INFO 360 exam 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What were the four pillars of Taylor's scientific management proposal?

1. Every work element should be studied for improvement. 2. Workers should be scientifically recruited, selected, and trained. 3. Managers should cooperate with workers. 4. Managers should work as hard as workers.

What is the difference between a DBMS and a database?

A DBMS is a software program designed to organize and administer a database. A database is a collection of tables, relationships, and metadata. DBMS help to organize the data found in a database.

What is a NoSQL database?

A NoSQL database is a nonrelational database. Because of the enormous volumes of data that have arisen, nonrelational databases are designed to manage large data sets. They have the ability to analyze both structured and nonstructured data.

data inconsistency

A condition in which different versions of the same data yield different (inconsistent) results.

What is a data quality audit used for?

A data quality audit uses statistical analysis to check data, variabilities, and outcomes against test data. Data quality audits help to ensure the accuracy and completeness of an organization's data and to provide a complete picture of the state of data as well as what improvements can be made to clean up the data issues.

What is a field?

A field is a column in a table that represents a characteristic of something or someone.

What are some ways businesses act in a more "green" manner?

A four-day workweek cuts down on travel as does car pooling. Technology allows businesses to reduce paper consumption.

What is a query?

A query is a request for information from one or more tables in a database.

What are analytic platforms?

Analytics platforms are designed to assist large data-driven companies in the analysis and interpretation of organizational data. A variety of database software providers have developed high-speed platforms that are used in relational and nonrelational database technologies, enabling the analysis of large data sets.

Give an example of who, in a college database, should have rights to student information.

Answers may vary. Some examples are faculty may have rights to all student data while staff may have limited rights, perhaps to student contact information but not student grades.

What is a downside of being able to conduct business while on a mobile device?

Businesses will expect that managers will always be available and it will become harder to actually get away from the office.

What are some advantages of using web technologies to access internal databases?

Customers might access an internal database to view current product offerings or inventory levels. Organizations might use the web to check the database of a supplier for product information or current inventory. Increased familiarity with web browsers and the common use of various digital devices make users eager to access internal databases as they shop or browse the web.

What operations are allowed in a DBMS?

DBMS allow for data to be created, read, updated, and deleted. DBMS also include security features and access controls.

What are data analytics?

Data analytics is a way to interpret the vast amounts of available data and translate it into effective decision making to maximize a business's potential.

According to Adam Smith, how can labor be more efficient?

First, have more specialized tasks. Second, decrease the distance between tasks associated with manufacturing a product. Third, invent machines to do some of the labor. He believed workers would naturally find ways to mechanize a task if they performed specialized tasks.

How did Follett think conflict between managers and employees should be resolved?

Follett believed resolution should come through communication and an integration of different ideas.

How are forms and reports used?

Forms are used to control how data are entered into a database. They structure data input to ensure data integrity. Reports offer a way to view, format, and summarize the information in a database.

What is in-memory computing?

In-memory computing is the use of middleware software to assist in the storage of data in random-access memory (RAM), across a group of different computers.

How is in-memory computing used?

In-memory computing is used by businesses to help unite transactional and analytic processing to provide real-time insights and analytics. This creates an environment that increases the amount and speed at which data can be ingested and analyzed.

What is Square, Inc.?

It was the first credit/debit card reader that could be connected to mobile devices such as smartphones and tablets.

What is the purpose of employee monitoring software?

Its purpose is to collect performance data by tracking and digitizing employee computer use.

data security

Keeping the organization's data safe from theft, modification, and/or destruction

According to John Locke, why do people work?

Locke believed that people work because they believe work will result in an increase in their wealth.

Who is considered the father of liberalism and who is considered the father of economics?

Locke is considered the father of liberalism. Smith is considered the father of economics.

Supply chain management systems (SCMS)

SCMS now include inventory management and forecasting. Supply chain management generally consists of four components; supply chain planning, supply chain sourcing (partners, suppliers), manufacturing and assembly (operations), and supply chain logistics (delivery and return).

velocity

Streaming data come in at a mind-blowing speed. Big Data must be able to keep up with the velocity of the data that are used.

How is the information in a relational database stored?

Tables with rows and columns are used to store information in a relational database. Rows hold records or objects and columns hold fields. When a field exists in two or more tables, the information in the tables can be linked, creating a relationship between records.

Why are database policies so important?

The database an organization has is a critical asset, and ensuring its security and structure is critical. Information policies specify the rules used in database design (how the data are structured), who has access to the data, how the data are collected and maintained, and where information and data are distributed.

Human resource (HR) management systems

These systems allowed large organizations to track employee compensation and performance evaluations digitally, allowing for improved forecasting of human capital requirements.

What are some of the advantages of a videoconference over a traditional telephone or conference call?

Videoconferencing allows for more direct eye contact and allows people to see more nonverbal cues among participants.

According to Weber, how could efficient organizations be described?

Weber believed that organizations could be described as bureaucracies where management competencies were supported by rules and organizational regulations.

What are some of the drawbacks of telecommuting?

Workers often work much longer hours since the lines between home and office are blurred.

database

a collection of data that is organized in a manner that allows a computer to quickly search for and retrieve information. It is a collection of tables and the relationships between those tables.

foreign key

a field that is common to two or more tables and is not the primary key.

A database administrator (DBA) is

a technically specific role that is usually part of an organization's IT department. Database administrators monitor and troubleshoot (when necessary) the database to ensure it is functional and available when needed. DBAs must have database-specific platform training and knowledge. Some DBA tasks include database security, tuning, backup, and the creation of queries and reports that are used to assist business decisions.

Business intelligence systems

are data-driven decision support systems (DSS) that aid businesses to make better strategic decisions. BI systems provide businesses a picture of historic, current, and future views of operations.

Mainframe computers

are known for their reliability, availability, and serviceability.

Forms

are used to control how data are entered into a database. Forms create structure and ensure data integrity

Cybersecurity vulnerabilities

are weaknesses or flaws in system security procedures, design, implementation, and control that could be compromised accidentally or intentionally.

hybrid data mart

assimilates data from a data warehouse as well as from other data collection systems. It incorporates a top-down approach, end-user inputs, and enterprise-level integration.

Marketing information systems (MKIS)

assist managers by integrating numerous processes related to marketing management into a single computer system. Some of the processes include gathering marketing data, storing the data, analyzing, and distributing sales and marketing information to appropriate users. example: Hubspot

Decision support systems (DSS)

assist middle managers with organizational processes when a large number of inputs are changing rapidly -most provide real-time guidance but the final decision is made by manager ex: when an airline company needs to assign gates to incoming aircraft.

The first modern transaction processing system was the

cash register

cybersecurity exploit

follows the identification of a system vulnerability. An exploit is the means through which a system vulnerability can be used by a hacker to execute a malicious activity on a system.

What are the primary functions of an HR management system?

forecasting, recruiting, selection, hiring, evaluation, training, retention (reassignment, promotion, grievance management), scheduling, and compensation (payroll and benefits administration)

Table

in a database is a collection of associated records

Enterprise resource planning (ERP)

integrates the management of nearly all aspects of an organization. Typically, ERP incorporates a suite of business applications into a unified system. Business applications supported and coordinated in ERP include finance and accounting systems, human resource systems, production systems, logistics (supply chain management) systems, customer resource management systems, sales and marketing systems, and many others depending on the type of organization.

A data warehouse

is a repository of data and information that organizations analyze to make informed business and operational decisions. The output from a data warehouse allows an organization to create and maintain a competitive advantage.

primary key

is a special field designated to uniquely identify all records in a table ex: ID number

independent data mart

is a stand-alone system that is created separate from a data warehouse and focuses on specific organizational functions

A data mart

is a subsection of a data warehouse that is designed and built specifically for individual departments or business functions.

Data mining

is a way to search large data stores to uncover patterns and trends that cannot be handled through other analysis techniques. It uses mathematical algorithms to segment the data and evaluate the likelihood of future events.

cybersecurity threat

is an event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss. Assets include information, software, and hardware.

Data normalization

is an organized method used to break down or simplify tables to eliminate data redundancy and other problematic data characteristics.

Learning management systems (LMS) are used to

manage academic processes at nearly all large educational organizations. The processes managed through an LMS include delivering and administering class activities and assignments, tracking student performance through gradebook management, reporting student attendance and performance, and documenting student activity.

reports

offer a way to view, format, and summarize the information in a database

What were, according to Fayol, the five roles of a manager?

planning, organizing, staffing, directing, and controlling

bullwhip effect

refers to a situation where a small error in demand forecasting results in large errors in inventory and production.

Cloud computing

refers to accessing computer resources through the Internet. T

Referential Integrity

refers to the accuracy and consistency of data within a table relationship in a database. It requires that, whenever a foreign key value is used it must reference a valid, existing primary key in the parent table.

data redundancy

the duplication of data, or the storage of the same data in multiple places

Volume

the enormous amount of data created every day

threat mitigation includes

the policies and procedures that are put in place by an organization to help prevent against security incidents, data breaches, and unauthorized network access. Mitigation also includes policies and procedures to mitigate damage if and when a security attack occurs.

The first mechanized employee scheduling and management tool was

the punch card

Web mining

uses the principles of data mining to uncover and extract information from websites, social media sites, e-commerce platforms, and web services. Organizations use web mining to assist them in gaining a better understanding of consumer behavior, website efficacy and usage patterns, and analysis of web searches.

A cybersecurity breach occurs

when a hacker gains unauthorized access to an organization's systems, data, and information.

database management system (DBMS) is a result of database no longer being enough

which is a computer program used to create, process, and administer a database. Due to the complexities surrounding the DBMS development process, most organizations do not develop their own DBMS. Instead they select a DBMS created by a software vendor (e.g., Oracle, Microsoft, IBM).

What is a record?

A record is a row in a table that includes a collection of fields.

What is the basic structure of a relational DBMS?

A relational DBMS is a type of database management system that uses a row and column-based table structure to connect data via relationships.

What is the purpose of data governance policies?

Data governance policies help to ensure that an organization's data are valid, understandable, complete, and accessible.

What issues arising from a traditional file management system can be solved by using a DBMS?

Data redundancy. Data that are duplicated in several places can result in higher storage requirements and inefficient access times. Data inconsistency. Data that appear in several places may not always be consistent. Data security. By assigning various rights and constraints to different users, data can be more secure.

What is data scrubbing?

Data scrubbing includes the detection of errors in data sets and the removal or correction of these mistakes to ensure an organization's data are valid.

veracity

Data that are processed must be meaningful and useful. Poor-quality data that have not been certified as truthful or good can cost businesses and the U.S. economy a lot of money.

variety

Data used in Big Data come from a wide variety of sources, including social media platforms, email, photos, and more. Both structured and unstructured data form the information that Big Data must deal with.

What slogan might best summarize Drucker's concept of management?

Do what you do best and outsource the rest.

What are some ways to avoid becoming overcommitted to the job at the expense of your health?

Manage notifications on devices, take breaks from the computer screen, set manageable goals for each day, and be sure to get enough uninterrupted sleep!

What are some of the advantages of using a flextime system?

Many believe that task accomplishment is more important than physical presence. Also, allowing workers the flexibility to complete their duties when it best meets their schedules, they can reduce absenteeism and improve work-life balance for many employees.

What are some positive effects of new MIS?

Many can use flextime and can work from home.

What was Mayo's emphasis in terms of organizational management?

Mayo emphasized the importance of individual human behavior on productivity.

What was the first company to use a mobile POS?

McDonald's

According to McGregor, what are the two types of managers?

McGregor believed there were two attitudes that described all managers: theory X and theory Y managers. Theory X managers believed that employees were naturally disinclined toward work and needed to be observed and controlled. Theory Y managers believed that workers could be trusted and empowered.

In a data quality audit, what five processes are used?

Quality assessment analyzes the quality of source data. Data profiling is the process of investigating data abnormalities and redundancies through the analysis of the content, structure, and relationships on the data. Data design involves the creation of quality processes used to manage data. Quality transformation incorporates correction maps that are designed to correct issues that are present in source data. Quality monitoring uses established processes to examine data over a given amount of time to ensure that data rules are being followed and that data are valid.

What are some of the devices that modern POS stations integrate with?

These are a few: A typical retail point-of-sale station may integrate the cash register system with input devices such as barcode scanners, scales, touchscreens, MICR (check) readers, credit/debit card readers, often with separate tactile numerical keyboards (usable by the blind), cameras, or RFID tag readers.

What makes mainframes so important in management?

They are capable of adding or changing system capacity without shutting the whole system down.

what are personal computers (PC) often used for in business

They are often networked together or added to networks to provide more flexibility for managers.

Executive support system (ESS) software is also called executive information system (EIS) software.

This software is used to extract enterprise data and transform it into executive-level reports, which makes complex data more accessible for decision makers. strong in creating graphs and charts

Client-server networks and local area networks are

commonly used in nearly all businesses today, including small businesses. A server is a computer designed for a specific purpose such as data storage, backups, printing, and communication, among other things. Most business networks provide a method for PCs to access servers so that employees can share resources.

data dictionary

compiles all of the metadata about the data elements in the data model

metadata

data that describes the data

Employee scheduling software

designed to increase employee performance and decrease management inconsistency

dependent data mart

is constructed from existing data warehouses and utilizes a top-down approach where organizational data are stored in a centralized location. Then specific data are extracted when analysis is needed.

SQL or Structured Query Language

is used so people can interface and communicate with a database. Through the use of SQL statements, people can create. retrieve, update, and delete data. SQL allows users to ask the database questions and get comprehensive answers.

An entity relationship diagram (ERD)

is used to represent the design of a database through the use of diagrams. Various symbols are used to help users visualize the entities within the system and the interrelationships among these entities.


Kaugnay na mga set ng pag-aaral

Dolgozat 10. évfolyam 36-43. leckék

View Set

SPC 205 - CH 01, 04, 06, 19 + Quiz 1

View Set

Market Efficiency & Behavioral Finance

View Set

2-15 Insurance Course (Chapters 5 - 9)

View Set

ESS 345 Fitness Assessment & Energy Prescription Exam 1

View Set

Wk 5 - Practice: Ch. 6, Business Strategy

View Set