MSIS 2103 Exam 1 Fall
Internet of Things (IoT)
**The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Often controlled from an app on a computer such as a smartphone Include: --thermostats (to control the home temperature) --refrigerators --door locks --Voice-activated speakers (Amazon Echo and Google Home) --security systems
Enterprise system
** Most businesses use today a single system that supports all of the business applications on a single database
Application Software
Software is end user programs such as browser, word processing, and spreadsheet
Business System
Stand alone or enterprise
Protocols are used by which of the following?
All of the above: Browsers, Cell phones, The internet, Web pages ** Protocol is a STANDARD
Your Internet Service Provider (ISP) says that your network runs at 50 gigabit per second. This is the _______.
Bandwidth
Digitally Sent Information
Like e-mail, browser traffic, or video like Skype or Zoom are sent digitally as a 1 or 0 (like a computer) ** 1 is the presence of signal and 0 is no signal
COUNTIF
Returns the number of cells that meet a condition set forth in a formula (counts the number of cells that fall under criteria in sheet)
When you buy something online you are
Using a customer-facing information system
When you use VMWare to work on the software on the university servers, you are using a_______.
Virtual machine
Closed-source operating systems software
Windows and iOS (adobe) only the company that made the software can see the program source code and change it
The language of the computer
is binary, 0 and 1, which is called a bit A byte is 8 bits We measure the size of data in bytes It can refer to a measure of data or of memory. (smallest to largest) kilo> mega> giga> tera> peta> exa> zetta> yotta
Through the use of apps (application software) your smart phone can access devices that are connected to a network. What technology does the smart phone use to connect to the network?
Cellular Radio, Wifi (NOT DSL, Cable, Satellite fiberoptics)
When you sign onto a LAN through WiFi, the router or LAN access point assigns you a ________ IP address
Dynamic
When you sign onto a LAN through WiFi, you have a ______ IP address and the LAN router has a _______ IP address.
Dynamic, Static
Gigabyte
1024 megabytes / 2^30 bytes EXAMPLE: CD = .7 Gigabyte
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a petabyte?
1024 terabytes
Petabyte
1024 terabytes / 2^50 bytes **A petabyte of songs played continuously would last more than 2000 years
Theoretical capacity of a network
Bandwidth measured in bits per second
Pay for Click
By seeing ads that are put on the page and clicking on ones that interest you, the website may get paid
Through the use of apps (application software) your smart phone can access devices that are connected to a network. What installed technology does the smart phone not use to connect to the network?
DSL
Information stored in the business' data base
Every transaction (sale) creates several pieces of data **The sale includes what was sold, the price, the quantity, how the purchaser paid, the date of the purchase, the time of the purchase, and if it was shipped to the customer, their street number, street, city, state, and zip code. All
Learning Objective 4
Everyone in business needs to understand the role of Information Systems in the organization. Again, as the course moves from LOOKING AT DATA AT A TABLE LEVEL TO DATA AT A DATABASE LEVEL, the course will provide awareness and exposure to the different ways in which technology and systems IMPACT the organization and its data.
Explicit knowledge
Facts and information **can be written down and obtained through reading (book)
All computer devices communicate over a network using computer languages such as Python or C#.
False
Data is information put into context.
False
Information is defined as facts, knowledge, and skill acquired by a person through experience or education
False
Learning objective four is to develop skill in using Excel by applying it to solve problems.
False (THIS IS LEARNING OBJECTIVE ONE)
Google Maps is a GPS system that utilizes a GIS system to provide information about the physical world.
False (because you need to switch GIS & GPS with each other) **Google Maps is a program that uses GPS (Global Positioning System) and is called a GIS (Geographical Information System)
Tacit knowledge
Skills **internalized skill EXAMPLE: You can read how to ski, but that does not mean that you can then immediately go to the slopes and ski down an expert run. You have to practice and internalize the ability to ski before you are an expert skier. Many of the skills you need to be a success in business require you to practice and internalize them. You will continue learning these skills throughout your life.
In order to perform a skill, the knowledge must be internalized. This is called ___________ knowledge
Tacit
Knowledge is defined as facts, information, and skills acquired by a person through experience or education
True
When you use a credit card, you are using several different companies' information systems.
True
You have a LAN at home so that all of your IoT devices can be reached through the Internet. All of the devices are connected by WiFi and have a dynamic IP address assigned by the router.
True
Information is data put in context
True Data = Fact Information = Fact put into context EXAMPLE: 60 is a number. I live at 60 Apple Lane. This is information because it has context.
Uniform Resource Locator (URL)
Two parts: first = the protocol identifier second = the domain name EXAMPLE: https://www.greatriverlearning.com/ protocol: https or secure hypertext transfer protocol domain name: greatriverlearning.com www: defines that it is on the World Wide Web The :// separates the parts of the URL
Wires or Wireless technology Signaling
WIRES: use electrical charges FIBER OPTICS: use light WIRELESS: uses broadcast radio, cellular radio, microwave, and satellite.
Computers use
binary switches, which were referred to as transistors in the early days of computers IS RELATED: **Data that a business stores in its information system is stored in a manner that the computer can read **Computer chips work like a large number of on/off switches
Computer Software
computer-coded application Every computer has an operating system such as Windows, iOS, or Linux. (operating system, application, open source, closed source) **Most businesses use Windows. Since this book is about business, we will concentrate on Windows and the applications like Excel.
Metropolitan Area Network (MAN)
connects a geographic area such as a University
Wide Area Network (WAN)
connects multiple LANs
Learning Objective 2
Most companies use relational databases to store data. A manager needs to have developed database understanding with a hands-on, problem-solving focus. The learning objective focuses on UNDERSTANDING HOW ORGANIZATIONAL DATABASES ARE "STORED" —meaning multiple tables, the use of foreign keys, and linking queries, to generate appropriate information.
Order of operations
Parenthesis ( ) Exponent ^ Multiple * Division / Add + Subtract -
Common protocol
standards There are standards for the Internet such as IP and transmission control protocol (TCP) **IP - Packets **TCP - application IPv4 assigns IP addresses consisting of four groups of up to three digits IPv6 assigns eight groups of up to four hexadecimal digits as the IP address
The key element of knowledge
the internalization of a skill
Pay for Conversion
the website gets paid if you buy something
VLOOKUP
used when there are more than two columns in the array (lookup table) -Excel function that allows you to lookup a value from a table. format: =vlookup(lookup_value, table_array, column_index_value, range_lookup) The lookup_value must be in the first column. The table array is the array of cells that contain the lookup table I define a name for the array to make it easier to use and reuse the lookup table ("GRADE") The column_index_value is the column with the value you want the vlookup to return The range_value is a logical true or false The default is true if left blank False will only return an exact value (I have never found a need to use it, and so I always leave it blank)
RANDBETWEEN
randomly assigns a number between two specified values
Three types of enterprise systems
1- Supply chain management (SCM) 2- Enterprise resource planning (ERP) 3- Customer relationship management (CRM) ** ALL of them support the business by: -automating routine tasks -providing routine reports -providing all employees the data and information needed to do their job
Kilobyte
1024 bytes / 2^10 bytes
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a terabyte?
1024 gigabytes
Terabyte
1024 gigabytes / 2^40 bytes ** is the equivalent of approximately 4.5 million books or approximately 260,000 MP3 music files
Megabyte
1024 kilobytes / 2^20 bytes EXAMPLE: 10,000 pages of text = 20 megabytes
Server
A computer that awaits and responds to requests for data. When you use a browser to access a webpage, it is on a server A server is a computer that is tied to the Internet and hosts that webpage Your computer is called the client. You will hear applications called client/server applications. This is an application that resides on the server and you access through a browser on your computer
One of the primary methods of making money on the Internet
Advertising
Ribbon
A strip of icons that appears across the top of the PowerPoint window; divided into tabs, each of which contains groups of related tools.
All computer devices communicate over a network using binary or machine language
True
Learning Objective 1
Excel remains a major analytical tool used in business. To succeed in business, a manager needs to have good analytical skills and the ability to use Excel to analyze data. The first learning objective is the development of EXCEL Skills with a hands-on, problem-solving using EXCEL, including topics that fall under the following categories: (DEVELOP SKILL IN USING EXCEL BY APPLYING IT TO SOLVE PROBLEMS) --Getting started with EXCEL --Using functions and formulas with EXCEL --Creating Charts and graphs with EXCEL --Creating Pivot tables --Learning how to solve business problems through application problems
Knowledge that is gained from a book is called _________ knowledge
Explicit
Open-source operating system software
Linux Anyone can see the program code and modify it **Requires additional security EXAMPLES: -R (statistical software) -Android (mobile operating system) -Chromium (browser, not Google Chrome) -FireFox (browser) -Apache (server software) -Apache Cassandra (distributed database software) Advantages: -Free -You can add new or different functions -Many different programmers work on open-source projects and share their improvements Company support: -Google supports R -Facebook Developed Casandra -IBM supports Apache
Endpoint Identifiers (ADDRESSES)
MAC address (media access control) --defines your device --hardcoded into the chip on a devices network card IP address (Internet Protocol) --defines your location on the network --assigned 1- Dynamic (wifi password use over and over) (up to 60 per access point) 2- Static (router, so it can be found) 3- URL (http://google.com) (has a static IP address attached to it) EXAMPLE: When you sign onto a wireless Local Area Network (LAN) with your computer, you are assigned a dynamic IP address by the access point or router. LAN reuses the dynamic IP addresses. After you sign off the LAN, the router will assign that address to the next person that signs on. The LAN's router has a static IP address. EXAMPLE: The mailman delivers the letter to your local city/neighborhood (IP address) and finally to the specific physical address of your machine (MAC address) **If you request a webpage, the request goes to the router, which passes the request on the Internet. The server that hosts the webpage will see the sender's IP address and send the page. The router will then send the page to your computer. Every device that is directly connected to a network has an IP address.
Which of the following is NOT related to the Moore's Law?
The distance between people in social networks decreases every year **technology is getting faster and cheaper over time **size is going down, power is going up
Moore's Law states that:
The number of transistors on a chip doubles every 12 to 18 months.
Data center or server farm
There are companies that host many websites on their servers A data center may have thousands of servers
Computer Network
a system of interconnected devices The network carries data from one point to another, from the beginning device to the end device The data is routed through switches and routers from origin to the end Along the way, the data may be routed through wires or wirelessly or both. The wires can consist of twisted pair telephone wires as in subscriber line (DSL), or cable as in the coax cable used by cable companies, or by fiber optic cable. (Wireless requires an access point, which is normally a wireless router) NETWORKS: -DSL -CABLE -FIBER OPTIC CABLE -WIRELESS (wifi, radio, microwave, satellite)
Computer Hardware
physical device Consists of: INPUT devices, COMPUTING devices (chips), and OUTPUT devices EXAMPLE: When we consider a smartphone, the device has all three in one device. We input data on the screen. We read output on the screen. The computing device is either in the smartphone or on a server that we access through the phone using a browser, which is an application. EXAMPLE: A tablet is a device with input, processing, and output in one
Knowledge is defined as
"facts, information, and skills acquired by a person through experience or education; the theoretical or practical understanding of a subject"
MIS Graduates
** Because businesses rely on computer systems, management information system (MIS) graduates are in high demand and command the highest average starting salaries of any business school graduate Job Opportunities: Business analyst Systems analyst Database administrator Communications specialist Information assurance analyst Mobile Applications Developer Information Assurance Analyst Database Analyst IT Director Webmaster. IT Operations Manager Operations Project Manager Technical Services Manager IT Training Development Specialist Supply Chain Director Analytics Manager Front-end Developer/Engineer IT Security Director User Interface Designer Technical Support Engineer Programmer Analyst Applications Engineer
The throughput of a network
Actual capacity, considering factors like latency, protocol overhead, and processing power. The number of users on the same network also affects your actual throughput on a network.
Which of the following is an open source application software?
All of the above
How do businesses make money on the internet?
All of the above (Selling product, Paid for showing advertising, content, obtaining customers)
Learning Objective 3
Information security is a major concern in business. Businesses spend millions of dollars annually to attempt to secure their data and their customer's data. The learning objective is to PROVIDE AN UNDERSTANDING OF THE IMPACT OF SECURITY ON ORGANIZATIONS AND ITS DATA as the class focuses on more complex problem-solving with database and data. This learning objective will provide EXPERIENCES and exposures for the student to learn how to practice safe and secure computing through an understanding of the risks involved with securing data and information throughout the organization.
A protocol is which of the following?
a standard (NOT language, device, resource)
The Internet (big I)
is one big network consisting of all networks that interconnect and allow data to be sent globally (WORLD WIDE WEB) NETWORKS: Public Network- Starbucks or McDonald's Private network- INTRANET (company) (connects everyone at all locations) or EXTRANET (connect suppliers to business info) Private network - allows all devices to talk and to be hidden behind the router's IP address (home) Supply chain network- A company may have a network that allows suppliers to see what the company's inventory of the material it sells is. This would allow the supplier to ensure the material arrives just in time for production or sales..
When you post a review on a business you are _______.
providing content
TCP (Transmission Control Protocol)
tells you which application on the computer (Internet browser, e-mail, video conference, etc.) should receive the data (like the name on a letter) TCP combined with IP defines how data is sent from one computer application to another over a network Every application on your computer uses its own set of protocols on top of TCP/IP **Usually referred to as TCP/IP. EXAMPLE: When you access a webpage through a browser, it is not sent as one piece of data. It is too big. Instead it is broken up into packets. Each packet contains the information of where it is going and how to reassemble the page back together.
Moore's law
the computing power of a computer chip doubles every 18 month **In 1965, Intel co-founder Gordon Moore observed that the number of transistors per square inch had doubled every year