MSIS 2103 Exam 1 Fall

¡Supera tus tareas y exámenes ahora con Quizwiz!

Internet of Things (IoT)

**The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Often controlled from an app on a computer such as a smartphone Include: --thermostats (to control the home temperature) --refrigerators --door locks --Voice-activated speakers (Amazon Echo and Google Home) --security systems

Enterprise system

** Most businesses use today a single system that supports all of the business applications on a single database

Application Software

Software is end user programs such as browser, word processing, and spreadsheet

Business System

Stand alone or enterprise

Protocols are used by which of the following?

All of the above: Browsers, Cell phones, The internet, Web pages ** Protocol is a STANDARD

Your Internet Service Provider (ISP) says that your network runs at 50 gigabit per second. This is the _______.

Bandwidth

Digitally Sent Information

Like e-mail, browser traffic, or video like Skype or Zoom are sent digitally as a 1 or 0 (like a computer) ** 1 is the presence of signal and 0 is no signal

COUNTIF

Returns the number of cells that meet a condition set forth in a formula (counts the number of cells that fall under criteria in sheet)

When you buy something online you are

Using a customer-facing information system

When you use VMWare to work on the software on the university servers, you are using a_______.

Virtual machine

Closed-source operating systems software

Windows and iOS (adobe) only the company that made the software can see the program source code and change it

The language of the computer

is binary, 0 and 1, which is called a bit A byte is 8 bits We measure the size of data in bytes It can refer to a measure of data or of memory. (smallest to largest) kilo> mega> giga> tera> peta> exa> zetta> yotta

Through the use of apps (application software) your smart phone can access devices that are connected to a network. What technology does the smart phone use to connect to the network?

Cellular Radio, Wifi (NOT DSL, Cable, Satellite fiberoptics)

When you sign onto a LAN through WiFi, the router or LAN access point assigns you a ________ IP address

Dynamic

When you sign onto a LAN through WiFi, you have a ______ IP address and the LAN router has a _______ IP address.

Dynamic, Static

Gigabyte

1024 megabytes / 2^30 bytes EXAMPLE: CD = .7 Gigabyte

A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a petabyte?

1024 terabytes

Petabyte

1024 terabytes / 2^50 bytes **A petabyte of songs played continuously would last more than 2000 years

Theoretical capacity of a network

Bandwidth measured in bits per second

Pay for Click

By seeing ads that are put on the page and clicking on ones that interest you, the website may get paid

Through the use of apps (application software) your smart phone can access devices that are connected to a network. What installed technology does the smart phone not use to connect to the network?

DSL

Information stored in the business' data base

Every transaction (sale) creates several pieces of data **The sale includes what was sold, the price, the quantity, how the purchaser paid, the date of the purchase, the time of the purchase, and if it was shipped to the customer, their street number, street, city, state, and zip code. All

Learning Objective 4

Everyone in business needs to understand the role of Information Systems in the organization. Again, as the course moves from LOOKING AT DATA AT A TABLE LEVEL TO DATA AT A DATABASE LEVEL, the course will provide awareness and exposure to the different ways in which technology and systems IMPACT the organization and its data.

Explicit knowledge

Facts and information **can be written down and obtained through reading (book)

All computer devices communicate over a network using computer languages such as Python or C#.

False

Data is information put into context.

False

Information is defined as facts, knowledge, and skill acquired by a person through experience or education

False

Learning objective four is to develop skill in using Excel by applying it to solve problems.

False (THIS IS LEARNING OBJECTIVE ONE)

Google Maps is a GPS system that utilizes a GIS system to provide information about the physical world.

False (because you need to switch GIS & GPS with each other) **Google Maps is a program that uses GPS (Global Positioning System) and is called a GIS (Geographical Information System)

Tacit knowledge

Skills **internalized skill EXAMPLE: You can read how to ski, but that does not mean that you can then immediately go to the slopes and ski down an expert run. You have to practice and internalize the ability to ski before you are an expert skier. Many of the skills you need to be a success in business require you to practice and internalize them. You will continue learning these skills throughout your life.

In order to perform a skill, the knowledge must be internalized. This is called ___________ knowledge

Tacit

Knowledge is defined as facts, information, and skills acquired by a person through experience or education

True

When you use a credit card, you are using several different companies' information systems.

True

You have a LAN at home so that all of your IoT devices can be reached through the Internet. All of the devices are connected by WiFi and have a dynamic IP address assigned by the router.

True

Information is data put in context

True Data = Fact Information = Fact put into context EXAMPLE: 60 is a number. I live at 60 Apple Lane. This is information because it has context.

Uniform Resource Locator (URL)

Two parts: first = the protocol identifier second = the domain name EXAMPLE: https://www.greatriverlearning.com/ protocol: https or secure hypertext transfer protocol domain name: greatriverlearning.com www: defines that it is on the World Wide Web The :// separates the parts of the URL

Wires or Wireless technology Signaling

WIRES: use electrical charges FIBER OPTICS: use light WIRELESS: uses broadcast radio, cellular radio, microwave, and satellite.

Computers use

binary switches, which were referred to as transistors in the early days of computers IS RELATED: **Data that a business stores in its information system is stored in a manner that the computer can read **Computer chips work like a large number of on/off switches

Computer Software

computer-coded application Every computer has an operating system such as Windows, iOS, or Linux. (operating system, application, open source, closed source) **Most businesses use Windows. Since this book is about business, we will concentrate on Windows and the applications like Excel.

Metropolitan Area Network (MAN)

connects a geographic area such as a University

Wide Area Network (WAN)

connects multiple LANs

Learning Objective 2

Most companies use relational databases to store data. A manager needs to have developed database understanding with a hands-on, problem-solving focus. The learning objective focuses on UNDERSTANDING HOW ORGANIZATIONAL DATABASES ARE "STORED" —meaning multiple tables, the use of foreign keys, and linking queries, to generate appropriate information.

Order of operations

Parenthesis ( ) Exponent ^ Multiple * Division / Add + Subtract -

Common protocol

standards There are standards for the Internet such as IP and transmission control protocol (TCP) **IP - Packets **TCP - application IPv4 assigns IP addresses consisting of four groups of up to three digits IPv6 assigns eight groups of up to four hexadecimal digits as the IP address

The key element of knowledge

the internalization of a skill

Pay for Conversion

the website gets paid if you buy something

VLOOKUP

used when there are more than two columns in the array (lookup table) -Excel function that allows you to lookup a value from a table. format: =vlookup(lookup_value, table_array, column_index_value, range_lookup) The lookup_value must be in the first column. The table array is the array of cells that contain the lookup table I define a name for the array to make it easier to use and reuse the lookup table ("GRADE") The column_index_value is the column with the value you want the vlookup to return The range_value is a logical true or false The default is true if left blank False will only return an exact value (I have never found a need to use it, and so I always leave it blank)

RANDBETWEEN

randomly assigns a number between two specified values

Three types of enterprise systems

1- Supply chain management (SCM) 2- Enterprise resource planning (ERP) 3- Customer relationship management (CRM) ** ALL of them support the business by: -automating routine tasks -providing routine reports -providing all employees the data and information needed to do their job

Kilobyte

1024 bytes / 2^10 bytes

A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a terabyte?

1024 gigabytes

Terabyte

1024 gigabytes / 2^40 bytes ** is the equivalent of approximately 4.5 million books or approximately 260,000 MP3 music files

Megabyte

1024 kilobytes / 2^20 bytes EXAMPLE: 10,000 pages of text = 20 megabytes

Server

A computer that awaits and responds to requests for data. When you use a browser to access a webpage, it is on a server A server is a computer that is tied to the Internet and hosts that webpage Your computer is called the client. You will hear applications called client/server applications. This is an application that resides on the server and you access through a browser on your computer

One of the primary methods of making money on the Internet

Advertising

Ribbon

A strip of icons that appears across the top of the PowerPoint window; divided into tabs, each of which contains groups of related tools.

All computer devices communicate over a network using binary or machine language

True

Learning Objective 1

Excel remains a major analytical tool used in business. To succeed in business, a manager needs to have good analytical skills and the ability to use Excel to analyze data. The first learning objective is the development of EXCEL Skills with a hands-on, problem-solving using EXCEL, including topics that fall under the following categories: (DEVELOP SKILL IN USING EXCEL BY APPLYING IT TO SOLVE PROBLEMS) --Getting started with EXCEL --Using functions and formulas with EXCEL --Creating Charts and graphs with EXCEL --Creating Pivot tables --Learning how to solve business problems through application problems

Knowledge that is gained from a book is called _________ knowledge

Explicit

Open-source operating system software

Linux Anyone can see the program code and modify it **Requires additional security EXAMPLES: -R (statistical software) -Android (mobile operating system) -Chromium (browser, not Google Chrome) -FireFox (browser) -Apache (server software) -Apache Cassandra (distributed database software) Advantages: -Free -You can add new or different functions -Many different programmers work on open-source projects and share their improvements Company support: -Google supports R -Facebook Developed Casandra -IBM supports Apache

Endpoint Identifiers (ADDRESSES)

MAC address (media access control) --defines your device --hardcoded into the chip on a devices network card IP address (Internet Protocol) --defines your location on the network --assigned 1- Dynamic (wifi password use over and over) (up to 60 per access point) 2- Static (router, so it can be found) 3- URL (http://google.com) (has a static IP address attached to it) EXAMPLE: When you sign onto a wireless Local Area Network (LAN) with your computer, you are assigned a dynamic IP address by the access point or router. LAN reuses the dynamic IP addresses. After you sign off the LAN, the router will assign that address to the next person that signs on. The LAN's router has a static IP address. EXAMPLE: The mailman delivers the letter to your local city/neighborhood (IP address) and finally to the specific physical address of your machine (MAC address) **If you request a webpage, the request goes to the router, which passes the request on the Internet. The server that hosts the webpage will see the sender's IP address and send the page. The router will then send the page to your computer. Every device that is directly connected to a network has an IP address.

Which of the following is NOT related to the Moore's Law?

The distance between people in social networks decreases every year **technology is getting faster and cheaper over time **size is going down, power is going up

Moore's Law states that:

The number of transistors on a chip doubles every 12 to 18 months.

Data center or server farm

There are companies that host many websites on their servers A data center may have thousands of servers

Computer Network

a system of interconnected devices The network carries data from one point to another, from the beginning device to the end device The data is routed through switches and routers from origin to the end Along the way, the data may be routed through wires or wirelessly or both. The wires can consist of twisted pair telephone wires as in subscriber line (DSL), or cable as in the coax cable used by cable companies, or by fiber optic cable. (Wireless requires an access point, which is normally a wireless router) NETWORKS: -DSL -CABLE -FIBER OPTIC CABLE -WIRELESS (wifi, radio, microwave, satellite)

Computer Hardware

physical device Consists of: INPUT devices, COMPUTING devices (chips), and OUTPUT devices EXAMPLE: When we consider a smartphone, the device has all three in one device. We input data on the screen. We read output on the screen. The computing device is either in the smartphone or on a server that we access through the phone using a browser, which is an application. EXAMPLE: A tablet is a device with input, processing, and output in one

Knowledge is defined as

"facts, information, and skills acquired by a person through experience or education; the theoretical or practical understanding of a subject"

MIS Graduates

** Because businesses rely on computer systems, management information system (MIS) graduates are in high demand and command the highest average starting salaries of any business school graduate Job Opportunities: Business analyst Systems analyst Database administrator Communications specialist Information assurance analyst Mobile Applications Developer Information Assurance Analyst Database Analyst IT Director Webmaster. IT Operations Manager Operations Project Manager Technical Services Manager IT Training Development Specialist Supply Chain Director Analytics Manager Front-end Developer/Engineer IT Security Director User Interface Designer Technical Support Engineer Programmer Analyst Applications Engineer

The throughput of a network

Actual capacity, considering factors like latency, protocol overhead, and processing power. The number of users on the same network also affects your actual throughput on a network.

Which of the following is an open source application software?

All of the above

How do businesses make money on the internet?

All of the above (Selling product, Paid for showing advertising, content, obtaining customers)

Learning Objective 3

Information security is a major concern in business. Businesses spend millions of dollars annually to attempt to secure their data and their customer's data. The learning objective is to PROVIDE AN UNDERSTANDING OF THE IMPACT OF SECURITY ON ORGANIZATIONS AND ITS DATA as the class focuses on more complex problem-solving with database and data. This learning objective will provide EXPERIENCES and exposures for the student to learn how to practice safe and secure computing through an understanding of the risks involved with securing data and information throughout the organization.

A protocol is which of the following?

a standard (NOT language, device, resource)

The Internet (big I)

is one big network consisting of all networks that interconnect and allow data to be sent globally (WORLD WIDE WEB) NETWORKS: Public Network- Starbucks or McDonald's Private network- INTRANET (company) (connects everyone at all locations) or EXTRANET (connect suppliers to business info) Private network - allows all devices to talk and to be hidden behind the router's IP address (home) Supply chain network- A company may have a network that allows suppliers to see what the company's inventory of the material it sells is. This would allow the supplier to ensure the material arrives just in time for production or sales..

When you post a review on a business you are _______.

providing content

TCP (Transmission Control Protocol)

tells you which application on the computer (Internet browser, e-mail, video conference, etc.) should receive the data (like the name on a letter) TCP combined with IP defines how data is sent from one computer application to another over a network Every application on your computer uses its own set of protocols on top of TCP/IP **Usually referred to as TCP/IP. EXAMPLE: When you access a webpage through a browser, it is not sent as one piece of data. It is too big. Instead it is broken up into packets. Each packet contains the information of where it is going and how to reassemble the page back together.

Moore's law

the computing power of a computer chip doubles every 18 month **In 1965, Intel co-founder Gordon Moore observed that the number of transistors per square inch had doubled every year


Conjuntos de estudio relacionados

Government Study Guide for Unit 4 Test

View Set

CH 75 Saunders; ATI Questions; NCLEX Basic Book Nursing

View Set