MIS5/ISM3011/Ch.1-6

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the differences between OLAP and OLTP

Online transaction processing (OLTP) is used to facilitate and manage transaction-oriented applications, such as point-of-sale, data entry, and retrieval transaction processing. It generally uses internal data and responds in real time. Online analytical processing (OLAP) generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product, and location.

What are three types of hackers?

Script kiddies, black hats, and White hats (also known as ethical hackers).

What are two advantages and two disadvantages of telecommuting?

Two advantages: • Can care for small children or elderly parents and spend more time with family • Have fewer restrictions on clothing for work, thereby saving the expense of work wear Two disadvantages: • Can become a workaholic (no hard boundaries between "at work" and "at home") • No regulated work routine

What are two major types of business analytics?

Two popular ones are descriptive and predictive analytics.

What are three risks associated with e-mail?

(1) For example, pressing "Reply All" instead of "Reply" can result in private information being sent to recipients who were not supposed to have access to that information. (2) Also, printing out confidential e-mails, which may end up in wastebaskets, hotel rooms, or airport terminals (or linger in the printer's memory), may introduce risks. (3) Sending and receiving e-mails through smartphones, tablets, and other handheld devices further adds to the vulnerability of corporate private information.

What are three examples of information technologies used in retail business?

1. (POS) Point-of-sale 2. (RFID) Radio-frequency-identification tags. 3. Moblie devices

What is Michael Porter's five forces model? How can businesses use this model to improve their competitiveness in the marketplace?

1. Buyer power 2. Supplier power 3. Threat of substitute products or services 4. Threat of new entrants 5. Rivalry among existing competitors Businesses use this model for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive.

What are three applications of an HRIS?

1. Choosing the best job candidate 2. Scheduling and assigning employees 3. Predicting the organization's future personnel needs

Which information technologies are being used by Netflix to improve its competitiveness?

1. Data-mining 2. Collaborative filtering technologies 3. Robotics

What are two IT jobs that are in high demand?

1. IS security specialist 2. Data scientist

What are Michael Porter's three strategies for competing in the marketplace? Give an example of a company that uses each strategy.

1. Overall cost leadership (Walmart) 2. Differentiation (Apple) 3. Focus (Abercrombie & Fitch)

What are three methods for accessing files?

1. Sequential 2. Random 3. Indexed sequential

What is a DBMS? What are its major components?

A DBMS is software for creating, storing, maintaining, and accessing database files. Its major components are: • Database engine • Data definition • Data manipulation • Application generation • Data administration

Define "database"?

A database is a collection of related data that is stored in a central location or in multiple locations. You can think of it as being similar to a filing cabinet, in which data is organized and stored in drawers and file folders. As you can imagine, however, retrieving data from a database is much faster.

Define a "Computer"

A computer is defined as a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information. The instructions, also called a program, are step-by-step directions for performing a specific task, written in a language the computer can understand. Remember that a computer only processes data (raw facts); it cannot change or correct the data that is entered.

What are two types of encryption?

Asymmetric and symmetric encryption (also called secret key encryption).

How has information technology invaded our privacy?

By using cookies, log files, GPS, and other means information technology makes it easy to collect user private information intentionally and unintentionally.

What are the differences between cold and hot sites used for disaster recovery?

Cold sites have the right environment for computer equipment (such as air conditioning and humidity controls), but no equipment is stored in them. Hot sites, on the other hand, have all the needed equipment and are ready to go.

What are three examples of intellectual properties?

Copyrights, trademarks, trade secrets, and patents.

What are the four main components of an MIS?

Data, Databases, Process, and infromation

Which companies benefit the most from data-driven Web sites?

Data-driven Web sites are useful for the following applications, among others: • E-commerce sites that need frequent updates • News sites that need regular updating of content • Forums and discussion groups • Subscription services, such as newsletters

Define "privacy."

Defining privacy is difficult, however. In terms of electronic information, most people believe they should be able to keep their personal affairs to themselves and should be told how information about them is being used. Based on this definition, many practices of government agencies, credit agencies, and marketing companies using databases would represent an invasion of privacy. Unfortunately, information technologies have increased the ease of access to information for hackers as well as for legitimate organizations.

Among the five media (channels) discussed in the chapter, which one has the highest throughput? Which one is the most secure?

Fiber optics and fiber optics.

What is green computing? What are three examples of information technologies that could promote green computing?

Green computing involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment. The following are three examples of information technologies that could promote green computing: • Replace actual face-to-face meetings with meetings over computer networks • Use video conferencing, electronic meeting systems, and groupware • Use a virtual world

Define the client/server model. Which architecture in this model is the most common?

In the client/server model, software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client requests. The most common model is the In the two-tier architecture.

How can information technology lead to unethical decision-making?

Information technology makes it easier to access and collect all sorts of information. This ease of access might lead to unethical decision-making such as software piracy and unauthorized use of private information.

What are two classes of software? What is an example of each?

It can be classified broadly as system software and application software. For example, Microsoft Windows is the OS for most PCs and belongs to the system software group. This type of software works in the background and takes care of housekeeping tasks, such as deleting files that are no longer needed. Application software is used to perform specialized tasks. Microsoft Excel, for example, is used for spreadsheet analyses and number-crunching tasks.

Why is TCP/IP so popular?

It enables interoperability—in other words, it allows the linking of devices running on many different platforms.

Among the three types of networks (LAN, WAN, and MAN), which is the fastest?

LAN

What are server farms?

Large corporations and enterprises that need a lot of storage space use a server farm or server cluster. This is a collection of hundreds or thousands of computers that require a large amount of power to run and keep cool.

What are three examples of security threats to a smartphone?

Malware, eavesdropping, and spyware.

What are three advantages of mobile and wireless networks compared to their wired counterparts?

Mobility, flexibility, and ease of installation.

What are three factors that define the power of computers?

Speed, accuracy, and storage and retrieval capabilities.

What are three examples of technology tools that could be used for committing crimes?

Spyware and adware, phishing and pharming, and keystroke loggers.

What are some of goals and objectives of transaction-processing systems?

TPSs focus on data collection and processing, and they have provided enormous reductions in costs.

What are the differences between a logical view and a physical view of data?

The logical view involves how information appears to users and how it can be organized and retrieved. The physical view involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs.

What are three types of firewalls? Generally speaking, which type offers higher security?

The main types of firewalls are packet-filtering firewalls, application-filtering firewalls, and proxy servers. Generally speaking, application-filtering firewall offers higher security.

Which languages are mostly used in a Web-development environment?

The most important Web development languages are Hypertext Markup Language (HTML) and Extensible Markup Language (XML). Both languages are markup languages, not full-featured programming languages.

What is the CIA triangle?

There are three important aspects of computer and network security: confidentiality, integrity, and availability, collectively referred to as the CIA triangle.

What are three advantages of biometric security measures compared to non-biometric measures?

They cannot be stolen, lost, copied, or passed on to others.

What are the distinguished featured of third-generation computers?

Third-generation computers operated on integrated circuits, which enabled computers to be even smaller, faster, more reliable, and more sophisticated. Remote data entry and telecommunications were introduced during this generation.

How was IBM Watson able to beat two former champions of the television game show "Jeopardy"?

Thousands of algorithms and computer programs allowed it to break down human language into pieces so it could search for answers in its massive database. It answered questions without exactly understanding them, but it answered them with a high degree of confidence!

What are some of the advantages of touchless computing?

Touchless computing enables you to control what is on the screen with the movements of your finger. The goal of touchless computing is to provide an environment similar to the real world, in which you are able to manipulate objects using only your fingers.

What are three examples of security threats?

Trojan programs, logic bombs, and backdoors.

What are the 3 Vs in big data?

Volume, variety, and velocity.

What are two physiological issues related to using information technology?

• Internet addiction • Loss or diminish in social skills

What are two advantages of the bus topology?

• It is easy to extend. • It is very reliable.

What are three business applications of data communication?

• Online training for employees can be provided via virtual classrooms • Internet searches for information on products, services, and innovation • Web and video conferencing


Conjuntos de estudio relacionados

Antiviral drugs ( oseltamivir , acyclovir, zidovudine)

View Set

MGMT 309 Chapter 6 Study Questions

View Set

World Religions CH 11 Christianity

View Set

PrepU NCLEX - Perioperative Patient

View Set