MIS Finallll

¡Supera tus tareas y exámenes ahora con Quizwiz!

A good example of inventory issues that occur when a company does not have a clear vision of its entire supply chain is the ___________.

bullwhip effect

The number one reason projects fail is because of bad ________________.

business requirements

A composite attribute

can be divided into smaller components, which represent more basic attributes that have their own meanings. A common example of a composite attribute is Address (see Figure C.2 ). Address can be broken down into a number of subparts, such as Street, City, State, Zip Code

High frequency waves _____ Low frequency ______

can't go through things can pass through objects

An entity in a relational database _________ have multi-valued attributes

cannot

A simple attribute

cannot be broken down into a smaller component. For example, a customer's first name and last name are simple.

cellular communication systems

cells evenly distributed, each cell has a tower that is used to relay signals to the device

WWAN technologies can be divided into two categories:

cellular communication systems and satellite communication systems.

Another feature of web-based self-service is __________,

click-to-talk functions

A data mart

contains a subset of data warehouse information. To distinguish between data warehouses and data marts, think of data warehouses as having a more organizational focus and data marts as having a functional focus.

a domain name system (DNS)

convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions. Therefore, instead of trying to remember 97.17.237.15, users can simply specify a domain name to access a computer or website, such as www.apple.com.

Companies may also trade accuracy for completeness. Accurate information is _______, while complete information ________.

correct has no blanks

One of the biggest challenges of an ERP system is ______

cost

The primary challenges associated with supply chain management include _______ and _________

costs complexity

A database management system (DBMS)

creates, reads, updates, and deletes data in a database while controlling access and security.

What is the most important part of the project plan?

cummunication

Another alternative to DSL or high-speed Internet cable is

dedicated communications lines leased from AT&T or another provider, called T1 lines

Spatial data (geospatial data or geographic information)

identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.

Why is business analysis difficult from an operational database?

inconsistent data definitions, lack of data standards, poor data quality, inadequate data usefulness, ineffective direct data access

Advantages of a relational database

increased information integrity increased flexibility increased scalability and performance increased information security REDUCE information redundance

In the analysis phase

the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

Wi-Fi infrastructure includes

the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal. Most WLANs use a Wi-Fi infrastructure in which a wireless device, often a laptop, communicates through an access point or base station by means of, for instance, wireless fidelity.

Which of the following implies that aggregate or summary information is in agreement with detailed information? Answers: Granularity Completeness Accuracy Consistency

Consistency

SMART criteria—useful reminders about how to ensure the project has created understandable and measurable objectives.

Specific Measurable Agreed upon Realistic Time frame

Telecommuting (virtual workforce)

allows users to work from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data.

The two most prevalent types of broadband access are

digital subscriber lines and high-speed Internet cable connections

Passive RFID tags,

do not have a power source Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna

Large data _______ affect data accuracy as much as having little data

doesn't 10 wrong points in 100 will cause avg diffrence from 10 to 19 Wheras 1,000 wrong points in a million records will cause avarage diffrence from 10 to 10.06 (hence large data is better)

Types of feasibility studies

economic feasibility operational feasibility schedule feasibility technical feasibility political feasibility legal feasibility OUTLINED IN NOTES

wireless access point (WAP)

enables devices to connect to a wireless network to communicate with each other.

Business-critical integrity constraints

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints. Consider a supplier of fresh produce to large grocery chains such as Kroger. The supplier might implement a business-critical integrity constraint stating that no product returns are accepted after 15 days past delivery.

planning phase

establishes a high-level plan of the intended project and determines project goals. Planning is the first and most critical phase of any systems development effort

Cardinality

expresses the specific number of instances in an entity. In the Chen model, the cardinality is indicated by placing numbers beside the entities in the format of (x, y).

The gates include:(4)

inception elaboration construction transition

phased implementation

installs the new system in phases until it is verified that it works correctly, i.e. by department

balanced scorecard

is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks.

Information integrity

is a measure of the quality of information.

Preventive maintenance

makes system changes to reduce the chance of future system failure.

Automatic vehicle location (AVL)

uses GPS tracking to track vehicles. AVL systems use a GPS receiver in the vehicle that links to a control center.

Walmart and Procter & Gamble (P&G) implemented a tremendously successful SCM system. The system linked Walmart's _____________ centers directly to P&G's _____________ centers.

Distribution manufacturing

Which of the following is not a current CRM trend?

Distributor relationship management

The current generation of ERP, ______ is composed of two primary components—_______ and _________.

ERP-II core extended

data-driven website advantages include

Easy to manage content, Easy to store large amounts of data, Easy to eliminate human errors:

The two most commonly used models of ERD documentation are

Chen, named after the originator of entity-relationship modeling, Dr. Peter Chen, and information engineering, which grew out of work by James Martin and Clive Finkelstein.

Data mining approaches decision making with four different activities in mind including:

Classification— Estimation— Affinity grouping— Clustering—

A few of the fastest-growing SCM components include:

Collaborative demand planning— Collaborative engineering— Selling chain management— Supply chain event management (SCEM)

Common reasons companies outsource include:

Core competencies. Financial savings. Rapid growth. The Internet and globalization

Which of the following is a common marketing CRM metric?

Cost per interaction by marketing campaign

Just as Facebook and Twitter helped fuel the Web 2.0 revolution, applications such as ________,________, and ______ are bringing attention to LBS

Foursquare, Gowalla, and Loopt

What does extraction, transformation, and loading mean? Answers: It is a process of entering data, tracking data, and loading it into a database. It is a process that collects information from internal and external databases, converts it using a common set of enterprise definitions, and stores it into a data warehouse. It is a process that extracts information from internal and external databases, eliminates inconsistency and incompletness, and loads it into a data warehouse. It is a process that is performed at the beginning of the data mining model.

It is a process that collects information from internal and external databases, converts it using a common set of enterprise definitions, and stores it into a data warehouse.

Which of the following is not an example of an advantage to using the web to access organizational databases? Answers: Web browsers are much easier to use than a computer-based database. The web interface requires few or no changes to the database model. It is cleaner and virus-free. All the above

It is cleaner and virus-free.

Financial savings.

It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.

Internal databases vs external databases

internal: Within a company External: information gathered from outside the company

Object-oriented languages

group data and corresponding processes into objects.

Campaign management systems

guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis. These advanced systems can even calculate the profitability and track the results for each marketing campaign.

Production and materials management ERP components

handle production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control. Demand forecasting helps determine production schedules and materials purchasing. A company that makes its own product prepares a detailed production schedule, and a company that buys products for resale develops a materials requirement plan.

active RFID tags

have their own transmitter and a power source (typically a battery) The power source runs the microchip's circuitry and broadcasts a signal to the reader (similar to the way a cell phone transmits signals to a base station).

One of the best ways to support users is to create a _________

help desk

CRM reporting technologies

help organizations identify their customers across other applications.

CRM predicting technologies

help organizations predict customer behavior, such as which customers are at risk of leaving

CRM analysis technologies

help organizations segment their customers into categories such as best and worst customers.

DBMS use three primary data models for organizing information—

hierarchical, network, and the relational database, the most prevalent.

Wi-Fi operates at considerably _________ frequencies than cell phones use, which allows greater _________.

higher bandwidth

user documentation

highlights how to use the system and how to troubleshoot issues or problems. Training is also provided for the system users and can take place online or in a classroom.

Real-time information means

immediate, up-to-date information.

Geocache

is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.

secure hypertext transfer protocol. (SHTTP or HTTPS)

is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server. HTTPS protects against interception of communications, transferring credit card information safely and securely with special encryption techniques. When a user enters a web address using https:// the browser will encrypt the message

Peer-to-peer (P2P)

is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

A legacy system

is a current or existing system that will become the base for upgrading or integrating with a new system. EAI reviews how legacy systems fit into the new shape of the firm's business processes and devises ways to efficiently reuse what already exists while adding new systems and data.

RFID accelerometer

is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.

Software engineering

is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.

primary key

is a field (or group of fields) that uniquely identifies a given record in a table

The project plan

is a formal, approved document that manages and controls the entire project.

A PERT (Program Evaluation and Review Technique) chart

is a graphical network model that depicts a project's tasks and the relationships between them.

metropolitan area network (MAN)

is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN.

wireless LAN (WLAN)

is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

data warehouse

is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.

A dependency

is a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled

Streaming

is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

Prototyping

is a modern design approach where the designers and system users use an iterative approach to building the system.

Customer service and support (CSS)

is a part of operational CRM that automates service requests, complaints, product returns, and information requests.

change agent

is a person or event that is the catalyst for implementing major changes for a system to meet business changes.

foreign key

is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Extraction, transformation, and loading (ETL)

is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse. The data warehouse then sends portions (or subsets) of the information to data marts.

Information cleansing or scrubbing

is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.

A scripting language

is a programming method that provides for interactive modules to a website.

An intranet

is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes

global positioning system (GPS)

is a satellite-based navigation system providing extremely accurate position, time, and speed information.

Geocoding

in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category).

Two basic options are available to organizations wishing to develop and maintain their information systems _____________ or ___________.

in- sourcing outsourcing

Dynamic information

includes data that change based on user actions. For example, static websites supply only information that will not change until the content editor changes the information. Dynamic information changes when a user requests information. A dynamic website changes information based on user requests such as movie ticket availability, airline prices, or restaurant reservations.

Static information

includes fixed data incapable of change in the event of a user action.

Supply chain event management (SCEM)—

increases real-time information sharing among supply chain partners focusing on reducing response time to unexpected events.

Enterprise resource planning (ERP)

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprisewide information about all business operations. Enterprise resource planning systems provide organizations with consistency. They allow for the effective planning and controlling of all the resources required to plan, source, make, and deliver goods and services At the core of an ERP system is a central database that gathers transactional data from operational systems across the company. Each time information is altered, it is automatically updated throughout the entire system. Increases operational efficiency

War chalking

is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.

Data mining

is the process of analyzing data to extract information not offered by the raw data alone

Requirements management

is the process of managing changes to the business requirements throughout the project.

Conversion

is the process of transferring information from a legacy system to a new system.

Cartography

is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.

data element (or data field)

is the smallest or basic unit of information.

Estimated time of arrival (ETA)

is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.

Estimated time enroute (ETE)

is the time remaining before reaching a destination using the present speed and is typically used for navigation applications

Eintegration

is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources.

Sign-off

is the users' actual signatures indicating they approve all of the business requirements.

Time-series information

is time-stamped information collected at a particular frequency.

contact center or call center

is where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone.

T1 line advantages

larger bandwidth capabilities and greater reliability because each is composed of 24 channels, creating 24 separate connections through one line. If a company has three separate plants that experience a high volume of data traffic, it might make sense to lease lines for reliability of service

Extreme programming (XP) methodology,

like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete. XP has four basic phases: planning, designing, coding, and testing. Planning can include user interviews, meetings, and small releases. During design, functionality is not added until it is required or needed. During coding, the developers work together soliciting continuous feedback from users, eliminating the communication gap that generally exists between developers and customers. During testing, the test requirements are generated before any code is developed. Extreme programming saves time and produces successful projects by continuously reviewing and revamping needed and unneeded requirements

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time.

Marketing CRM Technology

list generator campaign management cross selling and up selling

The packet header

lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data.

GPS and GIS both utilize ___________,

location-based services (LBS)

A contact management CRM system

maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information. This allows the sales representative to personalize the phone conversation and ask such things as, "How is your new laptop working, Sue?" or "How was your family vacation to Colorado?" The customer feels valued since the sales associate knows her name and even remembers details of their last conversation. The primary difference between contact management and opportunity management is that contact management deals with existing customers and opportunity management with new or potential customers.

database

maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Corrective maintenance

makes system changes to repair design flaws, coding errors, or implementation issues.

Which of the following statements is inaccurate?

Most organizations invest in backward integrations only.

One-to-Many Relationship

Most relational databases are constructed from one-to-many relationships. A one-to-many relationship (1:M) is between two entities in which an instance of one entity can be related to many instances of a related entity.

Some of the more popular examples of DBMS include...

MySQL, Microsoft Access, SQL Server, FileMaker, Oracle, and FoxPro

Networking Elements Creating a Connected World

Network categories, network protocols, Network providers, network convergence, network access technologies

In a Gantt chart, tasks are listed __________, and the project's time frame is listed ____________.

Vertically Horizontally

Bluetooth is

a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. An array of Bluetooth-equipped appliances, such as a television set, a stove, and a thermostat, can be controlled from a cell phone—all from a remote location

Wi-Fi Protected Access (WPA)

a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP), and provides more sophisticated data encryption and user authentication.

digital divide,

a worldwide gap giving advantage to those with access to technology.

Web-based self-service systems

allow customers to use the web to find answers to their questions or solutions to their problems. FedEx uses web-based self-service systems to let customers electronically track packages without having to talk to a customer service representative.

The benefits of network convergence

allow for multiple services, multiple devices, but one network, one vendor, and one bill

integrations

allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems

Dynamic host configuration protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network. DHCP allows a computer to access and locate information about a computer on the server, enabling users to locate and renew their IP address. DHCP assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and return to the network.

This new form of innovative blog, a Google Earth "geoblog" or weblog

allows users to click on a blog entry, causing the globe image to spin toward eastern Africa, and then slowly hones in on the 35-square-kilometer Gombe National Park. The user can then read the blog while viewing high resolution satellite images, creating an online mashup of literature and visuals. The Jane Goodall Institute was the first to create such a Google geoblog

relational database management system

allows users to create, read, update, and delete data in a relational database. Although the hierarchical and network models are important, this text focuses only on the relational database model

kill switch—

a trigger that enables a project manager to close the project before completion.

cable modem (or broadband modem) is

a type of digital modem used with high-speed cable Internet service. Cable modems connect a home computer (or network of home computers) to residential cable TV service, while DSL modems connect to residential public telephone service.

Data mining occurs on structured data, structured data is...

already in a database or a spreadsheet.

IP address is

a unique number that identifies where computers are located on the network. IP addresses appear in the form of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit.

The Project Management Institute created the Project Management Body of Knowledge (PMBOK) for....

the education and certification of project managers

forecasts

are predictions based on time-series information.

Fourth-generation languages (4GL)

are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH". "

Relational integrity constraints

are rules that enforce basic and fundamental information-based constraints. For example, a relational integrity constraint would not allow someone to create an order for a nonexistent customer, provide a markup percentage that was negative, or order zero pounds of raw materials from a supplier.

Integrity constraints

are rules that help ensure the quality of information. The database design needs to consider integrity constraints.

Extended ERP components

are the extra components that meet organizational needs not covered by the core components and primarily focus on external operations. Includes: Business Intelligence Customer Relationship management Supply Chain Management Ebusiness

Business requirements

are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.

Core ERP components

are the traditional components included in most ERP systems and primarily focus on internal operations. Includes: Accounting and Finance Production and Materials management Human Resources

Longitude

represents an east/west measurement of position.

The packet footer

represents the end of the packet or transmission end. The packet header and packet footer contain error-checking information to ensure the entire message is sent and received. The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.

attenuation

represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.

Institute of Electrical and Electronics Engineers (IEEE)

researches and institutes electrical standards for communication and other technologies.

Association detection

reveals the relationship between variables along with the nature and frequency of the relationships. Many people refer to association detection algorithms as association rule generators because they create rules to determine the likelihood of events occurring together at a particular time or following each other in a logical progression. Percentages usually reflect the patterns of these events; for example, "55 percent of the time, events A and B occurred together," or "80 percent of the time that items A and B occurred together, they were followed by item C within three days."

automatic call distribution,

routes inbound calls to available agents

Online training

runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.

Sales CRM Technology

sales management contact managment opportunity managment

Analytical information includes...___,___,____,___, and comes back to a central_____

sales projections, future growth, trends, and pruduct statisitics Database

Examples of Transactional information includes___,___,___, which all come back to a central_____

sales receipt, packaging slip, airline ticket Database

Two methods for encrypting network traffic on the web are

secure sockets layer and secure hypertext transfer protocol.

one of the biggest pitfalls associated with real-time information

—continual change

Collaborative engineering

—reduces product development costs.

Offshore outsourcing

—using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.

Employees can ______ data by linking to the source and requesting the desired information, or ______ it by sending an alert to a user's device or automatically refreshing data

"pull" "push"

There are three phases in the evolution of CRM:

(1) reporting, (2) analyzing, and (3) predicting.

networks create increased challenges in

(1) security and (2) social, ethical, and political issues

A record.

(also called a row) is a collection of related data elements. Each record in an entity occupies one row in its respective table

Attributes

(also called columns or fields) are the data elements associated with an entity.

entity

(also referred to as a table) stores information about a person, place, thing, transaction, or event.

In-sourcing

(in-house development) uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.

Types of systems Reports**

**STUDY FROM NOTES** Keyword: Types of systems Reports

1 Mbps =

1,000 Kbps

DSL

Always on connection, requires special modem

Common Supply Chain Metrics

Back order: Inventory cycle time: Customer-order cycle time: Inventory turnover:

Intranet is used for....

Business operations and management, Communications and collaboration, Web publishing

What is the physical view of information? Answers: Deals with the storage of information as "1"'s and "0"'s on a storage device such as a hard disk Deals with the logical storage of information on a storage device such as a hard disk Focuses on how users logically access information to meet their particular business needs Focuses on how users physically access information to meet their particular business needs

Deals with the storage of information as "1"'s and "0"'s on a storage device such as a hard disk

Effective and efficient supply chain management systems can enable an organization to have these impacts on Porter's Five Forces Model

Decrease the power of its buyers. Increase its supplier power. Increase buyers' switching costs to reduce the threat of substitute products or services. Create entry barriers to reduce the threat of new entrants. Increase efficiencies while seeking a competitive advantage through cost leadership

Information Granularities

Detail (fine), summary, Aggregate (course)

Which of the following is not a technique for choosing strategic projects?

Develop a project plan

The data warehouse then is simply a tool that enables business users, typically managers, to be more effective in many ways, including

Developing customer profiles. Identifying new-product opportunities. Improving business operations. Identifying financial issues. Analyzing trends. Understanding competitors. Understanding product performance.

Information Formats

Document, presentation, spreadsheet, database

Insights analytical CRM can help an organization gain: (5)

Find new profitable customers Exceed customer expectations Discover the activities the firm performs the best Eliminate competition: Care about customers:

Core competencies.

Many companies have recently begun to consider outsourcing as a way to acquire best-practices and the business process expertise of highly skilled technology resources for a low cost. Technology is advancing at such an accelerated rate that companies often lack the technical resources required to keep current.

Which of the following is not one of the three main links in the supply chain?

Materials flow from suppliers and their "downstream" suppliers at all levels

Dial Up

On demand access using a modem and telephone lines

The four primary reasons for low-quality information are:

Online customers intentionally enter inaccurate information to protect their privacy. Different systems have different information entry standards and formats. Data-entry personnel enter abbreviated information to save time or erroneous information by accident. Third-party and external information contains inconsistencies, inaccuracies, and errors.

The three forms of outsourcing options available for a project are:

Onshore outsourcing Nearshore outsourcing Offshore outsourcing

Companies can choose information cleansing software from several different vendors including

Oracle, SAS, Ascential Software, and Group 1 Software

The two primary diagrams most frequently used in project planning are_______ and __________ charts.

PERT Gantt

What type of chart typically displays the critical path?

PERT chart

Different forms of systems testing**

REVIEW FROM NOTES keyword: Different forms of System Testing

Tangible benefits

are easy to quantify and typically measured to determine the success or failure of a project. ex decrease expenses increase quality decrease response time

VoiP capabilities

The ability to have more than one phone number, including numbers with different area codes. Integrating email and voicemail so users can listen to their voice mail using their computer. The ability to receive personal or business calls via computer, no matter where the user is physically located

Customer-order cycle time:

The agreed upon time between the purchase of a product and the delivery of the product.

a stored attribute

The attribute that is used to derive the attribute One example of a derived and stored attribute is a person's age. If the database has a stored attribute such as the person's Date of Birth, then a derived attribute called Age can be created from taking the Current Date (this is retrieved from the DBMS) and subtracting the Date of Birth to get the age

A requirement is unambiguous if it has the same interpretation for all parties Ambiguous requirement: ex Unambiguous requirement: ex

The financial report must show profits in local and U.S. currencies. The financial report must show profits in local and U.S. currencies using the exchange rate printed in The Wall Street Journal for the last business day of the period being reported

Inventory turnover:

The frequency of inventory replacement.

Wireless fidelity (Wi-Fi) is

a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves. Wi-Fi has a maximum range of about 1,000 feet in open areas such as a city park and 250 to 400 feet in closed areas such as an office building.

Inventory cycle time:

The time it takes to manufacture a product and deliver it to the retailer.

Kamikaze Project:

This is a project that has little chance of success but you are so passionate about the content that you find great happiness working on the project. For example, you are asked to build a website to support a cancer foundation, a cause near to your heart, but the company is nonprofit and doesn't have any funds to help buy the software you need to get everything working. You patch the system together and implement many manual work-arounds just to keep the system functioning.

Gate one: inception.

This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do.

primary reasons projects fail:

Unclear or missing business requirements. Skipped SDLC phases. Changing technology. The cost of finding errors. Balance of the triple constraints.

Where would you find the suppliers' suppler in a typical supply chain?

Upstream

Customer relationship management (CRM) is

a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability. CRM system can track every form of customer communication providing this information to all employees With a CRM system a firm can obtain an overview of the customer's products, preferences, account information, communications, and purchasing history, allowing it to send customized product offers, expedite shipping, ensure satisfaction, and other marketing and sales techniques that can greatly add to sales and profits.

wireless MAN (WMAN) is

a metropolitan area network that uses radio signals to transmit and receive data. WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States. One with the potential for success is Worldwide Interoperability for Microwave Access (WiMAX),

ICANN (Internet Corporation for Assigning Names and Numbers) is

a nonprofit governance and standards organization that certifies all domain name registrars throughout the world

Standard packet formats include

a packet header, packet body (containing the original message), and packet footer.

geocoin,

a round coin-sized object, is uniquely numbered and hidden in geocache

waterfall methodology,

a sequence of phases in which the output of each phase becomes the input for the next The traditional waterfall methodology no longer serves as an adequate systems development methodology in most cases. Because this development environment is the norm and not the exception anymore, development teams use a new breed of alternative development methods to achieve their business objectives. So they use the below software development methodologies.

A packet is

a single unit of binary data routed through a network. Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.

electronic data interchange (EDI),

a standard format for the electronic exchange of information between supply chain participants.

A business rule is

a statement that defines an aspect of a business. It is intended to convey the behavior and rules of a business.

agile methodology

aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. Agile methodology is what it sounds like: fast and efficient, with lower costs and fewer features.

derived attribute.

an attribute can be calculated using the value of another attribute,

Null-valued attribute is

assigned to an attribute when no other value applies or when a value is unknown. A person who does not have a mobile phone would have null stored for the value for the Mobile Phone Number attribute. Null can also be used in situations where the attribute value is unknown such as Hair Color

pilot implementation

assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to a new system

Several techniques can secure wireless networks from unauthorized access whether used separately or in combination. One method is

authenticating Wi-Fi access points.

Sales management CRM systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts.

Selling chain management—

automates order processes from initial customer inquiry to final product delivery.

the services contact center systems offer are ______, ______, and _______

automatic call distribution predictive dialing interactive voice response (IVR)

Which of the following is not considered a feature in a contact center?

automatic predictive dialing

predictive dialing,

automatically dials outbound calls and forwards answered calls to an available agent

Sales force automation (SFA)

automatically tracks all the steps in the sales process. SFA products focus on increasing customer satisfaction, building customer relationships, and improving product sales

In order to measure ERP success a __________ is used

balanced scorecard

We measure network performance in terms of ________

bandwidth,

Bandwidth is measured in terms of _________,

bit rate (or data rate)

The testing phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.

3G,

brings wireless broadband to mobile phones

Internet Protocol TV (IPTV), which

distributes digital video content using IP across the Internet and private IP networks. Comcast provides an example of a private IP network that also acts as a cable TV provider. Traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel. With IPTV, the user selects a channel and the service provider sends only that single program to the television.

wireless WAN (WWAN)

is a wide area network that uses radio signals to transmit and receive data.

Highest frequency means

more/quicker access to information

Latitude

represents a north/south measurement of position.

Three common forms for mining structured and unstructured data are:

Cluster analysis Association detection Statistical analysis.

Disadvantages of waterfall methodology In NOTES

In notes

To create an SSL connection, a web server requires an _________,

SSL Certificate

bit rate (or data rate)

the number of bits transferred or received per unit of time.

content creator

is the person responsible for creating the original website content.

content editor

is the person responsible for updating and maintaining website content.

1 Gbps =

1,000 Mbps

1 Kbps =

1,000 bps

A few of the challenges facing the length of the contract include:(3)

1. It can be difficult to break the contract. 2. Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. 3. Re-creating an internal MIS department if the outsource provider fails is costly and challenging.

Programming languages include the following order: (5 generations)

1. First generation: Machine language difficult for businesspeople to understand. 2. Second generation: Assembly language difficult for businesspeople to understand. 3. Third generation: High-level programming languages, such as C, C++, and Java. 4. Fourth generation: Programming languages that look similar to human languages. 5. Fifth generation: Programming languages for artificial intelligence and neural networks.

The balanced scorecard uses four perspectives to monitor an organization:

1. The learning and growth perspective. 2. The internal business process perspective. 3. The customer perspective. 4. The financial perspective (Explained thoroughly in graphs in main Notes)

Supply chain management performs three main business processes

1. Materials flow from suppliers and their upstream suppliers at all levels. 2.Materials are transformed into semifinished and finished products—the organization's own production processes. 3.Products are distributed to customers and their downstream customers at all levels.

WiFi Standards and bandwidth: a b g n

54 Mbps 11 Mbps 54 Mbps 140 Mbps

Which of the following is correct in reference to a database? Answers: A database can support only one logical view. A database can support a single physical views. A database can support many strict relationships. A database can support up to three logical views.

A database can support a single physical views.

Five characteristics common to high quality information

Accurate, complete, consistent, Timely, and Unique

Cable

Always on connection, special cable modem and cable line required Shared resource with nearby users

What is a project manager?

An individual who is an expert in project planning and management

Back order:

An unfilled customer order for a product that is out of stock.

An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on?

Analysis of project risks

Key uses for data mining

Analyzing customer buying patterns to predict future marketing and promotion campaigns. Building budgets and other financial information. Detecting fraud by identifying deceptive spending patterns. Finding the best customers who spend the most money. Keeping customers from leaving or migrating to competitors. Promoting and hiring employees to ensure success for both the company and the individual.

Which of the following is not a major ISP in the United States?

Apple

Which of the following is a common customer service CRM metric?

Average time to resolution

What are the five elements that are needed to create a connected world or a network?

Categories, providers, access technologies, protocols, and convergence

3 Problems with using low quality information

Completeness. The customer's first name is missing. Another issue with completeness. The street address contains only a number and not a street name. Consistency. There may be a duplication of information since there is a slight difference between the two customers in the spelling of the last name. Similar street addresses and phone numbers make this likely. Accuracy. This may be inaccurate information because the customer's phone and fax numbers are the same. Some customers might have the same number for phone and fax, but the fact that the customer also has this number in the email address field is suspicious. Another issue with accuracy. There is inaccurate information because a phone number is located in the email address field. Another issue with completeness. The information is incomplete because there is not a valid area code for the phone and fax numbers.

Customer Service CRM Technology

Contact Center Web-based Self-service Call Scripting

mbusiness offerings include

Digital purchases, Location-based services, Mobile banking and payments, Mobile shopping

Advantages of Using Wireless Networks

Enhance mobility provide immediate data access increase location and monitoring capabilities improves workflow provides mobile business opportunities provides an alternative to wiring

What is the key word in ERP?

Enterprise

Composite entities -

Entities that exist to represent the relationship between two other entities

Some common GIS uses include:

Finding what is nearby. Routing information. (directions) Sending information alerts. Mapping densities. Mapping quantities.

Rapid growth.

Firms must get their products to market quickly and still be able to react to market changes. By taking advantage of outsourcing, an organization can acquire the resources required to speed up operations or scale to new demand levels.

Extranets provide business value in several ways....

First, by relying on web browsers they make customer and supplier access to company resources easy and fast. Second, they enable a company to customize interactive web-enabled services for the intended audience, to build and strengthen strategic relationships with customers and suppliers. Finally, extranets can allow and improve collaboration with customers and other business partners.

DSL has two major advantages over dial-up.

First, it can transmit and receive data much faster second major advantage is that because they have an "always on" connection to their ISP, users can simultaneously talk on the phone and access the Internet.

problems with many-to-many relationships.

First, the relational data model was not designed to handle many-to-many relationships. This means they need to be replaced with a one-to-many relationship to be used in a relational DBMS. Second, many-to-many relationships will create redundancy in the data that are stored. This then has a negative impact on the accuracy and consistency that a database needs.

the fundamentals of RAD (3)

Focus initially on creating a prototype that looks and acts like the desired system actively involve system users in the analysis, design, and development phases accelerate collecting the business requirements through an interactive and iterative construction approach

Some of the key questions project planning can help answer include:

How are deliverables being produced? What activities or tasks need to be accomplished to produce the deliverables? Who is responsible for performing the tasks? What resources are required to perform the tasks? When will the tasks be performed?

Many-to-Many Relationship

Identifying and removing many-to-many relationships will help to create an accurate and consistent database. A many-to-many relationship (M:N) is between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity

primary business benefits received when implementing supply chain management systems.

Improved visibility across the supply chain and increased profitability for the firm

business consequences that occur due to using low-quality information to make decisions are

Inability to accurately track customers. Difficulty identifying the organization's most valuable customers. Inability to identify selling opportunities. Lost revenue opportunities from marketing to nonexistent customers. The cost of sending nondeliverable mail. Difficulty tracking revenue because of inaccurate invoices. Inability to build strong relationships with customers.

The many benefits associated with outsourcing include:

Increased quality and efficiency of business processes. Reduced operating expenses for head count and exposure to risk for large capital investments. Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies. Increased flexibility for faster response to market changes and less time to market for new products or services.

What is a disadvantage of networking or performing business in a connected world?

Increased security threats

Information Levels

Individual, department, enterprise

Which of the following represents the four primary traits that help determine the value of information? Answers: Information type, information timeliness, information quality, and information governance Information statistics, information tracking, information quality, and information governance Information type, information timeliness, information governance, and information policy Information timeliness, information quality, information quantity, and information governance policy

Information type, information timeliness, information quality, and information governance

Four traits of the Value of Information

Information type, information timeliness, information quality, information governance

Challenges associated with outsourcing include:(3)

Length of contract. Threat to competitive advantage. Loss of confidentiality.

NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the following is not an NSP?

Microsoft

What do data warehouses support? Answers: Neural networks DSS OLTP OLAP and analytical processing

OLAP and analytical processing

LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the following are the most important network differentiating dimensions?

Performance and Cost

the five basic supply chain activities a company undertakes to manufacture and distribute products

Plan, Source, Make, Deliver, and Return

Primary Uses, Primary Business Benefit CRM SCM ERP

Primary Uses: Sales, marketing, customer service Primary Benefits: Sales forecasts, Sales strategies, Marketing campaigns Primary Uses: Customers, Resellers, partners, Suppliers, and Distributors Primary Benefits:Market demand, resource and capacity restraints, Real-time Scheduling Primary Uses:Accounting, Finance, Logistics, Production Primary Benefits: Forecasting, Planning, purchasing, material management, warehousing, inventory, distribution

Gate four: transition.

Primary questions answered in this phase address ownership of the system and training of key personnel.

The advantages of prototyping include:

Prototyping encourages user participation. Prototypes evolve through iteration, which better supports change. Prototypes have a physical quality allowing users to see, touch, and experience the system as it is developed. Prototypes tend to detect errors earlier. Prototyping accelerates the phases of the SDLC, helping to ensure success

Firms can find their most valuable customers by using the______ formula

RFM

three business applications taking advantage of wireless technologies

Radio-frequency identification (RFID), global positioning system (GPS), geographic information system (GIS)

The primary forms of agile methodologies include:

Rapid prototyping or rapid application development methodology. Extreme programming methodology. Rational unified process (RUP) methodology. Scrum methodology.

One of the primary goals of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. What does the elimination of data redundancy do for a database? Answers: Reduces disk space requirements Improves information scalability Improves information timeliness All of these

Reduces disk space requirements

Which of the following represents a reason data warehouses were created? Answers: Operational databases gave merged over time in most companies. Over time most companies standardized data storage formats. Running OLAP against the company databases slowed response times All of these.

Running OLAP against the company databases slowed response times

Which of the following is not a primary form of agile methodology?

SDLC

What are the two main methods for encrypting network traffic on the web?

SSL and SHTTP

key elements of project planning according to PMBOK IN NOTES

STUDY FROM NOTES

Which benefits of a connected world make all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user?

Sharing resources

Networks offer many advantages for a business including (3 core):

Sharing resources Providing opportunities Reducing travel

Internet service provider (ISP),

Specializes in providing management, support, and maintenance to a network.

the three enterprise systems most organizations use to integrate their disparate departments and separate operational systems

Supply chain management (SCM) Customer relationship management (CRM) Enterprise resource planning (ERP)

Order of supply chain

Supplier - Manufacturer - Distributor - Retailer - Customer

supply chain execution systems AND Which way does it move on the supply chain?

Supply chain execution systems ensure supply chain cohesion by automating the different activities of the supply chain. For example, a supply chain execution system might electronically route orders from a manufacturer to a supplier using electronic data interchange (EDI) (MOVES FORWARD TOWARD THE CUSTOMER IN THE SUPPLY CHAIN)

supply chain planning systems AND Which way does it move on the supply chain?

Supply chain planning systems use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory. (MOVES BACKWARD TOWARD SUPPLIER IN THE SUPPLY CHAIN)

IPTV features include:

Support of multiple devices Interactivity with users Low bandwidth Personalization

bullwhip effect

The bullwhip effect occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain. The misinformation regarding a slight rise in demand for a product could cause different members in the supply chain to stockpile inventory. These changes ripple throughout the supply chain, magnifying the issue and creating excess inventory and costs for all.

Gate two: elaboration.

This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

Gate three: construction.

This phase includes building and developing the product.

Mission Impossible Project:

This project has a great chance of success and your hard work will pay off as you find happiness and joy in the work. For example, this is the type of project where you work all day and night for a year and become the project hero as you complete the mission impossible and reap a giant promotion as your reward.

Ugly Project:

This project has a high chance of success but is very painful and offers little happiness. For example, you work day and night to install a new accounting system and although successful, you hate accounting and dislike the company and its products.

Suicide Project:

This project has no chance of success and offers you nothing but pain. This is the equivalent of your worst nightmare project.

The second integration method builds a central repository for a particular type of information

Users can create, update, and delete customer information only in the central customer database. As users perform these tasks, integrations automatically send the new and/or updated customer information to the other systems. Both integration methods do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

Which of the following questions represents a CRM predicting technology question?

What customers are at risk of leaving?

WLANs that use Wi-Fi have a built-in security mechanism called _____________,

Wi-Fi Protected Access (WPA)

An RFID reader (RFID interrogator) is

a transmitter/receiver that reads the contents of RFID tags in the area.

Worldwide Interoperability for Microwave Access (WiMAX),

a communications technology aimed at providing high-speed wireless data over metropolitan area networks. In many respects, WiMAX operates like Wi-Fi, only over greater distances and with higher bandwidths. WiMAX can provide both line-of-sight and non-line-of-sight service

A modem is

a device that enables a computer to transmit and receive data

help desk

a group of people who respond to users' questions.

Broadband is AND What bandwidth does it refer to?

a high-speed Internet connection that is always connected. High-speed in this case refers to any bandwidth greater than 2 Mbps.

project

a temporary activity a company undertakes to create a unique product, service, or result.

dynamic catalog, or

an area of a website that stores information about products in a database.

SSL Certificate

an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

extranet is

an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.

legacy system is

an old system that is fast approaching or beyond the end of its useful life within an organization.

Netflix uses data mining to

analyze each customer's film- viewing habits to provide recommendations for other customers with Cinematch, its movie recommendation system

Market basket analysis

analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying what the customers prefer as far as products and services

Web mining

analyzes unstructured data associated with websites to identify consumer behavior and website navigation.

Text mining

analyzes unstructured data to find trends and patterns in words and sentences. Text mining a firm's customer support email might identify which customer service representative is best able to handle the question, allowing the system to forward it to the right person.

location-based services (LBS)

applications that use location information to provide a service. LBS is designed to give mobile users instant access to personalized local content and range from 911 applications to buddy finders ("Let me know when my friend is within 1,000 feet") to games (treasure hunts) to location-based advertising ("Visit the Starbucks on the corner and get $1.00 off a latte").

Hotspots

are designated locations where Wi-Fi access points are publically available.

Intangible benefits

are difficult to quantify or measure ex improved decision making improved community service improved morale improved goodwill

Data models

are logical data structures that detail the relationships among data elements using graphics or pictures.

Network access points (NAPs)

are traffic exchange points in the routing hierarchy of the Internet that connects NSPs.

Companies are no longer trying to sell one product to as many customers as possible; instead, they are trying to sell one customer _________

as many products as possible.

Discovery prototyping

builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.

List generators

compile customer information from a variety of sources and segment it for different marketing campaigns.

data dictionary

compiles all of the metadata about the data elements in the data model.

If there is one flaw in TCP/IP, it is _________. This is why we use ___________

complexity of IP addresses a domain name system (DNS)

Intelligent security robot -

conducts patrols at an airport as well as recognize threats

local area network (LAN)

connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.

Enterprise application integration (EAI)

connects the plans, methods, and tools aimed at integrating separate enterprise systems. EAI reviews how legacy systems fit into the new shape of the firm's business processes and devises ways to efficiently reuse what already exists while adding new systems and data.

iterative development

consists of a series of tiny projects. It has become the foundation of multiple agile methodologies

supply chain

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

Which gate in the RUP methodology includes building and developing the project?

construction

physical view of information

deals with the physical storage of information on a storage device.

Which of the following is an advantage of a data-driven website? Answers: Longer development time Reducing customer input requirements Decreasing update costs More effective

decreasing update costs

Bugs are

defects in the code of an information system.

business rule

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule.

Data visualization

describes technologies that allow users to "see" or visualize data to transform information into a business perspective.

The project scope

describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project.

Test conditions

detail the steps the system must perform along with the expected result of each step.

data quality audits

determine the accuracy and completeness of its data

Affinity grouping—

determines which things go together.

Project Management Institute (PMI)

develops procedures and concepts necessary to support the profession of project management (www.pmi.org).

interactive voice response (IVR)

directs customers to use touch-tone phones or keywords to navigate or provide information

plunged implementation

discard the legacy system and immediately migrates all users to the new system

Partner relationship management (PRM)

discovers optimal sales channels by selecting the right partners and identifying mutual customers.

Infographics (information graphics)

displays information graphically so it can be easily understood. Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.

Unstructured data

do not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on.

Two of the primary features of ebusiness components are __________ and ___________.

elogistics eprocurement

Rapid application development (RAD) methodology (also called rapid prototyping)

emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process

The design phase

establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation. Moving into the design phase turns the project focus to the physical or technical point of view, defining the technical architecture that will support the system, including data models, screen designs, report layouts, and database models.

The critical path

estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

logical view of information

focuses on how individual users logically access information to meet their own particular business needs.

Supplier relationship management (SRM)

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects.

Two common methods are used for integrating databases

forward and backward integrations The second integration method builds a central repository for a particular type of information.

Call scripting systems

gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer.

Control objects for information and related technology (COBIT)

is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors

methodology

is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. Firms use a methodology to manage the deployment of technology with work plans, requirements documents, and test plans, for instance. A formal methodology can include coding standards, code libraries, development practices, and much more.

Gantt chart

is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration.

File transfer protocol (FTP)

is a simple network protocol that allows the transfer of files between two computers on the Internet. To transfer files with FTP, the FTP client program initiates a connection to a remote computer running FTP "server" software. After completing the connection the client can choose to send and/or receive files electronically.

satellite

is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area.

secure sockets layer (SSL)

is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

protocol

is a standard that specifies the format of data as well as the rules to be followed during transmission. Computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks.

entity-relationship diagram (ERD)

is a technique for documenting the entities and relationships in a database environment.

Brainstorming

is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted. Many times, new business opportunities are found as the result of a brainstorming session.

Cluster analysis

is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible. Cluster analysis segments customer information to help organizations identify customers with similar behavioral traits, such as clusters of best customers or one time customers.

Traceroute

is a utility application that monitors the network path of packet data sent to a remote computer. Traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination. When finished, traceroute displays the path from the initial computer to the destination computer.

Informing

is accessing large amounts of data from different management information systems.

Outsourcing

is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

RFID tag

is an electronic identification device that is made up of a chip and antenna.

Wired equivalent privacy (WEP)

is an encryption algorithm designed to protect wireless transmission data. If using a Wi-Fi connection, WEP encrypts the data using a key that converts the data into a non-human readable form. The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks. Unfortunately, the underlying technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA

project manager

is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget. The project manager is the person responsible for executing the entire project and defining the project scope that links the project to the organization's overall business goals.

data-driven website

is an interactive website kept constantly updated and relevant to the needs of its customers using a database.

One-to-One Relationship (1:1)

is between two entities in which an instance of one entity can be related to only one instance of a related entity. Consider Mega-Video, which has many different stores with several employees and one manager. According to the company's business rules, the manager, who is an employee, can manage only one store.

War driving

is deliberately searching for Wi-Fi signals while driving by in a vehicle. Many individuals who participate in war driving simply map where Wi-Fi networks are available. Other individuals have a more malicious intent and use war driving to hack or break into these networks.

Workshop training

is held in a classroom environment and led by an instructor.

Up-selling

is increasing the value of the sale. McDonald's performs up- selling by asking customers whether they would like to super-size their meals for an extra cost.

Supply chain visibility

is the ability to view all areas up and down the supply chain in real time.

Project management

is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Eprocurement

is the business-to-business (B2B) online purchase and sale of supplies and services.

information cube

is the common term for the representation of multidimensional information

An access point (AP)

is the computer or network device that serves as a middleman between devices and the network. Each computer initially connects to the access point and then to other computers on the network.

Information redundancy

is the duplication of data, or the storage of the same data in multiple places.

Network convergence

is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures. Almost any type of information can be converted into digital form and exchanged over a network. Network convergence then allows the weaving together of voice, data, and video.

Application integration

is the integration of a company's existing management information systems.

Unified communications (UC)

is the integration of communication channels into a single service. UC integrates communication channels allowing participants to communicate using the method that is most convenient for them.

Data integration

is the integration of data from multiple sources, which provides a unified view of all data.

Supply chain management (SCM)

is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability

Feasibility

is the measure of the tangible and intangible benefits of an information system

The systems development life cycle (SDLC)

is the overall process for developing information systems, from planning and analysis through implementation and maintenance. The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase. These activities typically include determining budgets, gathering system requirements, and writing detailed user documentation.

Accounting and finance ERP components

manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management. One of the most useful features of an ERP accounting/finance component is credit management. Most organizations manage their relationships with customers by setting credit limits, or limits on how much a customer can owe at any one time. ERP financial systems correlate customers' orders with their account balances to determine credit availability.

Elogistics

manages the transportation and storage of goods.

Single-valued attribute

means having only a single value of each attribute of an entity. A person's age is an example of a single-valued attribute because a person cannot have more than one age.

Multivalued attribute

means having the potential to contain more than one value for an attribute . For example, an educational degree of a person is a multi-valued attribute because a person can have more than one degree.

integrations are achieved using__________

middleware

Software customization

modifies software to meet specific user or business requirements.

smartphones that offer

more advanced computing ability and connectivity than basic cell phones. They allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, sending text messages, and taking and sending photos.

Data visualization tools

move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more. Data visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized.

most data warehouses and data marts are

multidimensional databases. A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension.

Database: maintains information about various types of

objects (inventory), events (Transactions), people (Employee and customers), and places (Warehouses).

Website personalization

occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person.

Regional service providers (RSPs)

offer Internet service by connecting to NSPs, but they also can connect directly to each other.

A line-of-sight option

offers a fixed antenna that points at the WiMAX tower from a rooftop or pole. This option is much faster than non-line-of-sight service, and the distance between the WiMAX tower and antenna can be as great as 30 miles.

A RFID system is comprised of...

one or more RFID tags, one or more RFID readers, two or more antennas (one on the tag and one on each reader), RFID application software, and a computer system or server

The two primary components of a CRM strategy are ____________ CRM and ____________ CRM.

operational analytical

data model,

or the logical data structures that detail the relationships among data elements using graphics or pictures.

rational unified process (RUP) methodology,

owned by IBM, provides a framework for breaking down the development of software into four "gates." Each gate consists of executable iterations of the software in development. A project stays in a gate waiting for the stakeholder's analysis, and then it either moves to the next gate or is cancelled.

Edge matching (warping, rubber sheeting) occurs when

paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors.

the different implementation methods an organization can choose to ensure success

parallel implementation pilot implementation phased implementation plunged implementation

Power-on passwords—

passwords implemented at the hardware level that must be entered before gaining access to the computer—are the first line of defense against unauthorized use.

Data-mining tools use a variety of techniques to find

patterns and relationships in large volumes of information that predict future behavior and guide decision making

The SDLC is comprised of seven distinct phases: (In order) **ALSO STUDY CHART EXPLAINING ACTIVITIES ASSOCIATED WITH EACH**

planning, analysis, design, development, testing, implementation, and maintenance

requirements definition document

prioritizes all of the business requirements by order of importance to the company.

At the top of the hierarchy are national service providers (NSPs),

private companies that own and maintain the worldwide backbone that supports the Internet

virtual private network (VPN

private, secure Internet access, in effect a "private tunnel" within the Internet,

Challenges of using wireless networks

protecting against theft, protecting wireless connections, preventing virus' on mobile devices, addressing privacy concerns with RFID and LBS

high-speed Internet cable connections

provide Internet access using a cable television company's infrastructure and a special cable modem.

Enterprise systems

provide enterprise wide support and data access for a firm's operations and business processes. These systems can manage customer information across the enterprise, letting you view everything your customer has experienced from sales to support. Enterprise systems are often available as a generic, but highly customizable, group of programs for business functions such as accounting, manufacturing, and marketing.

Real-time systems

provide real-time information in response to requests.

personal area network (PAN)

provides communication for devices owned by a single user that work over a short distance. Personal area networks generally cover a range of less than 10 meters (about 30 feet)

Metadata

provides details about data. For example, metadata for an image could include its size, resolution, and date created.

Digital subscriber line (DSL)

provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines. Used in homes and small businesses

Employee relationship management (ERM)

provides web-based self-service tools that streamline and automate the human resource department.

two primary tools available for retrieving information from a DBMS.

query- by-example (QBE) tool structured query language (SQL)

repeater

receives and repeats a signal to extend its attenuation or range

RFM formula

recency, frequency, and monetary value In other words, an organization must track: How recently a customer purchased items. How frequently a customer purchases items. The monetary value of each customer purchase.

Collaborative demand planning—

reduces inventory investments, while improving customer satisfaction.

Wireless,

refers to any type of operation accomplished without the use of a hard-wired connection. There are many environments in which the network devices are wireless but not mobile, such as wireless home or office networks with stationary PCs and printers. Some forms of mobility do not require a wireless connection; for instance, a worker can use a wired laptop at home, shut down the laptop, drive to work, and attach the laptop to the company's wired network. In many networked environments today, users are both wireless and mobile; for example, a mobile user commuting to work on a train can maintain a VoIP call and multiple TCP/IP connections at the same time.

Information granularity

refers to the extent of detail within the information (fine and detailed or coarse and abstract)

Edgar (E. F.) Codd

relational data model is the result of his work

The triple constraints

relationships among the three primary and interdependent variables in any project—time, cost, and scope. All projects are limited in some way by these three constraints. The relationship among these variables is such that if any one changes, at least one other is likely to be affected.

WLANs allow MIS employees to

relocate equipment at will

Cross-selling is

selling additional products or services to an existing customer. For example, if you were to purchase Tim Burton's movie Alice in Wonderland on Amazon, you would also be asked if you want to purchase the movie's soundtrack or the original book. Amazon is taking advantage of cross-selling by offering customers goods across its book, movie, and music product lines.

The access point then

sends the information to the Internet over a wired broadband connection

When creating a relational database, the attributes in the data model must be_______

single-valued

It is common knowledge that the _______ the project, the greater the success rate. The ____________ style is the ultimate in small projects.

smaller iterative development

proxy is

software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

wide area network (WAN)

spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. WANs are essential for carrying out the day-to-day activities of many companies and government organizations WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks.

A relational database model

stores information in the form of logically related two-dimensional tables.

relational database model

stores information in the form of logically related two-dimensional tables.

geographic information system (GIS)

stores, views, and analyzes geographic data creating, multidimensional charts or maps. For example, GIs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.

To improve visibility across the supply chain, firms can use _______________ and ______________.

supply chain planning systems supply chain execution systems

Analytical CRM

supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers. Includes: Data mining Data Warehouse Collaborative CRM system

Off-the-shelf application software

supports general business processes and does not require any specific software customization to meet the organization's needs.

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers. Includes: Sales Marketing Customer Service

Opportunity management CRM

systems target sales opportunities by finding new customers or companies for future sales. They determine potential customers and competitors and define selling efforts including budgets and schedules. The primary difference between contact management and opportunity management is that contact management deals with existing customers and opportunity management with new or potential customers.

Enterprise application integration (EAI) middleware

takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.

The development phase

takes all the detailed design documents from the design phase and transforms them into the actual system.

A forward integration

takes information entered into a given system and sends it automatically to all downstream systems and processes.

A backward integration Why do companies not use this method very much?

takes information entered into a given system and sends it automatically to all upstream systems and processes. However, integrations are expensive and difficult to build and maintain, causing most organizations to invest in forward integrations only.

WAPs with multiple-in/multiple-out (MIMO)

technology have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices.

Broadband over power line (BPL)

technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.

structured query language (SQL) AND Who primarily uses it

that asks users to write lines of code to answer questions against a database. MIS professionals have the skills required to code SQL

query- by-example (QBE) tool AND Who primarily uses it

that helps users graphically design the answer to a question against a database. Managers typically interact with QBE tools

DSL's disadvantages are

that it works over a limited physical distance and remains unavailable in many areas where the local telephone infrastructure does not support DSL technology

bandwidth,

the maximum amount of data that can pass from one point to another in a unit of time. A network essentially has many different hoses of unequal capacity connected together, which will restrict the flow of data when one is smaller than the others. Therefore, the speed of transmission of a network is determined by the speed of its smallest bandwidth.

IEEE 802.11n (or Wireless-N) is

the newest standard for wireless networking. Compared with earlier standards such as 802.11b, Wireless-N offers faster speeds, more flexibility, and greater range

maintenance phase,

the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals. This phase continues for the life of the system because the system must change as the business evolves and its needs change, which means conducting constant monitoring, supporting the new system with frequent minor changes (for example, new reports or information capturing), and reviewing the system to be sure it is moving the organization toward its strategic goals.

implementation phase,

the organization places the system into production so users can begin to perform actual business operations with it.

Data governance refers to

the overall management of the availability, usability, integrity, and security of company data

The Internet and globalization

the pervasive nature of the Internet has made more people comfortable with outsourcing abroad as India, China, and the United States become virtual neighbors.

bit (short for binary digit) is

the smallest element of data and has a value of either 0 or 1

Mobile means

the technology can travel with the user, for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server. There are many environments in which the network devices are wireless but not mobile, such as wireless home or office networks with stationary PCs and printers. Some forms of mobility do not require a wireless connection; for instance, a worker can use a wired laptop at home, shut down the laptop, drive to work, and attach the laptop to the company's wired network. In many networked environments today, users are both wireless and mobile; for example, a mobile user commuting to work on a train can maintain a VoIP call and multiple TCP/IP connections at the same time.

In a Wi-Fi network,

the user's laptop or other Wi-Fi-enabled device has a wireless adapter that translates data into a radio signal and transmits it to the wireless access point.

Two ways to use VoIP for telephone calls are

through a web interface that allows users to make calls from their computer and through a phone attached to a VoIP adapter that links directly to the Internet through a broadband modem.

Project management is the science of making intelligent trade-offs between

time, cost, and scope.

One of the primary reasons for developing TCP/IP was... One of the most valuable characteristics of TCP/IP is

to allow diverse or differing networks to connect and communicate with each other, essentially allowing LANs, WANs, and MANs to grow with each new connection. how scalable its protocols have proven to be as the Internet has grown

A key idea within data warehousing is

to collect information from multiple systems in a common location that uses a universal querying tool. Data warehouses go even a step further by standardizing information. The true value of a data warehouse is its ability to provide multidimensional analysis that allows users to gain insights into their information.

The primary purpose of a data warehouse is AND What type of information does it work with?

to combine information, more specifically, strategic information, throughout an organization into a single repository

A great example of using cluster analysis in business is

to create target-marketing strategies based on zip codes

One of the main reasons for creating an ERD is

to identify and represent the relationships between entities.

Business intelligence dashboards

track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.

Human resources ERP components

track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws. They even allow the organization to perform detailed employee analysis, such as identifying who is likely to leave the company unless additional compensation or benefits are provided, and whether the most talented people are working in areas where they can have the greatest impact.

Network access technologies use a standard Internet protocol called _________,

transmission control protocol/Internet protocol (TCP/IP)

Semi-passive RFID tags

use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

Chipless RFID tags

use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.

Voice over IP (VoIP)

uses IP technology to transmit telephone calls. VoIP service providers—specialists as well as traditional telephone and cable companies and some ISPs—allow users to call anyone with a telephone number *The biggest benefit of VoIP is its low cost.* Two ways to use VoIP for telephone calls are through a web interface that allows users to make calls from their computer and through a phone attached to a VoIP adapter that links directly to the Internet through a broadband modem.

A non-line-of-sight service

uses a small antenna on a mobile device that connects to a WiMAX tower less than six miles away where transmissions are disrupted by physical obstructions. This form of service is similar to Wi-Fi but has much broader coverage area and higher bandwidths.

parallel implementation

uses both the legacy system and the new system until all users verify that the new system functions correctly

Radio-frequency identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code. RFID wirelessly exchanges information between a tagged object and a reader/writer.

scrum methodology,

uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal. In scrum methodology, each day ends or begins with a stand-up meeting to monitor and control the development effort.

The main challenge associated with network convergence is?

using the many different tools efficiently and productively. Knowing which communication channel—PC, text message, videoconference—to use with each business participant can be a challenge

TCP (the TCP part of TCP/IP)

verifies the correct delivery of data because data can become corrupt when traveling over a network. TCP ensures the size of the data packet is the same throughout its transmission and can even retransmit data until delivered correctly.

IP (the IP part of TCP/IP)

verifies the data are sent to the correct IP address, numbers represented by four strings of numbers ranging from 0 to 255 separated by periods.

Examples of time-series information include

web visits per hour, sales per month, and calls per day

Asset tracking occurs

when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.

Information integrity issues occur

when a system produces incorrect, inconsistent, or duplicate data

Information inconsistency occurs

when the same data element has different values

click-to-talk functions

which allow customers to click on a button and talk with a representative via the Internet.

The wireless access point,

which consists of a transmitter with an antenna that is often built into the hardware, receives the signal and decodes it.

computer-aided software engineering (CASE) tools,

which provide automated support for the development of the system.

transmission control protocol/Internet protocol (TCP/IP)

which provides the technical foundation for the public Internet as well as for large numbers of private networks.

Transmission control protocol/internet protocol

which provides the technical foundation for the public Internet as well as for large numbers of private networks. One of the primary reasons for developing TCP/IP was to allow diverse or differing networks to connect and communicate with each other, essentially allowing LANs, WANs, and MANs to grow with each new connection (TCP/IP) KNOW THE ORDER TCP then IP

Nearshore outsourcing

— contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

Onshore outsourcing

— engaging another company within the same country for services. 2.

middleware

— several different types of software that sit between and provide connectivity for two or more software applications. Middleware translates information between disparate systems.


Conjuntos de estudio relacionados

Prep U: musculoskeletal disorders

View Set

Chapter 2: Boot process and runlevels

View Set

Chapter 17: Impact of Chronic Illness, Disability, or End of Life Care on the Child and Family

View Set

anatomy module 4- neuro of rest of brain and spinal cord

View Set

SOC Exam 1 - Saunders NCLEX Review Book

View Set