ISM3011 Test 1 Study
Automation
is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs
A(n) _____, a memory device, uses laser beams to access and store data.
optical disc
In the context of storage devices, CD-ROMs and DVDs are examples of _____.
optical discs
Buyer Power
the ability of buyers to affect the price they must pay for an item
Chapter 2
...
the measurement of memory such as the relationship between TB and GB?
1 TB = 1,024 GB
What five forces determine industry structure?
1. Bargaining power of customers 2. Threat of substitutions 3. Bargaining power of suppliers 4. Threat of new entrants 5. Rivalry
A petabyte is equal to _____ bytes.
250
The word computer consists of 64 bits, which is equivalent to _____ bytes.
8
How many bits make up a byte?
8 bits
what are the five principals of competitive strategies?
??
Which is an example of an input device?
A barcode reader
Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?
A biometric security measure
Why must business professionals understand how MIS supports decision-making and problem-solving
A company will not have a future if it is not cultivating strategies for tomorrow and this will not be possible to do so unless they are using MIS to quickly review information data in the lake with the massive volumes of info available managers are challenged to make highly complex decisions in short time frames and therefore MIS is required.
Internet
A massive network that connects computers globally and allows them to communicate with each other
Why would a company want a CIO, CPO, and CSO?
All deal with MIS but a chief information officer (CIO) is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives. A chief privacy officer (CPO) is responsible for ensuring the ethical and legal use of information within a company. A chief security officer (CSO) is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses. All help with the businesses needs for management information systems.
Web Browser
Allows access to the WWW
Intranet
An example is MyUWF, only available to certain groups of people, for collaboration
What is artificial intelligence
Artificial intelligence stimulates human thinking and behavior such as the ability to learn and read.mimics human intelligence.
industry-wide differentiation
Better product/service across the industry
Focus Differentiation
Better product/service within an industry segment
Difference between information technology and information systems
Cannot buy an IS but can buy an IT
_____, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.
Cloud storage
Code vs Cipher
Code replaces words Ciphers replace individual letters
Abilities associated with digital dashboard
Consolidation of the data, drill down, slice n dice, pivot.
1st Wave of E-commerce
Coincides with web 1.0. Primarily based in the U.S., English dominant, very slow.
_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
Computer literacy
_____ can be described as using an organization's database of customers and potential customers in order to promote products or services that an organization offers.
Database marketing
Policy Enforcement
Dissemination Review Comprehension Compliance Uniform enforcement
What is automation
Do you computerization of manual tasks making them more efficient and effective while lowering operational tasks.
Direct-to-Consumer (DTC)
Ebusiness model where companies function independently, cutting out retailers and traditional stores
What are the five artificial intelligence systems
Expert (chess), neural networks (checking for fraud), genetic algorithms (trading decisions), intelligent, virtual reality (working virtually around world).
Define expert systems and describe the role they play in a business.
Expert systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. They include a knowledge base containing various accumulated experience and a set of rules for applying the knowledge base to each particular situation. They are important in the business setting because they fill the gap when human experts are difficult to find or retain or are too expensive,
A byte is a single value of 0 or 1.
False
Labor and population statistics are examples of sources for internal data that are accessed by a database.
False
A comprehensive framework called the ____ was created by Harvard Business School's Michael Porter for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive.
Five Forces Model
Information Ethics
Govern the ethical and moral issues arising from the use of information technologies
What kind of computing promotes a sustainable environment and consumes the least amount of energy?
Green computing
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
Green computing
What are the five-component framework of MIS, and major attributes and examples of these five components
Hardware, software, data, procedures, people.
HTML
Hypertext markup language
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
Keystroke loggers
User-contributed Content
In the web 2.0, many people create content for the consumption of many other people
Which can help offset the digital divide?
Increasing the number of computers in public places
What is an as is model
It represents the current state of the operation that has been mapped without specific improvements
What is a to B model
It shows how a problem will be solved/implemented. It is the improvements to an as is model.
How can a company use Porter's value chain analysis to measure customer satisfaction?
It views a firm as a series of business processes that each add value to the product or service. The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a cost advantage or product differentiation.
Industry-wide cost
Lowest cost across the industry
Focus Cost
Lowest cost within an industry segment
Mosaic
Marc Andreesen created it and Netscape and sold to Microsoft. Mosaic eventually became internet explorer
Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
Net neutrality
In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.
OR operator
Digital Darwinism
Organizations which cannot adapt to new demands are destined to go extinct
Pirated vs. Counterfeit Software
Pirated software is an unauthorized copy. Counterfeit software is created to imitate the real thing.
Policy vs Law
Policy is the domain of business Law is the domain of the government
Sustaining Technology
Produces an improved product (intel processing chips are an example, they are continually improved, but they don't ever go away, it's just new models)
What is data and why is it important to a business?
Raw facts that describe the characteristics of an event or object. Sales numbers for example.
Structure of the Web
Search engines drag and catch the top 1% of information (think of a fishing boat using shallow nets). Below the 1% of information that search engines collect are databases and academic journals. Further below (and the most inaccessible place on the web for most people) is Tor, or the dark web.
_____ holds data when the computer is off or during the course of a program's operation.
Secondary memory
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
Spyware
_____ means saving data in computer memory.
Storage
_____, also known as virtual work, has enabled some people to perform their jobs from home.
Telecommuting
Web 1.0
Term to refer to the WWW during the period 1991-2003
What is a business process reengineering
The analysis and redesign of workflow with in and between Enterprises
Recommendation Engine
a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products
Prejudice Bias
a result of training data that is influenced by cultural or other stereotypes
Machine Learning
a type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn
Snapshot
a view of data at a particular moment in time
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____.
acceptable use policy
Primary Value Activities
acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services
Operational Decisions
affect how the firm is run from day to day, they're the domain of operations managers, who are the closets to the customer
Genetic Algorithm
an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
Spoofing happens when:
an illegitimate program poses as a legitimate one.
Porter's Five Forces Model
analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry
Structured Decisions
arise when established processes offer potential solutions
customer service
assisting customers' use of the products and thus maintaining and enhancing the products' value. example: service customers
Business Process Improvement
attempts to understand and measure the current process and make performance improvement accordingly
In a relational database model, the columns are called _____.
attributes
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
back-end systems
To minimize the invasion of privacy, organizations should:
collect only the data that is necessary for the stated purpose.
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.
cookies
key differences between collaboration and cooperation
cooperation is a group of people working together, all doing essentially the same type of work, to accomplish a job, but a collaboration is a group of people working together to achieve a common goal via a process of feedback and iteration
collaboration tools for asynchronous
email discussion forums team surveys
Operational Level
employees develop, control, and maintain core business activities required to run the day-to-day operations
Data Scientists
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
A ____ is typically used to support decisions related to managing an organization's cash flows.
financial information system
threat of new entrants
force strength medium
Structured Data
has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address
Knowledge Facilitators
help harness the wealth of knowledge in the organization
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
illegal and unethical
Streamlining
improves business process efficiencies by simplifying or eliminating unnecessary steps
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
in spear phishing, the attack is targeted toward a specific person or a group.
Support Value Activities
include firm infrastructure, human resource management, technology development, and procurement
Machine-Generated Unstructured Data
includes satellite images, scientific atmosphere data, and radar data
Business-Facing Processes / Back-Office Processes
invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources
Rivalry Among Existing Competitiors
is high when competition is fierce in a market and low when competitors are more complacent
what is mobile systems and why is it important?
it is information systems that support users in motion. mobile systems have major impact on business and society today, an impact forcing industry change while creating new career opportunities for mobile -IS- savvy pros and large numbers of new, interesting mobile-IS- related to jobs.
A(n) _____ is a common output device for soft copy.
liquid crystal display
Goods
material items or products that customers will buy to satisfy a want or need
Algorithms
mathematical formulas placed in software that performs an analysis on a dataset
Effectiveness MIS Metrics
measure the impact MIS has on business processes and activities, including customers satisfaction and customer conversion rates
Efficiency MIS Metrics
measure the performance of MIS itself, such as throughput, transaction speed, and system availability
native applications vs. web applications
native are programs that are written to use a particular operating system and web is designed to run within a computer browser such as chrome, opera, or edge.
Unstructured Data
no defined and does not follow a specific format and is typically free-form text such as emails, Twitters tweets, and text messages
Bottlenecks
occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations
Unstructured Decisions
occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice
First-Mover Advantage
occurs when a company can significantly increase its market share by being first with a new competitive advantage
Chief Sustainability Officer
oversees the corporation's "environmental" programs such as helping adapt to climate change and reducing carbon emissions
Chief Knowledge Officer (CKO)
responsible for collecting, maintaining, and distributing the organization's knowledge
difference between structured decisions and unstructured decisions
structured is one for which there is an understood and accepted method for making the decision and unstructured is one for which there is no agreed-on decision-making method.
What are the differences of synchronous and asynchronous communications?
synch occurs when all team members meet at the same time, such as with conference calls or face to face meetings. Asynchronous occurs when team members do not meet at the same time.
Hardware
the computer, storage disk, keyboard, and monitor
Machine Vision Resolution
the extent to which a machine can differentiate between objects
Knowledge Assets / Intellectual Capital
the human, structural, and recorded resources available to the organizatoin
Online Analytical Processing (OLAP)
the manipulation of information to create business intelligence in support of strategic decision making
What is cloud computing?
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Data Mining
the process of analyzing data to extract information not offered by the raw data alone
Data Profiling
the process of collecting statistics and information about data in an existing source
Competitive Intelligence
the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
Market Share
the proportion of the market that a firm captures
Thin Client vs Thick Client
thick is native apps and thin is web apps.
Information Age
when infinite quantities of facts are widely available to anyone who can use a computer
people
you
Metcalfe's Law
A network's worth is based on the number of users
Disruptive Technology
A new way of doing things that initially doesn't meet demands but eventually opens a new market and destroys the old one
What is a business process
A standardized set of activities that accomplishes a specific task. This helps managers to envision how a business works.
Define transaction processing systems and describe the role they play in a business.
A transaction processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions. A good example is an order entry system. It helps when entering orders because it shows operational functions.
_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.
Integrity rules
_____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
Normalization
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
True
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
True
Viruses can be transmitted through a network or through e-mail attachments.
True
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
True
With employee-monitoring systems, managers can supervise employees' work speeds.
True
In the context of the major components of an information system, which is a difference between information and data?
Unlike data, information consists of facts that have been analyzed by the process component.
Sparkline
a small embedded line graph that illustrates a single trend. often used in reports, presentations, dashboards, and scoreboards. they don't include axes or labels; context comes from the related content
Executive Information System (EIS)
a specialized DSS that supports senior-level executive and unstructured, long-term, nonroutine decisions requiring judgement, evaluation, and insight
Business Process
a standardized set of activities that accomplish a specific tasks, such as processing a customer's orders
Prediction
a statement about what will happen or might happen in the futuer
A(n) _____ is a type of server that stores computer software, which users can access from their workstations.
application server
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
backdoor
Benmarks
baseline values the system seeks to attain
Dynamic Process
continuously changing and provides business solution to ever-changing business operations
Switching Costs
costs that make customers reluctant to switch to another product or service
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
create, read, update, and delete
Machine-Generated Data
created by a machine without human intervention. includes sensor data, point-of-sale data, and web log data
Static Report
created once based on data that does not change
Chief User Experience Officer
creates the optimal relationship between user and technology
Users need to be able to make use of _____, such as rumors, unconfirmed reports, and stories, when solving problems.
informal information
Business Intelligence (BI)
information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patters, trends, and relationships for strategic decision making
Feedback
information that returns to its original transmitter and modifies the transmitter's actions
major tasks of "doing"
perform project tasks. manage tasks and budget. solve problems. reschedule tasks, as necessary. document and report progress.
examples of version control software
permission-limited activity, document checkout, version history, workflow control
Decisions related to scheduling and assigning employees can be supported by a _____.
personnel information system
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
pharming
what is the differences between source code and machine code?
source code is computer code as written by humans and understandable by humans. machine code is not understandable by humans and cannot be modified
In the context of information privacy, junk e-mail is also known as _____.
spam
What are the traits of an effective collaborator
speaks his or her mind even if its an unpopular viewpoint. is willing to enter into difficult convos. is skillful at giving/receiving neg. feedback. is willing to put forward unpopular ideas. thinks diff. than I do/brings different perspectives.
What are the four stages of project management?
starting, planning, doing, finalizing.
Operational Business Processes
static, routine, daily business processes such as inventory stocking, customer checkout, or daily opening and closing processes
Data Democratization
the ability for data to be collected, analyzed, and accessible to all users
Machine Vision
the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action
Machine Vision Sensitivity
the ability of machine to see in dim light or to detect weak impulses an invisible wavelengths
Business Process Modeling / Mapping
the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence
Business Process Reengineering (BPR)
the analysis and redesign of workflow within and between enterprises
Digitization
the automation of existing manual and paper-based processes and workflows to a digital format
Transaction Processing System (TPS)
the basic business system that serves the operational level (analysts) and assists in making structured decisions
Online Transaction Processing (OLTP)
the capture of transaction and event information using technology to process the information according to defined business rules, store the information, and update existing information to reflect the new information
Key Performance Indicators (KPIs)
the quantifiable metrics a company uses to evaluate progress toward critical success factors, are far more specific than CSFs
Productvitivy
the rate at which goods and services are produced based on total output giving total inputs
Analytics
the science of fact-based decision making
Business Analytics
the scientific process of transforming data into insight for making better decisions
What is competitive strategy?
the strategy an organization chooses as the way it will succeed in its industry. Includes cost leadership across an industry or within a particular industry segment and product or service differentiation across an industry or within a particular industry segment
Supplier Power
the suppliers' ability to influence the prices they charge for suppliers (including materials, labor, and services)
Cycle Time
the time required to process an order
Reinforcement Learning
the training of machine learning models to make a sequence of decisions
Robotic Process Automation (RPA)
the use of software with AI and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform
Augmented Reality
the viewing of the physical world with computer-generated layers of information added to it
data
the words, sentences, and paragraphs in your report
Semistructured Decisions
they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision
The main difference between an intranet and the Internet is that intranets are public and the Internet is private.
False
Autonomous Robotics
a robot capable of making its own decisions and perform an action accordingly
Business Unit
a segment of a company representing a specific business function
Model
a simplified representation or abstraction of reality
The data _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
manipulation
What is open source software?
software available to the public
Identify an advantage of a mouse over a trackball.
A mouse is more precise in positioning the pointer than a trackball.
What are porters 3 generic strategies and why would a company only follow one?
1. Broad cost leadership 2. Broad differentiation 3. Focused strategy. Trying to be all things to all people would be a disaster, since doing so makes it difficult to project a consistent image to the entire marketplace.
What is a business process model
A graphic description of a process showing the sequence of process tasks which is developed for specific purposes from a specific view point.
When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.
AND operator
_____ is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
Adware
_____ is an example of a secondary memory device.
An optical disc
What is artificial intelligence? What are the five types of AI systems? What applications of AI offer the greatest business value?
Artificial intelligence simulates human thinking and behavior such as the ability to reason and learn. It's ultimate goal is to build a system that can mimic human intelligence. The 5 types of artificial intelligence are Expert systems, neural networks, genetic algorithms, intelligent agents, and virtual reality. Expert systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Typically, they include a knowledge base containing various accumulated experience and a set of rules for applying the knowledge base to each particular situation. Neural networks are also called an artificial neural network. It attempts to emulate the way the human brain works. They analyze large amounts of information to establish patterns and characteristics in situations where the logic or rules are unknown. They learn and adjust to new circumstances on thir own, lend themselves to massive parallel processing, function without complete or well structured information, cope with huge volumes of information with many dependent variables, and analyze nonlinear relationships in information (they have been called fancy regression analysis systems). Insurance companies use these neural networks to help identify fraud. Genetic algorithms are systems that mimic the evolutionary survival of the fittest process to generate increasingly better solutions to a problem. It's an optimizing system it finds the combination of inputs that give the best outputs. These are best suited for situations where there are millions of possible solutions. For example investment companies use these to help in trading decisions. Intelligent agents are special purpose knowledge based information systems that accomplish specific tasks on behalf of it's users. Intelligent agents usually have a graphical representation such as "Sherlock Holmes" for an information search agent. The best example of an intelligent agent is a shopping bot that goes to competitors' websites to find pricings. Virtual reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world. It was built to build more natural, realistic, multisensory human-computer interfaces. It enables tele-presence anywhere in the world where someone can do something in once place and end up doing it in another. Best example is remote access surgery. Expert systems provide the greatest value because they are programmed to find solutions that an expert would have. It is better than having an expert on hand (which is expensive) and this is available whenever it is needed.
Why is it important for a business major to understand MIS?
As a business major chances are we will at some point be in a position where we will need to make decisions for a company (possibly out own) and management information systems are there to help in making data driven decisions, which are the best decisions to be made.
_____ uses a public key known to everyone and a private key known only to the recipient.
Asymmetric encryption
Symmetric vs Asymmetric Encryption
Asymmetric is computationally difficult, but it is easy to distribute and can come with a private key
Crowdsourcing
Asynchronous communication: message + response don't occur at the same time (email) Synchronous communication: message + response happen at the same time (IM, DM, PM, etc.)
Why is it important for a company to operate cross-functionally?
Because decisions being made in one department will surely have an impact on another department. Each department has it's own focus and data, none can work independently if the company is to operate as a whole. All departments must work together as a single unit sharing common information and not operate independently or in a silo.
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Business continuity planning
What is a business process and what role does it play in an organization?
Business facing processes are also called back office processes, they are invisible to the external customer but essential to the effective management of the business. They include goal setting, day to day planning, giving performance feedback and rewards, and allocating resources. In business processes there is also customer facing processes or front office processes. This results in a product or service received by an organization's external customer. They include fulfilling orders, communicating with customers, and sending out bills and marketing information.
How can a manager use automation, streamlining, and business process re engineering to gain operational efficiency and effectiveness.
Business process improvement attempts to understand and measure the current process and make performance improvements accordingly, which obviously will improve operational effectiveness and efficiency. Automation is the process of computerizing manual tasks. This then makes those tasks more effective, efficient and, lowers operating costs. This improves operational effectiveness and efficiency dramatically. Streamlining improves business process efficiencies by simplifying or eliminating unnecessary steps.
Explain Porter's Five Forces Model and the role it plays in decision making.
Buyer Power, Supplier Power, Threat of Substitute Products or Services, Threat of New Entrants, and Rivalry among existing competitors make up the Five Forces model. Buyer power is the ability of buyers to affect the price they must pay for an item. Supplier power is the suppliers ability to influence the prices they charge for supplies. Threat of substitute products or services in high when there are many alternatives to a product or service and low when there are few alternatives from which to choose. Threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant barriers to joining a market. Rivalry among existing competitors is high when competition is fierce in a market and low when competitors are more complacent.
Production
the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services
What does a manager need to know about computer hardware? such as CPU and its functions, attributes, and measurement, examples of storage hardware, main memory
CPU is the "brain" of the computer. It selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. storage hardware is used to save data and programs. main memory is memory that works in conjunction with the CPU. stores data and instructions.
_____ is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.
Computer-aided design software
Which is a commonly used technology for data collection?
Cookies
Copyright vs Patent vs Intellectual Property
Copyright protects an idea (song, video game, etc.) Patent protects inventions (pens, tractors, cars, etc.) Intellectual property is the special process of creating/doing something (the specific process to bake a cake or temper glass or....)
What is the difference between a customer facing processes and business facing processes
Customer facing processes result in a product or service received by an organizations external customers while business facing processes are invisible to external customers but essential to management
What is the relationship between data, information, business intelligence, and knowledge?
Data is just raw facts to describe the characteristics of an even or object. Information is data converted into a meaningful and useful context. Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making. Knowledge includes the skills, experience, and expertise, coupled with information and intelligence that creates a persons intellectual resources. Knowledge workers use business intelligence with personal experience to make decisions based on both information and intuition and are a valuable resource for any company.
Define decision support systems and describe the role they play in a business.
Decision support systems provide assistance in evaluation and choosing among different courses of action. It allows high-level managers to examine and manipulate large amounts of detailed data from different internal and external sources. It takes in data from multiple sources all over the place but a good example is when a doctor is trying to diagnose a patient will enter symptoms into a support system to help find a diagnosis.
Which decision is supported by a financial information system (FIS)?
Determining porMColio structures
The hardware component of a computer system consists of programs written in computer languages.
False
What are the capabilities associated with digital dashboards?
Digital dashboards support visualization, which tracks KPI's and CSF's by compiling information from multiple sources and tailoring it to meet user needs. They are capable of providing a hot list of key performance indicators, refreshed every 15 minutes. They also provide a running line graph of planned versus actual production for the past 24 hours. They also can provide a table showing the actual versus forcased product prices and inventories. They can provide a list of outstanding alerts and their resolution status. Finally they can graph stock market process. They deliver results quickly and are getting easier to use.
Disinter/Reinter/Cybermediation
Disintermediation - getting rid of the middlemen Reinetermediation - reintroducing a middleman Cybermediation - new intermediates based on e-business
Difference between the ability of a manager to receive information instantly on demand using an MIS or the capabilities provided by a DSS
Dss allows for large amounts of detailed data be examinated from internal and external sources. MIS focuses more on info gathered while DSS focuses on leadership.
Two Kinds of Knowledge
Explicit: can be easily written down and codified, but it is easily forgotten (a sloth's lifespan is around 20 years) Tacit: personal/kinetic knowledge, things you learn how to do (ride a bike)
A logistics information system supports decisions related to providing reports and statistics on employee demographics.
False
A patent protects product names and identifying marks.
False
An effective financial information system should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product.
False
In the context of information systems jobs, a database administrator is responsible for developing an entire information system by writing computer programs.
False
Static Web sites are useful for e-commerce sites that need frequent updates.
False
Four Privacy Invasions
Intrusion - spying Appropriation - identity theft False Light - insinuating something was done "under-table" without documentation Disclosure of Private Fact - leaking
Explain systems thinking and how it supports business operations.
Is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. It supports business operations because it lets the business react to feedback (positively or negatively)
In the context of using information technologies for a competitive advantage, which statement is true of a top-line strategy?
It focuses on generating new revenue by offering new products and services.
Explain MIS and the role it plays in a company and global business.
It is a business function like accounting or HR, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. MIS incorporates systems thinking to help companies operate cross functionally. It is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively.
Which statement is true of an intranet?
It is a network within an organization that uses Internet protocols and technologies.
Which best defines an operating system (OS)?
It is a set of programs for controlling and managing computer hardware and software.
Which of the following statements is true of a worm?
It is an independent program that can spread itself without attaching itself to a host program.
Do you agree MIS is essential for businesses operating in the information age? Why or why not?
It is essential because data can be used and refined into information and with business intelligence can be used by knowledgeable individuals to make good decisions for a company.
Which statement best describes spyware?
It is software that secretly gathers information about users while they browse the Web.
Why do managers need to understand business processes? Can you make a correlation between systems thinking and business processes?
Managers need to understand business processes because if they are to make decisions they should really know both the customer facing processes and the business facing processes. Reason being, the decisions they make in the company will have an impact on one or both of these processes and any change could be good or bad and the options need to be weighed. The best example of a correlation is when a company is adopting new CRM software. When a company does this they are changing their business facing policy because they have new software to work with and it changes the way they gather information from a customer. It changes the customer facing processes because the goal of the software is to service the customer more effectively.
Interactivity
Measures indicating marketing effectiveness
What is the relationship between critical success factors and key performance indicators? how can a manager use them to understand business operations?
Metrics are measurements that evaluate results to determine whether a project is meeting it's goals. critical success factors are the crucial steps companies used to perform at their goals/objectives and implement their strategies while key performance indicators are the quantifiable metrics a company uses to evaluate progress towards critical success factors. Key performance indicators are far more specific than critical success factors it is important to understand these metrics, critical success factors are elements crucial for a business strategy a success and koi measures the progress with quantifiable measurements.
Mutation
the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome
Web 2.0
Next generation of internet use (our modern internet). Free
Computer Security
Protection afforded AUTOMATED systems to preserve the integrity, availability, and confidentiality of information system resources
Information Security
Protection of information from accidental or purposeful misuse
Which decision is supported by a logistics information system (LIS)?
Selecting the best modes of transportation
Personally Identifiable Information (PII)
Sensitive - SSN, driver's license, financial information, etc. Non-sensitive - zip code, gender, age (when several non-sensitive informations are used together, it can become PII)
First Website
Sir Tim Berners-Lee built it in 1991
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
The Fair Use Doctrine
What are the three different levels found in a company? What types of decisions are made at each level?
Strategic, managerial, and operational are the different levels found in a company. The strategic level consists of decisions that are unstructured, nonrecurring, and one time. Executives, senior management, and leaders in a company are the ones that make these types of decisions. Managerial level decisions are semi structured and based on unplanned reporting. They are basically there to focus on efficiency and effectiveness and are usually done by middle management and managers, or directors. Operational level decisions are structured, reoccurring, and repetitive. Lower management, department managers, analysts, and staff make them. A good example of operational level decisions is a decision that needed to be made to keep working that day.
World Wide Web (WWW)
Subset of the internet, provides access to information through text, photos, videos
How could a company use loyalty programs to influence buyer power? How could a company use switching costs to lock in customers and suppliers?
Switching costs make customers reluctant to switch to another product or service including financial and intangible values. Loyalty programs reward customers based on their spending, think frequent flyer miles.
Make a correlation between systems thinking and business processes
Systems thinking allows us to differentiate between two business processes. Stratic process is an input that can produce a predicted output whereas dynamic is one that can't.
Explain the difference between customer-facing processes and business-facing processes. Which one is more important to an organization?
The difference between customer facing processes and business facing processes are that customer facing processes are the processes that customers see when doing business with the company while business facing processes involve everything behind the scenes that goes into providing a good or service to a customer. One isn't more important than the other in every instance but in some companies one may be more important than another. For example if a company provides a service for a customer there is most likely going to be a large emphasis on customer facing processes since employees will be doing something for a customer think about technical support for example. Technical support employees need to be able to interact with customers and help those customers find solutions to their problems. In a manufacturing company like an oil refinery they almost never directly interact with customers they are focused mostly on the business processes that encompass oil refining.
What is the difference between the ability of a manager to retrieve information instantly on demand using an MIS and the capabilities provided by a decision support system?
The difference between the ability of a manager to retrieve information instantly on demand using an MIS and the capabilities provided by a DDS are that MIS systems obtain the data that managers require. The information for these requests is structured in advance. In DDS systems the capabilities are much broader. Managers can get information in a number of ways and these systems manage the questions that come up. DDS systems also provide capabilities for a manager to do interactive modeling in order to make informed decisions. It supports semi structured and unstructured decisions faced by individual managers.
What business strategies would you use if you were developing a competitive advantage for a company?
The focused strategy is what I would try to use as a business strategy. This would allow for a more sustainable competitive advantage as opposed to a strategy that competitors could copy later on.
What is Moore's Law?
The number of transistors per square inch on an integrated chip doubles every 18 months
What is streamlining
The process of removing and simplifying unnecessary steps by sorting bottlenecks (resources with full capacities) and therefore improving business process effeciencies.
What is the relationship between critical success factors and key performance indicators? How can a manager use them to understand business operations?
The relationship between critical success factors and key performance indicators are that critical success factors are crucial steps companies perform to achieve their goals and objectives and implement their strategies. Key performance indicators are quantifiable metrics a company uses to evaluate progress towards critical success factors. So basically key performance indicators are metrics that bring a company to critical success factors.
What are the three levels of management found in a company? what type of decisions are made at each level?
The three levels of management found in the company are operational managerial and strategic decisions made at the operational level are structural employees develop control and maintain core business activities to run day today operations decisions made at the managerial level are semi structural employees are continuously evaluating company operations to hone the firms abilities to identify adapt to and leverage change. decisions made at the strategic level are considered
What are the common decision support system analysis techniques?
The ways to analyze decision support systems are the "what if" analysis, sensitivity analysis, goal seeking analysis, and optimization analysis. The "what if" analysis is when the DDS checks the impact of a change in a variable or assumption on the model. What will happen to the supply chain strategy if there is a hurricane here and inventory is reduced? The sensitivity analysis is a special case of what if's is the study of the impact on other variables when one variable is changed repeatedly. It is useful when users are uncertain about the assumptions made in estimating the value of certain key variables. Changing prices in small increments will then allow to see what impact price has on sales. Goal seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output. It is the reverse of what if and sensitivity analysis. Instead of observing how change in a variable affect other variables, goal seeking analysis sets a target value (a goal) for a variable and then repeatedly changes other variables until the target value is achieved. For example a goal seeking analysis could determine how many customers must purchase a new product to increase gross profits to $5 million. Optimization analysis is an extension of goal seeking, here it finds the optimum value for a target variable by repeatedly changing other variables subject to specified constraints. By changing revenue and cost variables in an analysis like this it allows managers to calculate the highest potential profits.
What are transaction processing systems
They are those that are used on one making operational and structured decisions some examples include payroll
Which statement is true of transaction-processing systems?
They focus on data collection and processing.
What are decision support systems
They help to choose different courses of action by compiling information and data
What are expert systems
They imitate the reasoning of experts and certain problems. Hopefully when the experts are too difficult to find or too expensive
Which statement is true of firewalls?
They protect against external access, but they leave networks unprotected from internal intrusions.
Identify a true statement about copyright laws.
They protect tangible material, such as books.
Rivalry among existing competitors is high when many competitors occupy the same marketplace position.
True
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
Trojan programs
A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.
True
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
True
An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use.
True
An intrusion detection system (IDS) can protect networks against both external and internal access.
True
Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.
True
Copyright laws cover online materials that can be printed or saved on a storage device.
True
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
True
Green computing helps an organization save on energy costs.
True
In a management information system (MIS), the quality of information is determined by its usefulness to users, and its usefulness determines the success of the information system.
True
Common dss analysis
What if, sensitivity (impact on other variable when one is changed), goal seeking (what inputs necessary to meet goal), optimization (extension of goal seeking; changing of variable subject to specified constraints).
Infographic (Information Graphic)
a representation of information in a graphical format designed to make the data easily understandable at a glance
Neural Network / Artificial Neural Netork
a category of AI that attempts to emulate the way the human brain works
Bar Chart
a chart or graphic that presents grouped data with rectangular bars with lengths proportional to the values that they represent
Big Data
a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools
System
a collection of parts that link to achieve a common purpose
Virtual Reality
a computer-simulated environment that can be a simulation of the real world or an imaginary world
Variable
a data characteristic that stands for a value that changes or varies over time
Outlier
a data value that is numerically distant from most of the other data points in a dataset
Competitive Advantage
a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
Entry Barier
a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival
Business Process Model
a graphical description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint
Histogram
a graphical display of data using bars of different heights, it's similar to a bar chart, but a histogram groups numbers into ranges
Business Process Model and Notation (BPMN)
a graphical notation that depicts the steps in a business process, provides businesses with a graphical view of the end-to-end flow of their business processes
Time-Series Chart
a graphical representation showing change of a variable over time. used for data that changes continuously. allow for a clear visual representation of a change in one variable over a set amount of time
What is collaboration?
a group of people working together to achieve a common goal via a process of feedback and iteration
Business Strategy
a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services
Fuzzy Logic
a mathematical method of handling imprecise or subjective information
Variance Bias
a mathematical property of an algorithm
Case-Based Reasoning
a method whereby new problems are solved based on the solutions from similar cases solved in the past
What is a value chain?
a network of value-creating activities
Business Process Patent
a patent that protects a specific set of procedures for conducting a particular business activity
Stakeholder
a person or group that has an interest or concern in an organization
What is PC virtualization?
a personal computer that hosts several different operating systems
Sample Bias
a problem with using incorrect training data to train the machine
Benchmarking
a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values) and identifying steps and procedures to improve system performance
Deep Learning
a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets
Cluster Analysis
a technique used to divide an information set into mutually exclusive groups such that the members of each group are so close together as possible to one another and the different groups are as far apart as possible
Project
a temporary activity a company undertakes to create a unique product, service, or result
Pie Chart
a type of graph in which a circle is divided into sectors that each represent a proportion of the whole
Data Mining Tools
a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making
Systems Thinking
a way of monitoring the entire system by viewing multiple inputs being processed or transformed to product outputs while continuously gathering feedback on each part
Google Glass
a wearable computer with an optical head-mounted display (OHMD)
Internet of Things (IoT)
a word where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention
Virtual Workplace
a work environment that is not located in any one physical space
A _____ is a link between devices connected to a computer.
bus
Management Information Systems (MIS)
business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem soving
In the context of storage measurements, a _____ is the size of a character.
byte
The _____ is the heart of a computer.
central processing unit
Dynamic Report
changes automatically during creation
what does a manager need to know about software?
client operating system, server operating system, client application programs, and server application programs.
outbound logistics
collecting, storing, and physically distributing the products to buyers.example: ship drones
How do information systems provide competitive advantages?
competitive advantage via products and via business processes.
Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.
computer
A(n) _____ is the enclosure containing the computer's main components.
computer chassis
What is firmware?
computer software that is installed into devices such as printers, print servers, and various types of communication devices
Expert Systems
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
major implication of Moore's Law
computers are getting exponentially faster. The costs of data processing is approaching zero
Managerial Decisions
concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management
Supply Chain
consists of all parties involved, directly or indirectly, in obtaining raw materials or a product
In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.
cybersquatting
The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.
data
Information
data converted into a meaningful and useful context
The _____ stores data types for fields, default values for fields, and validation rules for data in each field.
data dictionary
The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained.
data model
Human-Generated Data
data that humans, in interaction with computers, generate. Includes input data, clickstream data, or gaming data.
A(n) _____, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.
database
A _____ is software for creating, storing, maintaining, and accessing database files.
database management system
Microsoft Access is an example of a(n) _____.
database management system
In the context of segmentation of customers in database marketing, _____ is a variable that includes gender, age, income, and marital status.
demographic information
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
denial-of-service attack
major tasks of "finalizing"
determine completion. prepare archival documents. disband team.
major tasks of "planning"
determine tasks and dependencies. assign tasks. determine schedule. revise budget.
Chief Automation Officer
determines if a person or business process can be replaced by a robot or software
Estimation Analysis
determines values for an unknown continuous variable behavior or estimated future value
A database administrator (DBA) is responsible for _____.
developing recovery procedures in case data is lost or corrupted
Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.
digital divide
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
disaster recovery plan
A _____ is a peripheral device for recording, storing, and retrieving information.
disk drive
Report
document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information
Strategic Business Processes
dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interaction
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.
e-wallets
Managerial Level
employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change
Analytical Information
encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions
Transactional Information
encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions
SWOT Analysis
evaluates an organization's STRENGTHS, WEAKNESSES, OPPORTUNITIES, and THREATS to identify significant influences that work for or against business strategies
Market Basket Analysis
evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.
fault-tolerant systems
threat of substitutions
force strength medium
bargaining power of customers
force strength strong
bargaining power of suppliers
force strength weak
rivalry
force strength weak
In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
foreign key
Porter's Three Generic Strategies
generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service
A data _____ is the structure and organization of data, which involves fields, records, and files.
hierarchy
Java and C++ are examples of _____.
high-level languages
what are the three types of software?
horizontal, vertical, and one-of-a-kind
Knowledge
includes the skills, experience, and expertise, coupled with information and intelligence, that create a person's intellectual resources
Workflow
includes the tasks, activities, and responsibilities required to execute each step in a business process
Human-Generated Unstructured Data
including text messages, social media data, and emails
In the context of using information technologies for a competitive advantage, a top-line strategy focuses on:
increasing revenue by selling existing products to new customers.
Return on Investment (ROI)
indicates the earning power of a project
Knowledge Workers
individuals valued for their ability to interpret and analyze information
sales and marketing
inducing buyers to purchase the products and providing a means for them to do so. example: market and sell drones
Strategic Decisions
involve higher-level issues concerned with the overall direction of the organization; these decisions involve higher-level issues concerned with the overall goals and aspirations for the future
what is business process design and how does it apply to the value chain model?
is a network of activities that generate value by transforming inputs into outputs. It spans the value chain activities.
Threat of New Entrants
is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market
Threat of Substitute Products or Services
is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose
What is information and the characteristics of good information?
knowledge derived from data. meaningful context. processed data, or data processed by summing, ordering, averaging, grouping, comparing, or similar operations. "a difference that makes a difference"
A(n) _____ is a common output device for hard copy.
laser printer
Swim Lane
layout arranges the steps of a business process into a set of rows depicting the various elements
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
legal, but unethical
A ____ is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
logistics information system
Operationalized Analystics
makes analytics part of a business process
A _____ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.
management information system
Strategic Level
managers develop overall business strategies, goals, and objectives as part of the company's strategic plan
Chief Intellectual Property Officer
manages and defends intellectual property, copyrights, and patents
A data _____ is usually a smaller version of a data warehouse, used by a single department or function.
mart
Metics
measurements that evaluate results to determine whether a project is meeting its goals
Decision Support Systems (DSSs)
model information using OLAP, which provides assistance in evaluating and choosing among difference sources of action
Workflow Control Systems
monitor processes to ensure tasks, activities, and responsibilities are executed as specified
Product Differentiation
occurs when a company develops unique differences in its products or services with the intent to influence demand
Underfitting
occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data
Overfitting
occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data
Redundancy
occurs when a task or activity is unnecessarily repeated
Data Augmentation
occurs when adding additional training examples by transforming existing examples
Measurement Bias
occurs when there is a problem with the data collected that skews the data in one direction
collaboration tools for synchronous
office applications such as word and power point, shared whiteboards. conference calls multiparty text chat, screen sharing, webinars, videoconferencing
UNIX is a type of _____.
operating system
examples of app programs and operating systems
operating systems: windows, Mac OS, Unix, linux, symbian, blackberry OS, iOS, Android, Windows 10, Windows server, unix server, linux server. App programs: horizontal-market apps, vertical parket apps, one of a kind app.
what are the differences among operational, managerial, and strategic
operational is short term and more structured while managerial and strategic are more unstructured and long term.
Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on.
predictive modeling
In a relational database, every record must be uniquely identified by a _____ key.
primary
Visualization
produces graphical displays of patterns and complex relationships in large amounts of data
A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
program
Data
raw facts that describe the characteristics of an event or object
inbound logistics
receiving, storing, and disseminating inputs to the products. example: acquire drone parts
What is data and its characteristics?
recorded facts or figures. Accurate, timely, relevant, just barely sufficient, and worth its cost
Machine-to-Machine (M2M)
refers to devices that connect directly to other devices
Granularity
refers to the level of detail in the model or the decision-making process
As-Is Process Models
represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes
Chief Data Officer (CDO)
responsible for determining the types of information the enterprise will capture, retain, analyze, and share
Chief Privacy Officer (CPO)
responsible for ensuring the ethical and legal use of information within an organization
Chief Security Officer (CSO)
responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses
Chief Technology Officer (CTO)
responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology
Customer-Facing Processes / Front-Office Processes
result in a product or service received by an organization's external customer
Affinity Grouping Analysis
reveals the relationship between variables along with the nature and frequency of the relationships
Loyalty Programs
rewards customers based on their spending
Managerial Business Processes
semidynamic, semiroutine, monthly business processes such as resource allocation, sale strategy, or manufacturing process improvemetn
In the context of Web and network privacy, an acceptable use policy is a:
set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
major tasks of "starting"
set team authority. set project scope and initial budget. Form team. Establish team roles, responsibilities, and authorities. establish team rules.
To-Be Process Models
shows the results of applying change improvement opportunities to the current process model
Artificial Intelligence (AI)
simulates human thinking and behavior, such as the ability to reason and learn. ultimate goal is to build a system that can mimic human intelligence
The process of capturing and recording network traffic is referred to as _____.
sniffing
Services
tasks people perform that customers will buy to satisfy a want to need
Fact
the confirmation or validation of an event or object
Critical Success Factors (CSFs)
the crucial steps companies perform to achieve their goals and objectives and implement their strategies
MIS Skills Gap
the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies
procedures
the methods you use to start the program, enter your report, print it, and save and back up your file
Best Practices
the most successful solutions or problem-solving methods that have been developed by a specific organization or industry
Source Documents
the original transaction record
Anomaly Detection
the process of identifying rare or unexpected items or events in a dataset that do not conform to other items in the dataset
Classification Analysis
the process of organizing data into categories or groups for its most effective and efficient use
Data Replication
the process of sharing information to ensure consistency between multiple data sources
Digital Dashboard
tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs
Operations/Manufacturing
transforming inputs into the final products. example: produce drone
To minimize the invasion of privacy, users and organizations should:
use verification procedures to ensure data accuracy.
Unlike data in databases, data in data warehouses is:
used for analytical purposes.
Static Process
uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously
Prescriptive Analystics
uses techniques that create models indicating the best decision to make or course of action to take
Predictive Analytics
uses techniques that extract information from data to predict future trends and identify behavioral patterns
Descriptive Analytics
uses techniques the describe past performance and history
Haptic Interace
uses technology allowing humans to interact with a computer through bodily sensations and movement
what are the version management systems and version control
version management track changes to documents and provide features and functions to accommodate concurrent work and version control is the process that occurs when the collaboration tools limits, and sometimes even directs, user activity.
Value Chain Analysis
views a firm as a series of business processes, each of which adds values to the product or service
A _____ consists of self-propagating program code that is triggered by a specified time or event.
virus
volatile and nonvolatile memory, characteristics of smart devices
volatile is cache and main memory. nonvolatile is magnetic disks, solid state storage, thumb drives.
A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
warehouse
In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.
why the buyer buys a product or service
software
word, wordperfect, or some other word-processing program