MIS-180 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Know what HTML stands for, and that it is a very basic way to create web pages.

hypertext markup language -a simpler way to create web pages

What is the network protocol for the Web?

network protocol: the language of any network HTTP (hypertext transfer protocol) (HTTPS is for verified sites)

Who "owns" the Internet?

no one

know the two measures of information retrieval/search success: precision, recall

precision: the percent of the documents (pages) you found that are relevant to your search goals recall: the percent of the relevant documents (pages) that are "out there" and that you found -a higher percentage in both is better

Be able to look at a picture of a data base schema (like the Lorenzo Shipping example we used in class), and name the different parts.

relational tables, file name, field name, primary key, foreign key (relationships)

What does SEO stand for, and what does it mean?

search engine optimization goal: -indexers (advertisers and publishers) want to find out how people are searching for their product -searchers (consumers) want to find out how indexers are indexing their product -search engines like google and bing try to match advertisers and consumers -smart advertisers look at what consumers are asking for and how they're asking for it, then adapt their content to match that—that's SEO

know the difference between a business strategy and a business tactic

strategy -overall vision and goals for the enterprise's future -planning -large scale, deals with most of the enterprise -answers "what and why" -longer time frame -harder to measure -for every strategic goal -competitive strategies: 1. cost leadership or low cost producer: reduce inventory, reduce manpower costs/sale, help suppliers or customers reduce costs, increase costs of competitors, reduce manufacturing costs 2. differentiation: create a positive difference between your products/services and competition, may allow you to reduce a competitor's differentiation advantage, may allow you to serve a niche market 3. innovation: new ways of doing business, unique products or services, new ways to better serve customers, new distribution models 4. growth: expand into global markets, explain production capacity, diversify, integrate into related products and services 5. alliance: broaden your base of support (new linkages); merges acquisitions, joint ventures, "virtual companies"; marketing, manufacturing, or distribution agreements 6. focus/niche: focus on a narrow competitive scope within an industry, cost focus--low cost within that niche, differentiation focus--unique within that niche tactic -a set of specific actions that execute the enterprise's strategy -doing -smaller scale, deals with a part of the enterprise -answers "how" -shorter time -easier to measure -...there are several tactics

what is a cognitive miser? what does it mean as a way of describing how humans make decisions about information?

tendency of people to think and solve problems in simpler and easier ways rather than in more sophisticated and more effortful ways, regardless of intelligence

In looking at the I.S. Life cycle slide (Class 14a deck), why do the Benefits and Costs curves converge over time?

they converge over time because once you start selling the product, you are able to benefit from it. at the start it is more expensive because you have to work on developing it

what is the difference between a "true/useful fact" and a "false/misleading fact"

true fact/useful data: -this class has 170 students -sky is blue -she disagreed with the proposal -the computer doesn't work false fact/useless data: -this class has 1700 students/this class has a lot of students -the sky is paisley/ the sky is above -she had no opinion about the proposal -the computer does work misleading fact: -this class only has 80 students (today) -the sky is green (when a storm is brewing) -she didn't disagree with the proposal but she doesn't like it -the computer turns on

know an example of "triangulation" and "corroboration" when you see it

two strategies for building your own knowledge triangulation: taking a "read: from different sources -reading an article from fox, CNN, and the NY times corroboration: checking one's sources story against another source's story -comparing stories from articles to see different information/false information

what does the value chain mean, and why is it useful for business analysis

value chains are a process of what is needed to generate profit -value chain analysis: framework to help managers identify all activities that the organization must perform to conduct its business -virtual value chain: framework that looks at activities that turn raw data into useful information instead of looking at activities that turn raw materials into a final product like in manufacturing organizations

In developing systems, most companies use either the Waterfall or Agile model. Know the differences as we discussed in class, and why you - as a manager - might choose one over the other.

waterfall model -linear sequential -not best for feedback and learning -easy for most to understand -speedier if you totally know what you want at the end agile model -iterative -specifically designed for feedback and learning -harder for most to understand -good for end results which are novel/innovative

know the difference between bit and byte

we describe data with bits and bytes bit (b) -short for binary digit -smallest element of data either O (off) or I (on) byte (B) -a group of 8 bits, which operate as a single unit -represents one character or number -A: 01000001

What do we mean by "populating" a database?

when you populate a database file with data values, you create an instance -an instance is one particular record

what is the proper format for a calculation if you want to add, subtract, divide, or multiply two numbers by referencing their cell reference?

-addition: =A1+A2 --or sum: =A1:A3 -subtraction: =A1-A2 -divide: =A1/A2 -multiplication: =A1*A2

How do data brokers get your personal information?

-can get information from companies -companies track your visits on different websites -they buy and sell from each other -follow you around from site to site

How do we measure data transmission speed? How is that different from how we measure data storage capacity?

-measuring data in bits (b) not Bytes (B) -amount of data that can be transmitted over a channel per unit of time -technically, the range of frequencies that can be transmitted -measured in "bits per second" — bps measuring data transfer speed -kbps means: kilo, bits, per second -mbps means: mega bits per second -gbps: gigabits = 1 million Mb -tbps: terabits = 1 million Gb

when you say you are "information literate" what do you mean?

-understanding the role of information in generating and using business intelligence -know when you need more data, information, and knowledge -be able to locate, evaluate, and effectively use that data, information, and knowledge

know what these mean and which is bigger than the other: KB, MB, GB, TB, PB

1. Kilobyte (KB): one thousand bytes 10^3 2. Megabyte (MB): one million bytes 10^6 3. Gigabyte (GB): one billion bytes 10^9 4. Terabyte (TB): one trillion bytes 10^12 5. Petabyte (PB): one quadrillion bytes 10^15

What are the 4 parts of the "Fair Use" exceptions to the Copyright Law

1. if use is for noncommercial purposes 2. if work is factual, rather than creative 3. if you use only a tiny, insubstantial amount of the material 4. if your use does not affect the potential market for or value of the protected work. that is, your use is not a reasonable substitute for the original work

Know the parts of the "Prevention Checklist" in the class slides. Know what each means, and how each protects your computer.

1. network layer -firewall: computer or router that controls access in and out of the organization's networks -virtual private network (VPN): an application that sits between your other applications and the network --encrypt your data transmissions so that evil cant intercept and steal them --mask your identity and personal information so hackers cant steal it and so vendors can't capture it. masks your IP address --bypass geo-restrictions: lets you go through anonymous servers so that your local server can't track where you go, and the destination server doesn't know where you are -deny hacks/phishing/fraud 2. application layer -password vault-- password managers and two factor authentication -antivirus software --antivirus: keeps a database of the bad apps and checks them against known apps -antispyware software --spyware is like a form of malware, only it doesn't destroy your data, it collects it and sends it to a hacker or sleazy company -browser filters -download practices 3. data layer -operating system updates -backup practices --local backup and cloud backup -physical protection -disconnect your device -insurance

According to one study, on average, how much does it cost a company when a security threat becomes reality for a company resulting in downtime?

260,000 dollars is the average cost per hour of downtime

Know the difference among these tags <b>, <u>, <i>, <h1>

<b> makes text bold <u> makes text underlined <i> makes text italicized <h1> is a heading with the first heading size

Know the difference between the <ol> and <ul> tags, what they do

<ol> is an ordered (numbered) list <ul> is an unordered (bulleted) list

What's the difference between Google Ads and Google AdSense for publishers?

Google AdWords: for advertisers who want to buy ads to show to prospects on publisher's online properties Google AdSense: for publishers who want to show advertisers' ads for fees

Be able to identify a correct SQL statement from an incorrect SQL statement using the above, and how to fix it. For example, if I give you this SQL statement, you should be able to tell me if it's correct or incorrect. If it's incorrect, what's the problem? In this case, you would say "This is incorrect. The correct operator is WHERE, not WHEN" SELECT Cust_name, Cust_Address FROM CustomerData WHEN Credit_Rating > 10

In this case, you would say "This is incorrect. The correct operator is WHERE, not WHEN"

what does SWOT stand for, and what do managers use it for?

SWOT stands for strengths, weaknesses, opportunities, and threats strengths: asks what gives the organization advantages over others in its industry weaknesses: determines what activities create disadvantages for the organization relative to others in its industry opportunities: determines the activities or factors that could help the organization get new advantages over others in its industry threats: determines what activities or factors could create disadvantages over others in its industry

what's the difference between a stakeholder and a shareholder?

all shareholders are stakeholders, but not all stakeholders are shareholders shareholders of a company owns shares of stock, or equity, of that company (investors) stakeholders of a company benefit in some way from the operation of that company, which may not include owning stock -example: customers and suppliers

Know what a derived attribute is and how we get the value when we run a query

an attribute whose value is derived from one or more other attributes in the same entity

What is the dilemma we face as business professionals in dealing with the handling of personal information, as discussed in class?

as a business, you want to know everything about your customers so you can sell/serve them better as a customer, you don't want the business to know everything about you because then you lose privacy

Which has lower/higher bandwidth among these: Bluetooth, WiFi, Ethernet

bluetooth< WiFi< Ethernet

In what 3 ways do systems development projects often fail? schedule, budget, functionality.

budget: costs more than expected schedule: didn't meet the deadline functionality: product doesn't do the correct function

what are the 8 parts of any process or system? know how to recognize examples of any of them if described

- inputs example: boxes, people, conveyer belt -processes (that transform inputs) example: package goes on conveyer belt -outputs example: package is shipped to correct zip code -controls (that evaluate the process according to business rules) example: camera tunnels, people working, control uses feedback to fix any problems with the packages so they get shipped out on time -feedback example: signals; package ships out correctly, package label bad -adjustment example: camera sends bad label to people who interpret it -purpose or function that guide controls example: get boxes off belt so it doesn't overload -time

Know the names of the commercially available databases from these vendors Oracle, IBM, Microsoft, and open source.

-Oracle v2: SQL based RDBMS -IBM: relational database -Microsoft: SQL server express -Open source: SQLive—in public cloud

what is a fact? what qualities does a fact have?

-a type of data -indisputably true -a piece of information used as evidence or as part of a report or news article -a statement that is consistent with objective reality or can be proven with evidence -the usual test for a statement of fact is verifiability

Why should we, in a business, avoid using spreadsheets to store important data and instead use a database management system? Know at least 3 reasons

-spreadsheets and a DBMS both store information in tables of rows and columns, and even though the similarity is misleading, the two applications have very different purposes, strengths, and weaknesses -spreadsheets are good for simple storing tasks, but have limitations that make them unsuitable for more complex data storage problems with spreadsheets: -unnecessary duplication--data redundancy (repetition of data in the database) -inconsistent data--data inconsistency (identical types of data that are inconsistent with each other) -difficult to do efficient data retrieval and search--data isolation -easy to get access to it--data insecurity (data security: other users have easy access) -easy to make errors--data errors -poor data integrity (combination of all) database management systems -have methods for keeping data up to date and consistent reports from DBMS draw directly from databases, which typically contain current information *use a database to store information, use a spreadsheet to make sense of the information

Know the steps of the Rational Decision-Making process well.

-use when the decision is mostly structured -similar to the scientific method steps: 1. identify and define/describe the problem 2. define the requirements and goals of the decision 3. identify alternative solutions 4. define decision criteria 5. select appropriate decision making processes and tools 6. evaluate alternative solutions using criteria 7. check that the solution solves the problem

Know what the sense making approach is and when you would use it.

-useful when you don't know what is going on -useful for making unstructured problems more structured -sense making is: a process of creating meaning when there is no single meaning available; about interpretation and negotiation with others to form an agreed upon reality; happens when we are confused, when there are multiple conflicting interpretations of what's going on; happens when we are surprised that we are surprised; leads one to decide if a situation is a problem, a decision, a predicament, an opportunity, a dilemma, etc *tactics* action: do something and see what happens -example: doctors prod to see where pain is triangulation: take different readings from different sources -example: different people/roles, facts, impressions/opinions affiliation: share our sense with others -example: crowdsourcing contextualization: relate to something we do know -example: cost accountant comparing July's surprising sales to last July's sales deliberation: reflection, ponder, muse -example: simply need time to let things work through in your mind

What are the two main factors in securing data assets? Know what each means and what examples of each could be

1. authentication: a method for confirming identities -most secure type involves: something the user knows (dog name), something the user has used (password), something that is part of the user (fingerprint) 2. authorization: the process of giving someone permission to do something or have something

what are three ways businesses acquire software, and why would a business use one way over another?

1. build it -custom built -you program it -why build? an app doesn't exist on the market to do what you want, or it's more expensive than building it yourself -building process: you specify what you want, explain to a programmer what you want, programmer writes it using a programming language, you and the programmers test it, use a methodology like agile, waterfall, etc -takes a lot of time to write/test, and not always successful, risky 2. buy it -commercial, off the shelf (COTS), "packaged" -you buy it (or get it free if open source) -why buy? you have neither the time or expertise to build your own, and there are good products on the market. less risk than building -the buying process: you specify what you want, you explain to a vendor what you want, vendor proves their product is the best, you buy and install the product -less time to research, buy, and install than it does to program yourself. could be less customized, and you're dependent on vendor for support -sources of COTS applications: big vendors sell "site licenses", many special niches 3. rent it -the cloud -you subscribe to it (rent) -why rent? you have neither the time or expertise to build your own, and there are good services on the market. you also don't want to run the apps on your computers. you also want to "pay as you go" as you scale up -the on demand process: you specify what you want, you explain to a service provider what you want, service provider proves their service is the best, you rent and start using the app that they host and manage -take less time to research, rent and start using, than it does to buy and install. lets you get functionality up faster -could be less customized and you're dependent on a vendor for support

what are the 3 main problems we face in evaluating information?

1. information overload: begin faced with more information than one can effectively process; the more information to be stifled through, the less attention to be devoted to other tasks -2 strategies for dealing with info overload: withdrawal: involves disconnecting from sources of information; not checking email, turn off the TV, not surfing the web filtering: involves knowing what info we need and what info merits attention and use -dealing with it: understand and identify information priorities and needs; focus on the most relevant information; develop an organizational structure for "may need later" information; think about what information sources are the most useful and of the highest quality 2. more variability in information quality -information quality: the degree to which information is suitable for a particular purpose -argument 1: pro concentration--in the past, professional editorial committees ensured that published information was high quality. without these professional filters, information --in general-- is lower quality because bloggers and others don't have the same professional skill or commitment to high quality information -argument 2: pro distribution--in the past, professional editorial committees ensured that published information represented their view of the world, which ignored or misrepresented "the whole truth" of the world. without these professional filters, bloggers and others can publish that "whole truth" from their perspectives 3. information evaluation is hard -humans evaluate information most automatically/subconsciously -we are cognitive misers

Know the second 5 guiding principles of information ethics (ie, #6 - #10 as presented on the slide entitled "Guiding Principles of Info Ethics")

1. principle of honesty: do not deceive others 2. principle of lawfulness: do not violate the law 3. principle of autonomy: acknowledge a person's freedom over hid/her actions or physical body 4. principle of justice: acknowledge a person's right to due process, fair compensation for harm done, and fair distribution of benefits 5. rights: acknowledge a person's rights to life, information, privacy, free expression, and safety

What does copyright law protect? Specifically, the 5 rights

1. reproduction right: only the copyright owner may make reproductions or copies of the work 2. modification right: only the copyright owner may modify the work to create a new work 3. distribution right: only the copyright owner make work available to the public by sale, rental, lease, or lending 4. public performance right: only the copyright owner may display a copyrighted work 5. digital transmission right: only the copyright owner may transmit sound recording by means of digital audio transmission

What are the six ways you can make money with your own PDB?

1. sell a product that you make (atom or bit based) -you physically make the product, package it, ship it, and service it -sell it on a platform (Etsy) or sell it directly from your own site (Bijou) 2. sell a product that you have someone else make (atom or bit based) -existing product—you can buy the product from someone else and resell it (eBay) -new product—you can hire a contract manufacturer to make or redesign a product and then you sell it (amazon) 3. sell a service that you provide directly -you develop a skill that others want and you sell it to them as hourly work, as a course, or as a supported tool (like a worksheet) 4. sell a service that someone else does -you serve as a general contractor for a niche, and take a cut out of their pay 5. serve a community by creating amazing content and earn money off other companies' ads that your followers want -you do your thing, get followers, and then let other companies pay you to show their ads to your followers (also, subscriptions) -do your thing, get followers, and then let others companies pay you to promote their products to your followers -income from ads, promotions, subscriptions, product sales, and back end data brokers -can earn anywhere from nothing to over 10,000 dollars 6. use your online presence to sell offline products and services -example: realtors having a website

what is the proper format/syntax for the IF function

=IF(logical_test,[value_if_true],[value_if_false])

if given a set of specs for a new laptop computer, you should be able to know what these parts are and how they work: CPU/Processor, clock speed/GHz, primary storage (RAM, registers, Cache), secondary storage (hard drive, external drive), ROM, input/output devices

CPU/processor: the component of a computer where the processing or handling of computations or instructions is done -control unit: the component of the CPU that handles instructions and controls the flow of data to the various parts of the CPU -the brain of the computer -a CPU can do arithmetic, logical operations -how does it execute a program? CU gets an instruction from RAM and places it in register, CU decodes, CU notifies the appropriate part of hardware to take action, control is transferred to appropriate part of hardware, hardware performs task, control is returned to the CU clock speed/GHz -processor speed determined by the system clock -system clock procedures electronic pulses at a fixed rate -1 MegaHertz (MHz) means 1 million pulses a second -1 GigaHertz (GHz) means 1 billion pulses a second -each CPU instruction takes one pulse -the faster the clock speed, the faster the computer runs an app primary storage (RAM, registers, cache) -represents temporary memory available for storing information as the CPU is handling the applications and functions used on the computer. AKA main memory -RAM: memory where small amounts of data or parts of applications are stores while in use for processing -registers: components of the CPU used to store data and instructions temporarily -cache: memory used for storing data that are used more often to improve computer performance -types of information stored: data for processing, instructions for the CPU to process the data, and applications that are used by the computer secondary storage (hard drive, external drive) -memory where files and programs are stored. AKA permanent memory -types: USB devices, magnetic tape, disks and optical devices, DVD, blu-ray 1. solid state drives (SSD) are popular on newer computers--a secondary storage device that stores data on semiconductors rather than magnetic platters 2. redundant array of independent disks (RAID) is used to ensure that data are stored redundantly, which provides organizations with a way to make sure they have access to the data if something happens ROM: nonvolatile memory where critical instructions are stored input/output devices -input devices: equipment used to capture information and commands (mouse, keyboard, scanner) -output devices: equipment used to see, hear, or otherwise accept the results of information processing requests (monitor, printer, microphone)

Why are we talking about moving from IPv4 to IPv6? Why do we need to move to IPv6?

IPV4 is becoming too small and we need more IPs to support the increasing networks -ran out of IP addresses

be able to explain how Wittgenstein's forms of life and language games are useful in conducting a successful search

Ludwig Con Wittgenstein was an Austrian language philosopher forms of life -the set of interpretations an individual has as a result of their profession or personal experience -example: Japanese accountants see a business differently from an American sales rep -on the internet, you need to learn the form of life surrounding an industry, an organization, a group of people (what motivates the people inside a pharmacy company, how do they describe themselves, how do outsiders see the company) language games -the way people use words based on the situation -example: you use words differently when you're talking with: your parent, a recruiter, your best friend -on the internet, you also need to learn how people involved in that form of life are playing language games (what professional jargon do they use, what do they mean when they say "good revenues")

what do these functions do: NPER, RATE, PV, FV?

NPER calculates the number of payments that will be made to pay off a loan given the interest rate, payment amounts, and original loan amount RATE calculates the interest rate earned for an investment given the number of payments made as part of the investment, the payment amount, and the current value of the investment PV calculates the current value (accounting for compounding interest) of an investment given the interest rate, number of payments to be made, and the amount of the payment FV calculates the future value of an investment given the interest rate, number of payments to be made, and the amount of the payment

Know what TCP and IP do and how they work together. Know that the TCP/IP protocol defines the Internet

TCP -breaks data into packets and rebuilds them at receiving end -packet size about 500-1,500 bytes -each packet has an "IP envelope" with metadata and routing data on it IP -routes the data, does addresses -IPv4 = about 4 billion addresses -IPv6 = about 340 undecillion addresses

what's the difference between a client computer and a server computer

a client computer is a device that an individual person uses a server computer is a device that lets multiple people share resources, like a printer, network access, or other big computers typical client: laptop, tablet, phone desktop

Know what these three terms mean and what they are: URL, IP Address, DNS.

URL (uniform resource locator) IP (internet protocol) address -network: Tier 1 or 2 -host: an organization's main computer -subnet: a network within an organization -device: a particular device DNS (domain name server)—the web's phone book

From the videos we saw in class, what is a data broker?

a data broker is someone who can track and collect your data online and sell it to companies so that they can profit

What is a DSS?

a decision support system is a computerized system that gathers and analyzes internal and external data, synthesizing it to produce comprehensive information reports -differs from an ordinary operations application, whose function is just to collect data -decision support system allow for more informed decision making, timely problem solving, and improved efficiency in dealing with issues or operations, planning and even management

Know that the IEEE 802.11 protocol is for WiFi and the CDMA or GSM protocols are for mobile / Cell phones

Wifi: IEEE 802.11 ah Mobile: CDMA, GSM Internet: TCP/IP Web: HTTP

when should you spend more money on a computer, and when do you not need to spend more money on a computer? for example, if I say "when would choose to spend the extra money on a graphics processor?" you should be able to give me an answer

a graphics processor makes the computer better at processing graphics (images, video games), so someone would choose to spend more money on a computer with a graphics processor if they play a lot of video games, or maybe is a photographer

Know what this sentence means: "VPN software encrypts your data transmission from your device to a wifi router, making it more secure than if you don't use a VPN"

a VPN is a connection that makes use of an open wired network such as the internet but that provides a secured channel through encryption and other security features

What is "intellectual property?"

a work or invention that is the result of creativity, such as manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark patents: ownership of an invention -example: Microsoft patented double clicking trademarks: phrase, symbol, or design that distinguishes the source of products or services -example: apply logo and fake apple stores in China trade secrets: formula, process that gives one company a business advantage -example: google search algorithm copyright: -nondigital assets--books, oil paintings, vinyl records -digital assets--music, movies, photos, eBooks, software, games

What does "affiliate marketing" mean? How do people with affiliate marketing businesses make money?

affiliate marketing is when a publisher promotes an advertiser's products (in some way), provides a link to the advertisers site, and earns a commission or fee if that consumer buys from the advertiser -your role: a barker—use the right words/ content to get attention online property: web page, mobile app, youtube channel, podcast, twitter advertiser: a company offering products and services and who want to pay a publisher to show ads to prospective customers publisher: a person or company who has online properties and followers, who wants to show another company's ads to followers for a commission or fee consumer: a person or business who buys products and services minimal startup plan -get your tools set up --all personal productivity tools set up—VPN, password vault, browser add ons, backup plans --create a new gmail account just for this --create an account on google AdWords with that gmail account --create an account on a web platform --create an account on an affiliate products site later, create accounts on other platforms (social media) -choose a niche --a bad niche is one that you don't care about, has too much competition, don't give you much commission, are seasonal, little search traffic key words, and sometimes too vague or too specific -choose a product and set up an affiliate relationship -identify key phrases for SEO (search engine optimization) -create presence on a platform -install revenue streams -create and start executing your marketing strategy -begin adding valuable content (ongoing)

what do we mean by "stakeholders" and who are they for most enterprises?

all enterprises serve stakeholders not stakeholders: competitors, non customers, non suppliers, non investors, non partners a stakeholder of a company benefits in some way from the operation of that company which may or may not include owning stock -partners/suppliers: reliable contracts, ethical materials handling, responsible production -shareholders/investors: maximize profits, grow market share, high return on investment -community: professional associations, ethical recycling, increase employment -employees: fair compensation, job security, ethical conduct/treatment -customers: exceptional customer-service, high-quality products, ethical dealing -government: adhere to regulations/laws, increase employment, ethical tax reporting

what are the differences between "system" and "process"?

all processes are system, but not all systems are processes process: a series of actions or steps taken in order to achieve a particular end -you can measure the performance of a process -example: how much time to make pizza, how many people does it take, when can we expect the pizza system: a set of connected processes and characteristics forming a complex whole, or a set of principles or procedures according to which something is done -doesn't always produce one particular end -not always possible to measure an outcome of a system -all systems have, at their core, processes (a system has multiple processes) -a set of interacting components that work together to form a complex whole by taking inputs and processing them to produce outputs

What does bandwidth mean? How do we measure bandwidth?

bandwidth is the data transfer speed, measure it in bps (bits per second) *storage vs transmission* storage/volume (RAM, hard disk, thumb drive) -when talking about storage we always talk in terms of Bytes with a capital B -example: 4GB of RAM -example: 2TB of hard disk space networking/transmission (bandwidth, transfer speeds) -when talking about networking we usually talk in terms of bits, with a lowercase b -example: 2 Mbps, 2 megabits per second of bandwidth

what is "information overload"? what are some of the ways humans deal with overload?

begin faced with more information than one can effectively process; the more information to be stifled through, the less attention to be devoted to other tasks -2 strategies: withdrawal and filtering

what's the difference between "bias" and "perspective"? how might you evaluate information differently if you knew it was biased vs if it came from a perspective?

bias: prejudice in favor or against one thing, person, or group compared with another, usually in a way considered to be unfair perspective: a particular attitude toward or way of regarding something; a point of view how would you evaluate differently? -if information comes from a perspective, then it is not necessarily biased. it means that it shares one side of the story, so I might trust it, but also look for other articles with different perspectives -if information is biased, then information could be false or misleading to try and make the reader agree with the source's bias, and I wouldn't trust the information and I would look somewhere else

What do people mean when they refer to "Big Data"? What are the "4 V's" that describe it? Know what each "V" means and be able to recognize examples of each

big data: the vast amount of data that are created and stored that have grown beyond the capabilities of traditional data processing tools and application -there is so much data being stored that new technologies and practices are required to analyze them -name given to the increasingly huge collection of data captured from the world -explosion of structured data and unstructured data -from all sorts of inputs (cameras, microphone sensors, device (like Alexa), vehicles, drones, online activity) -storing big data can be done using traditional databases, but new solutions may be required 4 V's--describe the data now being gathered and stored 1. velocity: the speed at which new data are gathered and stored 2. variety: the variety of the kinds of new data 3. volume: the sheer quantity of data being gathered and stored 4. veracity: the increasing difficulty of assessing quality information

what are the parts of a business information systems and how do they work together?

business information system: a business information system captures, creates, stores, transforms, and delivers data that helps enterprise members make decisions and do their jobs includes: people, policies, and culture because those social forces have a strong impact on how the technical IS works data: facts, text, numbers, images, and the like that serve as the inputs for producing information -types: audio, text, video, numbers, photos -sources: website behavior, DNA, automated car, cameras, sensors, bio devices -big data: explosion of unstructured data -unstructured data: video, audio, photo hardware: physical devices such as the processor, storage media, and peripheral devices -types: clients, servers, routers, hard disks, modems, cell towers, printers, scanners, cameras, microphones -internet of things: sensors, appliances, robots, drones, electrical plugs, vehicles software: set of instructions that govern the operation of an information system -2 kinds 1. systems software: operating system 2. application software: games, word processors -types: operating systems, applications, utilities, network systems, embedded systems -written in programming languages: python, C#, Java, visualbasic communication media: set of devices and protocols (rules) that enable computers to communicate with each other -how data moves among hardware -types 1. physical media: copper wire, glass fiber, wifi, cell networks, satellite, bluetooth 2. protocols: TCP/IP, 802.11, CDMA/GSM business procedures -procedures: instructions for the proper use of the information system -types: hiring, manufacturing, designing, ordering, controlling quality, selling, marketing, raising funds, shipping, tracking, managing, recording sales, evaluating, writing copy, servicing customers, scheduling meetings people: individuals who use the information system -people are necessary to use and interpret the output of the IS -types: 1. roles: executives, managers, directors, skilled professional, unskilled labor, customers, suppliers, stockholders 2. skills: accounting, finance, human resources, information systems, marketing/sales, operations -people make business rules--a statement that defines or contains an aspect of a business with the intent of controlling behaviors within the business; rule, policy, guideline--created by humans--that controls the behavior of a transaction

What are the 3 ways companies acquire information systems? Build, Buy, Subscribe. What is the main advantage of each?

buy—COTS (commercial off the shelf) -systems that you buy from vendors and install, either on premise or on cloud -advantages: already exists so faster to get in production, cost is clearer, vendor handles bugs -disadvantages: might not be exactly what you need, no strategic advantage -example: Biff's boards buys an enterprise accounting system from oracle and installs it on their "on premise" technology build—custom -systems that you build on your own -advantages and disadvantages are flip side of COTS -example: Biff's boards conceives, designs, and builds a virtual reality app to help customers envision how they'd look on their board rent/subscribe -similar advantages and disadvantages of COTS systems -advantage: company can "pay as they grow" rather than capital investment in equipment and staff -disadvantage: company might lose some flexibility in customizing their processes

know the functional business areas: sales, marketing, accounting, finance, operations/manufacturing, human resources, and IT

common sense

spend some quality time with the google advanced search screen, use all the fields in searching for something. be able to tell me what these fields mean: exact word or phrase, all of these words, none of these words, site or domain, last update

common sense

What is a definition of Artificial Intelligence? What are an "expert system" and "intelligent agent" and why are they considered examples of AI?

computer programs that mimic human cognition expert system: use the same rules as human experts -example: doctor diagnosis, oil drilling locations, financial investments intelligent agent: app that does specific tasks on behalf of its users, like shopping or stock picking virtual reality: a computer-stimulated environment that can be a simulation of the real world or an imaginary world, like second life or many multiplayer online games

In the PERT chart, what do we mean by "critical path" and "slack"?

critical path is the dates and path that you want to complete something by. informs the project manager of the shortest timeframe the project would possibly be completed in slack is free time that emerges due to natural lulls in activity. parallel paths can emerge and tasks can be completed concurrently

know these forms of performance metrics and how they relate to each other: ROI, KPI, CSF, benchmarking

critical success factors (CSF): areas/processes we need to do well to compete with our strategy -the few important considerations that must be achieved for the organization to survive and be successful -example: create high quality products, retain competitive advantages, reduce product costs, increase customer satisfaction, hire and retain the best business professionals key performance indicators (KPI): metrics that measure our progress in those CSFs, compares to strategic or tactical goals (aspirations) -example: turnover rates of employees, percentage of help desk calls answered in the first minute, number of product returns, number of new customers, average customer spending benchmarking: metrics that compare a performance to a baseline measure, such as how well a competitor is doing -example: turnover rates of employees, percentage of help desk calls answered in the first minute, number of product returns, number of new customers, average customer spending return on investment (ROI): a specific KPI -total net benefit of an investment, total net cost of investment

what is the difference between a customer facing process and a business facing process

customer facing process: results in a product or service that is received by an organization's external customer business facing processes: invisible to the external customer but essential to the effective management of the business (AKA the back office process) customer vs business -different problems, different solutions, different challenges. changing an employee is different from changing a trading partner which is different from changing a customer

Know what these characteristics of high-quality Information mean: accurate, complete, consistent, timely, accessible. Know that businesses spend lots of money on to ensure their data has these qualities. You only need to know about these 5 qualities for this exam

data accuracy: refers to whether the collected data is correct, and accurately represents what it should data completeness: refers to whether there are any gaps in the data from what was expected to be collected, and what was actually collected data consistency: refers to whether the types of data align with the expected versions of the data that should be coming in data timeliness: refers to the expectation of when data should be received in order for the information to be used effectively data accessibility: refers to the ability to obtain transparent data

Why are these advantages of having a database management system: data are located centrally, data quality is controlled, data is accessible, data are easier to maintain.

data are located centrally: improves data security, data preservation, improved physical security, reduces cost data quality is controlled: quality of data will always be high quality because it is controlled by dedicated professionals data is accessible: possible for everyone to access the data they need data is easier to maintain because of the above

What do these qualities of poor data management mean: data redundancy, data inconsistency, data isolation, data insecurity

data redundancy: repetition of data in the database data inconsistency: identical types of data that are inconsistent with each other data isolation: difficult to do efficient data search and retrieval data security: other users have easy access data errors: easy to make errors poor data integrity: a combination of all

What are data visualization tools and when are they most useful?

data visualization: a visual representation of data with the goal of clearly communicating or better understanding the meaning of the data -can help you uncover trends and relationships in data that might be less apparent when viewing the data in tables

what is the difference between data, information, business intelligence, and knowledge in the context of a business? know the definitions and examples of each

data: raw symbols; raw facts that describe the characteristics of an object or an event -example: order date, amount sold, 170 people registered, sky is blue information: data that has been processed so that it is useful; data converted into a meaningful and useful context (moving toward doing something) -example: best-selling product, best customer, worst-selling product business intelligence: information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making -example: trends, lowest sales per week compared with economic interest rates knowledge: information that is applied to a decision or action; the skills, experience, and expertise, coupled with information and intelligence, that create a person's intellectual resources -example: choosing not to fire a sales rep knowing they have personal issues going on

What is the difference between a database and a database management system? What are the parts of a database management system?

database: maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses). the store of information -refers to the stored data and all the files that contain that data database management system: creates, reads, updates, and deletes (CRUD) data in a database while controlling access and security. the processes that work the information

What's the difference between a decision matrix and a weighted decision matrix? Be able to identify both from examples

decision matrix: uses a grid that lists all the alternatives in the first column and all the criteria in the first row -fill in the grid by rating each alternative on the criteria using a scale to indicate how well the alternative scores on the criterion weighted decision matrix: the same thing but some tasks have higher importance over others. all tasks get a score out of 100%

Know what "gap analysis" is in the Systems Analysis phase

gap analysis a set of techniques to examine and describe the gap between current performance and desired future goals. the comparison of actual performance with potential or desired performance

what's the difference between a general purpose application and a functional application for businesses?

general purpose application: is an application that helps with certain tasks like word processes, web browsers, email, etc business application: an application that targets the functional areas of marketing, production/operations, accounting, human resource management, finance

Be able to identify, from examples, all of the main types of "decisions" we talked about in class: decision, problem, opportunity, paradox, dilemma.

decision: a choice among alternatives -a conclusion or resolution reached after consideration -outcome: choose one thing over another problem: a matter or situation regarded as unwelcome or harmful and needing to be dealt with and overcome. quality of urgency -outcome: a process that leads to a different situation -example: we are losing sales and we need to change that opportunity: a set of circumstances that makes it possible to do something different. not so urgent -outcome: a realization of a possible action -example: they are making lots of money selling X, can I? paradox: a seemingly absurd or self-contradictory statement or proposition that when investigated or explained may prove to be well founded or true -outcome: a change in how you see reality which leads to different/opposite actions -example: the less you study the better your grades become dilemma: a situation in which a difficult choice has to be made between two or more alternatives, especially equally undesirable ones -outcome: choose the best alternative which may not turn out well anyway -example: if I don't pay a bribe, I might not get the business. but if I do pay a bribe, I might get fired

what is disinformation?

disinformation is the intentional creation and transmission of known false information -example: fake tweets, fake profiles, deep fakes

In considering eBusiness or Personal Digital Business models, know the difference among these comparisons -B2C, B2B, C2C, C2G -Brick and Mortar, Brick and Click, Pure Click

electronic business (eBusiness): an electronic means to interact or conduct business with individuals, companies, or government agencies -digital market personal digital business -an online business you can run by yourself or with 1-2 friends -market doesn't care who you are, you can be anything to have a personal digital business B2C: business to consumer—this is who interactions are taking place between a consumer and a business. for example, when you buy books on amazon B2B: business to business—this is when transactions are taking place between two businesses. for example, when Walmart sends electronic requests for inventory to its suppliers C2C: consumer to consumer—this is when interactions are taking place between two consumers. for example, when you buy something on eBay C2G: constituent to government—this is who interactions are taking place between a government agency and a constituent. constituents could be citizens, businesses, or even other agencies. for example, when you pay your taxes online brick and mortar: this category represents traditional organizations with physical locations. for example, large automobile manufacturers tend to have physical offices and operations bricks and clicks: this category represents traditional organizations with physical locations but that also operate an online business. example, Walmart pure play (or click only): this category represents organizations with only an online business. example, amazon atom based—physical, like a coffee cup, jump rope, or a music CD bit based—information, like a course, eBooks, podcast, vlog, service, or music

Know what "encryption" is. You don't need to know how to encrypt, just what it is.

encryption: the use of mathematical algorithms to convert a message or data into scrambled information that makes it unreadable -original message is called plaintext -converted or unreadable text is called cipher text -when the cipher text is converted back to plain text it is referred to as decryption -the algorithm used to convert the message is called the cipher -the encryption or decryption key is information known only by the proper users of the encryption tool

what are the functional parts of any enterprise? and what does each do?

enterprise: an intentionally organized set of people, money, property, and abilities to deliver some value to society. an enterprise is a system -example: Qualcomm, SDSU, VISA, San Diego Blood Bank inside view: all enterprises have business functions, either in-house or out-sourced, that enable the business decision makers to make decisions. functions may or may not be called departments information system: a combination of technology, data, people, and processes that is directed toward the collection, manipulation, storage, organization, retrieval, and communication of information accounting: records, measures, and reports monetary transactions finance: tracks strategic financial issues including money, banking, credit, investments, and assets human resources: maintains policies, plans, and procedures for the effective management of employees marketing: support sales by planning, pricing, and promoting goods or services operations management: manages the process of converting or transforming or resources into goods or services sales: performs the function of selling goods or services

how would you evaluate information in terms of its usefulness and believability?

evaluating usefulness -evaluate whether the information is relevant, appropriate, and sufficiently current -information relevance: the degree to which information is applicable and useful for the test at hand -ask: will this information help me accomplish my task? evaluating believability -assessing whether information comes from a credible, objective source, is well supported, and is sufficiently comprehensive -credibility: check the author and source -objectivity: check for bias, check the source -support: claims without support shouldn't be trusted, evaluate quality of support -comprehensive: look for gaps in information

What is a firewall? How does it protect you (or companies) from evil-doers?

firewall: a computer or router that controls access in and out of the organization's networks, applications, and computers -control the transmissions that are attempting to enter and/or leave the organizations networks or computers

Know what we mean when we say that "HTML uses tags to format content".

formats how something looks on a page -example: <b> hello <b> makes the word "hello" in bold

what is the difference between a general search engine and a vertical search engine? what do we mean in business by vertical?

general purpose search engine: google, yahoo, bing vertical search engine: amazon, youtube, Pinterest -there is a specific thing you look for when searching on these search engines

What is a "hacker"? What is the difference between a "black hat hacker" and a "white hat hacker"?

hacker: experts in technology who use their evil knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. more recently, for social mayhem black hat hacker: criminals who break into computer networks with malicious intent white hat hacker: choose to use their powers for good. can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking

what do we mean by these two heuristics: availability and representativeness?

heuristics: short cuts to making a decision availability heuristic: the easier it is for you to understand a new idea, the more likely you are to perceive it will happen (and vice versa) -if something is easy to grasp and understand, then we tend to overestimate the likelihood of being true -example: which a more dangerous job--police or lumberjack, more lumberjacks get killed a year representativeness heuristic: the more a new idea looks like a category you know, the more likely you will assign that idea the same characteristics as that category -example: criminals have scary tattoos, that person has a scary tattoo, that person is most likely a criminal

how do humans create applications? know these as programming languages: Java, python, C#, and visualbasic

humans make software with programming languages -computers can't understand human languages, they can only understand "machine language" -programming languages let a human write instructions for the CPU in source code, this gets translated into machine language or object code that the CPU can understand -popular general purpose programming languages: python, java, C, C++, C#, visual BASIC, R, assembly (obsolete: COBOL, fortran, aigo, BASIC)

know what the following mean and be able to recognize examples of each: interdependence, synergy, entropy/obsolescence, sub-optimization

interdependence: parts depend on each other (think of the food chain) synergy: cooperative effort of complementary parts is greater than sum of those individual parts; 1+1=3/2+2=5, people can get more done working together than they can apart entropy/obsolescence -entropy: all systems fall apart over time if they don't adapt -a raw egg exemplifies the asymmetry of time: a fresh one breaks easily, but a broken one does not spontaneously put itself together again, for the simple reason that there are more ways to be broken than not. the broken egg has higher entropy sub-optimization: subsystems often must sub optimize to enable system (or super system) to optimize. example: the human body -optimize: designed to work perfectly "optimally" -sub-optimize: designed--intentionally--to work less than optimally, but to perfectly serve a higher order system

understand the difference between an external threat to a business system and an internal threat. be familiar with the example in the slides and Belanger figure 8.1

internal threats are important to guard against well. for example, security must monitor the network to make sure that policies are not being breached in a harmful way (either deliberately or accidentally) and that employees are only able to access systems they are authorized to external threats such as hackers and viruses threaten the valuable information a company collects while in business. security must be able to secure these data from attacks to ensure the company can run smoothly without interruption

What are .com or .net. or .edu called?

internet domains .net is open to any person or entity .com is reserved for commercial organizations and businesses .edu is reserved for accredited postsecondary institutions

What is an ISP?

internet service provider: the give you your access to the internet

What is the difference between the Internet, an intranet, and an extranet for a given company?

intranets -designed to be open and secure, internal networks that use internet technologies and are accessible through web browsers. inside an organization. typically set up as an LAN -using intranets: all employees of a particular company can use the company's intranet; outside people cannot use; the firewall allows inside people to use outside internet, and prevent outsiders from getting in extranets: connects some of a company's resources with external organizations such as customers, suppliers, and consultants. typically crate a CPN using internet as its backbones and relying on firewalls for security -using extranets: allows certain outside stakeholders access to some insider information why are they called intranet and extranet? -both types of networks use the same technologies as the public internet -TCP/IP, HTTP, FTP

know the 9 qualities dimensions of high-quality information

intrinsic quality: dimensions of quality that are important regardless of the context or how the information is presented 1. accurate: correct, free from error, and reliable 2. believable: regarded as true and credible 3. objective: free from bias 4. consistent: compatible with previous information 5. understandable: easily comprehended contextual quality: dimensions that may be viewed differently depending on the task 6. relevant: applicable and useful for the task at hand 7. timely: available in time to perform the task at hand 8. comprehensive: of sufficient depth and breadth for the task at hand 9. current: sufficiently up to date for the task at hand

What has been the impact of poor ethics (e.g., perceptions of corruption) on the ability of countries to gain foreign direct investment? What's the take away about how the world views ethical or high integrity behavior?

less corrupt countries get more foreign investment

What's the difference between a LAN and a WAN? Is an intranet a LAN or WAN?

local area network (LAN): a network to connect devices in a limited geographical area (usually fewer than five kilometers) -most organizations use many LANs interconnected via backbone networks -connects a group of computers in close proximity, such as in an office building, school, store, coffee shop, home -typically all hardware and software is owned by a single company -intranets are a type of LAN -example: homes, departments, schools wide area network (WAN): a network connecting devices over a large geographic area, such as a city, a country, or the world -these networks can be implemented via private networks or public transmission systems, such as the internet -make use of various communication media as well as several different providers -spans a large geographic area -the internet is a WAN

Know what these SQL functions mean/do: MONTH(datefield), YEAR(datefield), CONCAT

month(datefield): will extract the month and return it as an integer year(datefield):extracts the year as an integer concat: links together categories from a table

What is the difference between "on premises" computing and "cloud" computing?

on premises -hardware and software resides on company property, the company owns it, and the company must manage (installation, production, upgrades, retirement) -example: biff's boards owns all networks servers, web servers, data servers, laptops, desktops, printers, devices, etc. and managers them all to run their enterprise systems cloud -hardware and software resides on a partner's property, and all transactions and processes occur between the company's front end devices and the partner's cloud services -example: Biff's boards owns laptops, desktops, and devices but uses the internet to connect to 'their' servers which are housed at their partners' facilities -cloud services vendors: amazon web services (AWS), oracle, salesforce, google, many more

what's the difference between an operating system and an application

operating system: computer programs and data responsible for managing a computer's hardware resources and providing a platform for the operation of application software -often called OS -works between hardware and apps -example: windows, MacOS, android, iOS, linux application software: computer programs and procedures necessary for carrying out some specific task -often called "apps" or "program" -client: word, powerpoint, excel, photoshop -server: google search, amazon purchase, Venmo

Why do companies use a formal approach to building systems, as opposed to just winging it?

organization, saving time

Know the four feasibility studies in SDLC (Class 14a deck), and what the focus of each is

organizational feasibility -will/can the organization use the system? -can: is the problem worth solving, will the system make the problem worse, is this proposal the real solution to the root problems, use PIECE to identify this -will: will users and other stakeholders resist this new way of doing work, are there power and political issues that this system will challenge or create technical feasibility -is the technology available and easy enough to use? -is the new system mature enough for our needs--mature system advantages, leading edge systems advantages -can we use existing technology (ours or vendor) --existing: capacity? functionality? --vendor: integration? affordable? flexible? -are we skilled/knowledgeable enough to use the new system? --can we handle agile? can we handle cloud for mission critical systems? do we know how to use ___? economic feasibility -is cost/benefit, payback/break even and ROI sufficient? -will this project pay off according to selected financial KPI's? --cost/benefit analysis use NPV --return on investment (ROI) --break even analysis/payback analysis -factors in calculating --development + operating (fixed, variable) = TCO --tangible and intangible costs and benefits (use expected value technique to quantify intangible costs and benefits) schedule feasibility -can we get the system into production soon enough? -are the project deadlines reasonable with respect to: --business requirements: competitive windows? problem go away before we can deliver? collaboration with partners? -system quality: enough time to do it right? enough resources to do it right on this schedule? legal feasibility -does it violate any laws or regulations?

What do we mean by "packet switching"? What is a packet? What route do individual packets travel on the Internet?

packet switching: the path of the signal is digital, and is neither dedicated nor exclusive. a file is broken into smaller blocks, called packets what is a packet -byte: single letter -an email message that is 10,000 bytes long is too long for the internet -TCP will break that message into about ten 1000 byte packets -IP will then send those packets along the best route to the destination. every packet will likely go through a different path why do we do packet switching? -avoid network congestion -diversify risk of links -avoid having to pay for continuous switch

When we talk about "personal information", what are examples of that?

personal information includes: -personal subjects: health conditions, finances, lifestyle, purchases, sex, religion, politics -personal questions: where you live, what you do, who you do it with, when you do it, what you say, where you are now

What is a Systems Development Life Cycle (SDLC) and why do companies use it to build systems?

planning phase: determine which projects will support strategy -done by c suite -what are our enterprise's strategic goals -deliverable: a list of candidate projects to work on this year requirements phase: do "gap analysis" between "as is" process/product and "to be" process/product. define what the "to be" system should do (not how) create business requirements statement -done by IS/user team design phase: take the business requirements for the "to be" system and add technology to it. define how the "to be" system should work. create systems specification document -done by IS team development phase: take systems specification, and code, buy, configure, assemble, and test the "to be" system implementation phase: implement the "to be" system in the organization, and transition from "development" system to "operational" system maintenance phase: manage the system, make updates, fix bugs *1-5 are development phases, 6 is a production phase*

Know the difference between a primary key and a foreign key, particularly when using the JOIN operator

primary key is an identifier from a table a foreign key is a primary key that belongs to one table that is on another table so that the two tables are connected

What is a primary key in a relational database? How do we use it? What is a foreign key? How do we use it?

primary key: the unique identifier of a record -a special type of field -makes it possible to uniquely identify every record in a table foreign key: a field (or fields) that references the primary key of a related table -when you want to connect two or more tables, you do it through keys -primary key that appears in another table to connect them

Know these words from project management: scope, scope creep, milestones, PERT chart (and task sequencing), Gantt chart (and calendar time)

project management: the application of knowledge, skills, tools, and techniques to project activities in order to meet specific project requirements scope: the functionality and features that the project will include scope creep: when scope grows without budget and schedule also growing tasks: the processes that the team must perform to complete the project milestones: points in time at which a task will be done task sequencing: designing the tasks to leverage your team and get the project done as quickly as possible. PERT chart and Gantt chart are two useful tools -critical path method and "slack" task ownership: who "owns" a task? who is accountable for getting the task done--even if they don't do it directly PERT -shows task dependencies and time sequencing -works off "ideal" time not calendar or actual time -useful to manage critical path Gantt -shows who owns executes each task -works off calendar and actual time -useful to match against real time calendar to monitor project progress -displays simple start and finish dates and resource names -three interdependent project management tasks? resources, timeframe, scope

What is a project? What is a process? Know the difference

project: -temporary with a definite state and end -has a unique purpose, not ongoing -clear outcome and deliverables -requires resources, often from different areas -involves uncertainty and change -must balance scope, time, and cost -usually new and novel effort -must have a sponsor or customer -NOT AN ONGOING PROCESS -example: planning a wedding process: -many things happen in a project that don't happen in a process -clear what is going to happen -ongoing

In a relational data base, what do these terms mean: data value, instance, field, record, file/table, database?

relational database: a data store that organizes data in connect two-dimensional tables -relational database model: a type of DBMS that stores its information in the form of logically-related two-dimensional tables listed from smallest to largest: data item/data value, field, record, relational file (or table), database data item/data value: an actual piece of information, at the smallest level -example: "Mickey" for first name field: the smallest meaningful type of data -example: mickey's first name, zip code, price, product name record: set of fields containing all info known about one entity; each record contains the same fields in the same sequence -example: all name and address info about one customer relational file (or table): collection of related records (like customer info, financial info, inventory info) -example: a complete set of names and addresses of all customers database: a collection of files/tables

what's the difference between a relative address and an absolute address? how do you each in excel?

relative address: they move when you change cells (example A1+A2) absolute address: stays the same as you move around the cells -use the money signs to show absolute -example: A$1+A$2 -$ in front of A means that column A is fixed -$ in front of 1 means that row 1 is fixed -money in front of both means both are fixed

Be able to name and describe the three levels of system security (slides and Belanger Figure 8.2)

security levels: the layers of protection and policies used to secure stored information 1. data access: protection of the information itself -who/what can access databases and what can they do with that access? create, read, update, delete (CRUD) 2. app access: protection of the computer on which the information is stored -which applications can do CRUD on which data? who can use those applications? 3. network access: protection of the network to which the computer is connected -who may access the resources on our network? intranet? extranet?

Know what these common security threats are. Malware, Virus, Phishing, Social Engineering, Ransomware, Sniffer, and Trojan Horse. Don't be afraid to search online for descriptions and examples of each.

security threats: broadly categorized as denial of service, unauthorized access, and theft and fraud malware: any software designed to do harm to a computer system virus: malicious software loaded onto a computer without user's knowledge (a type of malware that duplicates itself) phishing: collects sensitive user information through emails or web pages, social engineering social engineering: use of deception to manipulate individuals to divulge information for fraudulent purposes ransomware: malicious software blocking access to a system until money is paid sniffer: program records restricted info (passwords) to gain file/network access trojan horse: disguised as legitimate software to do harm to a computer system

Know what these SQL operators mean/do: SELECT, FROM, WHERE, JOIN

select purpose: lists the columns that should show in the result of the query. they can be in whatever order you want from purpose: lists the table or tables in which the data resides. where purpose: contains the selection conditions the query uses to decide which data to include in the query result. specifically, the query looks at the table in the from clause and then applies the selection condition from the where clause to each row in the table. if a row satisfies the condition in the where clause, then the row is selected for the result. if not, the row is simply omitted from the result. join: joins together two different tables in the from clause that are connected by primary/foreign keys

what's the difference between "source code" and "object code"? what does "open source" refer to? why would a company choose an open source application over a proprietary application

source code -humans can write. read, edit, delete it -enables programmers to make changes and upgrades -enables programmers to make changes and upgrades -enables self sufficiency for a company, don't have to rely on a vendor to make changes or fixes you need -not really supported by vendors -example: linux (OS), apache (web), open office (office apps), Firefox, VLC object code -humans can not write, read, edit, delete it. it is safe and consistent -computers can only run an application in object code, not in source code -make companies dependent on the vendor for upgrades, changes, fixes -company doesn't have to deal with software development -source of revenue for vendors -example: Microsoft office, oracle, salesforce open source -most finished software product delivered as source code, not object code -developers of open source systems intend for evolution of the product to be "open" to anyone in the world that wants to build on it -company has control of the source code that someone else developed -example: operating systems--Linux, apache. apps--open office, Firefox, brave

know how a search engine works with these parts: spider/bot, database, user. how does a search engine populate its database? what a user conducts a search, what is the user actually doing--accessing the web or something else?

spider/bot: spiders are a computer application whose purpose is to find content on the web -look for relevant content that is organic -move around the surface web retrieving URLs or web page data, looking at content to decide what the site is about -they then place the information into the search database database: google has a database with a lot of information, but not everything that is on the internet user: uses the search engine to look something up, they search the database not the web directly when the user conducts a search, what is the user actually doing--accessing the web or something else? -the user isn't accessing the web, the user is accessing a database of information

What is the difference between structured and unstructured data? Know a few examples of each. Which is easier for businesses to process, and why?

structured data -facts -questionnaire/ survey data -bibliographic info about unstructured data -online behavior -constructed data -metadata unstructured data -emails -voice messages -texts, tweets -social media -video/audio/photo

Know the difference between a structured, unstructured, and semi structured decision

structured decisions: a decision that is routine and repetitive and often has well defined procedures for making the decision -we know what information we need and how to use that information -example: compare actual spending to estimated budget, deciding which of three advertising plans to pay for, solving a math problem for which there is one right answer unstructured decisions: a decision that is novel and therefore has no agreed-upon, well-understood procedure for making the decision -aren't sure exactly what information we need, and we don't know exactly how to use the information -example: which products should our design that will make at least 1 billion semistructured decision: a decision for which some elements are structured and others are unstructured -can be supported through systems that allow flexible information retrieval -can anticipate some information needs, but cannot create a program capable of making the decision without relying on human judgement -known process will answer some of it but not all of it -example: what price should we give our new product?

which function would you use if you wanted to sum a column or row of 50 numbers? if I give you a range, what is the proper format of this calculation? be able to do this for finding the average, maximum, and minimum

sum: =SUM(A1:A50) average: =AVERAGE(A1:A50) maximum: =MAX(A1:A50) minimum: =MIN(A1:A50)

know how the following relate to each other: super-system, system, subsystem

super-system: a system that is made up of systems system: a set of interacting components that work together to form a complex whole by taking inputs and processing them to produce outputs subsystem: a system that is a part of a larger system

What is the difference between values, morals, ethics, and laws? Be able to look at some statements and choose whether it is a value, moral, ethic, or law as we discussed in class (not in general).

values: beliefs of what is important and worthwhile -each individual has their own values based on family, peers, culture, social class, religion, gender, etc -example: "men and women should have the same professional opportunities" morals: codes of conduct governing behavior based on values. they can be held at an individual, group, or society level -example: "treat others as you would like to be treated" ethics: a field of study that examines the moral basis of human behavior and attempts to determine the best course of action in the face of conflicting choices -the study of what it means to do the right thing -being ethical means you are making the right choices -what is right depends on your underlying values and morals -ethical (or nonethical) behavior is not determined by human made laws but by underlying values of what it means to be a living being, in society law: rules of behavior, enforced by consequences for violating those rules -determined and enforced by a governing body with authority to enforce penalties -values create laws, laws don't usually create values *how they connect* value: individuals deserve to live freely moral: you should respect individual's right to make decisions for themselves ethics: you are ethical when you let others make decisions for themselves, you are unethical when you make decisions for them and against their wishes law: USA bill of rights, first amendment

What is a business decision making model? Be able to know the difference among the three models we talked about in class from examples: what-if, sensitivity, and goal seeking

what if analysis: checks the impact of a change in an assumption on the proposed solution (what happens to sales if we set the price at 10% higher) sensitivity analysis: the study of the impact that changes in one (or more) parts of the model have on other parts of the model (at what point in price increases will sales drop by 10%) goal seeking analysis: finds the inputs necessary to achieve a goal such as a desired level of output (if we want to increase sales volume by 10% what should our price be?) optimization analysis: an extension of goal seeking analysis, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints (what is the price should we offer if we want to maximize profit)

you should know that, for data communication, 802.11 is the protocol for wifi, ethernet is the protocol to physically connect to a LAN (local area network)

you should know that, for data communication, 802.11 is the protocol for wifi, ethernet is the protocol to physically connect to a LAN (local area network)


Conjuntos de estudio relacionados

Destinos - Preguntas / Episodio 1

View Set

Chapter 19 - Payout Policy - 4/6 MCQs

View Set

Lección 14 - Practice - Estructura - 14.2 Nosotros/as commands - Mandatos

View Set

Network+ ch 7 - Cloud Computing and Remote Access, Chapter 7, Network+ 7th edition Ch. 7&8, Chapter 7

View Set

Psychology 100 States of Consciousness

View Set