform network interface concealing the layout of the actual network connections.
Fixed cost
expenses that never change (ie rent)
A hypervisor
is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network.Although hypervisors have no routing capability, they enable network management through virtual design and operations.
Linux
is an open-source operating system that works on many devices and is similar to many of the other graphical user interfaces.This is a free OS and a re-creation of UNIX, but more popular than UNIX for workstations. Millions of programmers participate in its development.
Cloud computing
is facilitated by many computers meshed or connected together in what is termed cloud fabric, which provides common resources to service providers.
productivity
key benefit to wireless LAN networks
A restaurant develops a new ordering system that allows for online ordering both from desktop and mobile sites. No other restaurant in their local area is offering online ordering. This restaurant is using a business strategy of _____ Choices product differentiation growth
product differentiation (page 11)
digital
technological advances have enabled the redesign of telecom networks to carry text, video, or voice over the same network using _______________________signals.
intellectual property
the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
risk
the likelihood that a threat will occur.
Relational database systems are valuable to organizations because ________.
they use SQL, which is easy to master, making it a very productive tool
back door
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
website address
unique name to identify a specific site
Multi table relationships
use different tables to keep track of various features of the same person
Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Even innocuous information tied with other innocuous information may, when combined, paint an attractive picture for identity thieves.
Dumpster Diving
(EDI) Electronic Data Interchange
What application provided by the internet allows a business to transfer documents automatically without human intervention?
volume, velocity, variety
What are the 3 V's used to describe big data?
False-Proprietary software is purchased by a license, which usually has an expiration or renewal date and download limits.
[True/False] Once a company has purchased proprietary software, there is usually no additional cost to allow other employees to download and use the software.
Conversion
__________________________ is the process of replacing the old system with new system.
is a programming environment that provides tools to developers to write code.
Integrated Development Environment (IDE)
Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.
Personal Computer (PC)
is temporary or short-term storage used by the processor.
Random Access Memory (RAM)
One high-profile example of a malware threat is.................... which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.
SQL Injection
A person interacts with digital data through a physical environment.
Tangible User Interface (TUI)
are actions by which individuals may help to avoid data theft, but that may have little to do with the computer-based actions mentioned below.
Behavioral actions
A computer language similar to HTML, XML makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.
Extensible markup language (XML)
of 1999, which requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act)
is an important decision point for a business to implement controls or security for any risk, because managers need to evaluate the benefits versus the financial cost for implementing these controls.
cost-benefit analysis
Issues created by barriers to access, implying that some should have access while others should not.
Accessibility issues
was the first computer software language for business applications
Common Business Oriented Language (COBOL)
Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.
Phishing
Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization. An obvious disadvantage and risk is that multiple tenants affected by a common event may cause a conflict.
Shared hot sites
which is the medium through which communications between the input, processor, storage, and output occur.
System Bus
DSS (Decision Support System)
This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends.
ensures that only authorized personnel are admitted access.
Confidentiality
which specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.
Acceptable use
is the application of responsibility or an obligation to accept responsibility. An example might be the person who has agreed to pay for a meal that she or someone else has consumed.
Accountability
ensures that access to resources is unimpeded.
Availability
a computer hacker** with criminal intent.
Black Hat
is a process by which a business identifies its critical processes, or those areas of its business that must occur without failure lest the business will also fail. Such planning defines specific lengths of time for acceptable outages, responsible parties, contact information, and partners that have assumed the risk of supporting emergency continuity services.
Business continuity planning
Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.
Cold sites
a loss of access created by cut cables or power services, malware, hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.
Denial of service
is that which is primed for discharge in the case that a disastrous event occurs and business operations need recovery. Such measures include the creation and execution of processes, and the assignment of certain people to help to restore a business to an operational state.
Disaster recovery planning
are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.
Ethics
Graphics, video, animations, and interactive multimedia are popular elements in Web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.
Graphics tools
a computer hacker** with skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or sold to the highest bidder.
Grey Hat
A form of supercomputer constructed from many smaller systems that have been connected together.
Grid computing
is a perceived, moral, or legal duty that someone possesses to control or handle a specific or general task.
Responsibility
Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.
Search engine optimization
is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. On the other hand, costs per byte for ........... have historically been quite a bit less than primary storage technologies. Examples of ............. include magnetic hard disk drives, which are spinning magnetic disks with moving read and write heads, as well as newer, more modern solid state nonvolatile flash storage. ............. also includes removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives.
Secondary Storage
A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.
Shoulder Surfing
This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind.
Supercomputer
A weakness in the technology, process and procedure, or people involved with any given information asset. Such ,,,,,,,,,,,,,,, may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization.
Vulnerabilities
With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or nonobvious relationships and connections, leading to breaches of privacy and trust.
Advanced Data Analysis
The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.
Attacks
A low tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. A victim, through greed or curiosity might take such a device and plug it into a corporate computer, perhaps attempting to identify or return it to its owner or merely to obtain the value of the materials contained, but receive malicious code.
Baiting
include those actions that require the use of a computer to apply. Several tactics and strategies exist, though each is derived from behavioral actions, strategies, and tactics. Awareness, understanding threats, minimizing or eliminating risks of loss, and acting to ensure fraud and abuse is limited or eliminated will reduce the potential for impact from computer-related sources.
Computer based actions
of 1974, which requires educational institutions receiving certain federal funding to protect the information and privacy of certain aspects of a student record.
Family Education Rights and Privacy Act (FERPA)
of 1996, which requires organizations and individuals who handle medical information to adhere to rules and procedures for billing and information transfer.
Health Insurance Portability and Accountability Act (HIPAA)
A chip with multiple CPUs is called a ........ This typically provides more computing power for they can run multiple instructions in parallel.
Multicore processor
Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.
On Premises (private cloud)
components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).
Output
A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information such as names, addresses, phone numbers, usernames and passwords, and security questions and answers. One particularly insidious example of pharming is DNS poisoning, which changes the DNS record for a specific site to redirect all requests and web access to another specific site, even without providing the user with a fraudulent phishing message.
Pharming
of 2002, which requires organizations to adhere to rules and procedures to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements.
Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act)
An exchange of something of value for information. For example, the gift of a T-Shirt in exchange for personally identifiable information.
Quid Pro Quo
A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Organization entry points are often protected by electronic badge access, which may be circumvented by not allowing a door to close properly, or authorized personnel who are not observant, are ignorant of or not properly trained in information security, intentionally or unintentionally allowing an unauthorized person to enter an otherwise locked door.
Tailgating
MIS (Management Information Systems)
This system provides first level managers with reports that provide performance and historical records that help keep a business running smoothly.
EIS (Executive Information Systems)
This system supports senior executives in the form of data, graphs, charts to analyze long term trends.
The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization.
Threats
A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.
Virtual computing
Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.
Warm sites
Many graphical and traditional text based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWIG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.
Web design tools
A more powerful system used by individuals in order to run more resource-intensive applications.
Workstation
a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.
Zero Day Attack
The evolution of software has produced the ability to manage large databases of information, known as
database management systems (DBMS)