MIS final exam (ch. 1-9) Dr. Jerry Ward UCO

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Data warehouses

provided the ability to support decision making without disrupting the day-to-day operations

Supply Chain Downstream

serve as distribution channels that link the firm and its customers

Outsourcing benefits

•Increased quality and efficiency of business processes •Reduced operating expenses for head count and exposure to risk for large capital investments •Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies •Increased flexibility for faster response to market changes and less time to market for new products or services

Outsourcing challenges

•Length of contract 1.Difficulties in getting out of a contract 2.Problems in foreseeing future needs 3.Problems in reforming an internal IT department after the contract is finished •Threat to competitive advantage •Loss of confidentiality

Characteristic of a well-defined project plan

•easy to understand and read •Communicated to all key participants •Appropriate to the project's size, complexity, and criticality •Prepared by the team, rather than by the individual project manager

Universal resource locator

(URL) The specific address of a page on the Internet

3D printing

(additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model

Enterprise systems

-can manage information across the entire enterprise allowing users to view every detail of business operations -are often available as a generic, but highly customizable, group of programs for business functions such as accounting, manufacturing, and marketing

Disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

Business strategy

A leadership plan that achieves a specific set of goals or objectives such as: *Developing new products or services *Entering new markets *Increasing customer loyalty *Attracting new customers *Increasing sales

Streaming

A method of sending audio and video files over the Internet

MAN

A metropolitan area network that uses radio signals to transmit and receive data

Business continuity plan

A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

Extraction, transformation, and loading (ETL)

A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

Key logger software

A program that, when installed on a computer, records every keystroke and mouse click

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

Cold site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

Warm site

A separate facility with computer equipment that requires installation and configuration

Network Protocols

A standard that specifies the format of data as well as the rules to be followed during transmission

Phishing

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email

Systems thinking

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

WAN

A wide area network that uses radio signals to transmit and receive data

Internet of Things

A world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention

Seven abilities of an agile organization

Accessibility Availability Maintainability Portability Reliability Scalability Usability

Business Process Reengineering (BPR)

Analysis and redesign of workflow within and between enterprises

Neural network

Attempts to emulate the way the human brain works

e-business models

B2B, B2C, C2C, pure play, click-and-mortar, etc.

transaction processing system (TPS)

Basic business system that serves the operational level and assists in making structured decisions

Relational database model

Entities, Relationships, Attributes, Primary Keys, Foreign Keys (ERD's)

Data validation

Includes the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data

Project stakeholder

Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion

Business Intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

Business intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

Knowledge management

Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

LAAS

Local Area Augmentation System. Ground-based augmentation to GPS that focuses its service on the airport area (approximately 20-30 mile radius) for precision approach, departure procedures, and terminal area operations.

Security breaches

Most information security breaches result from people misusing an organization's information either advertently or inadvertently.

Open system

Nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person

PaaS

Platform as a Service. Provides cloud customers with an easy-to-configure operating system and on-demand computing capabilities.

Transmission control protocol/Internet protocol (TCP/IP)

Provides the technical foundation for the public Internet as well as for large numbers of private networks

Key performance indicator (KPI)

Quantifiable metrics a company uses to evaluate progress toward critical success factors *Turnover rates of employees *Percentage of help desk calls answered in the first minutes *Number of product returns *Number of new customers *Average customer spending

Moore's law

Refers to the computer chip performance per dollar doubles every 18 months

Pharming

Reroutes requests for legitimate websites to false websites

Porter's Five Forces model

Rivalry among existing competitors, threat of substitute products or services, threat of new entrants, buyer power, supplier power

Managerial level

Semistructured decisions Employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change

Middleware

Several different types of software that sit between and provide connectivity for two or more software applications

SaaS

Software as a Service; a subscription service where you purchase licenses for software that expire at a certain date.

Reintermediation

Steps are added to the value chain as new players find ways to add value to the business process

SAN

Storage Area Network is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

Operational level

Structured decisions Employees develop, control, and maintain core business activities required to run the day-to-day operations

Predictive Analytics

Techniques that extract information from data and use it to predict future trends and identify behavioral patterns Example: Using past sales data to predict future sales data

Hypertext transport protocol (HTP)

The Internet protocol Web browsers use to request and display Web pages using URL

System restore

The ability to get a system up and running in the event of a system crash or failure

Network convergence

The efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures

Supply Chain Midstream

The midstream sector involves the transportation (by pipeline, rail, barge, oil tanker or truck), storage, and wholesale marketing of crude or refined petroleum products.

System Development Life Cycle (SDLC)

The overall process for developing information systems from planning and analysis through implementation and maintenance

Project sponsor

The person or group who provides the financial resources for the project

microblogging website

The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text Example: Twitter

information management

The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision making.

Automation

The process of computerizing manual tasks

data cleansing

The process of detecting incorrect or insufficient data

Analytics

The science of fact-based decision making

pirated software

The unauthorized use, duplication, distribution, or sale of copyrighted software

Project Scope

The work performed to deliver a product, service, or result with the specified features and functions.

project risks

Time, Quality, Cost

Digital dashboards

Tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs

Strategic level

Unstructured decisions Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan

Voice over IP (VOIP)

Uses IP technology to transmit telephone calls.

RFID

Uses electronic tags and labels to identify objects wirelessly over short distances•Uses electronic tags and labels to identify objects wirelessly over short distances

Value Chain Analysis

Views a firm as a series of business processes that each add value to the product or service

Ransomware

a form of malicious software that infects your computer and asks for money

Fair Information Practices

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

System integration

a process that brings together a set of component subsystems to ensure that the subsystems interact together as a coordinated whole

Competitive advantage

a product or service that an organization's customers place a greater value on than similar offerings from a competitor

Executive information system (EIS)

a specialized DSS that supports senior level executives within the organization

Utility computing

a technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed

Bring Your Own Device Policy

allows employees to use their personal mobile devices and computers to access enterprise data and applications

Drive-by hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

LAN

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

System backup

An exact copy of a system's information

Internet use policy

Contains general principles to guide the proper use of the Internet

counterfeit software

Software that is manufactured to look like the real thing and sold as such

Visualization

charts, graphs, etc.

SWOT

evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

goal-seeking analysis

finds the inputs necessary to achieve a goal such as a desired level of output

Data quality

how accurately the data actually match reality

Data Flow Diagram (DFD)

illustrates the movement of information between external entities and the processes and data stores within the system

Agile MIS Infrastructure

includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.

Proxy

is software that prevents direct communication between ascending and receiving computer and is used to monitor packets for security reasons.

Data marts

marketing, inventory, and sales

Decision support system (DSS)

models information to support managers and business professionals during the decision-making process

First-mover advantage

occurs when an organization can significantly impact its market share by being first to market with a competitive advantage

Levels of a company's strategic plan

operational level, managerial level, strategic level

Integrity constraints

rules that help ensure the quality of information *Relational integrity constraint *Business-critical integrity constraint

Forward integration

sends information entered into a given system automatically to all downstream systems and processes

Supply Chain Upstream

set of firms that supply the raw materials, components, parts, information, financesterm-89, and expertise needed to create a product and services

Buyer Power

the power of customers to drive down prices

Crowdsourcing

the wisdom of the crowd

Human resource components

track employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities


Kaugnay na mga set ng pag-aaral

Chapter 17: High-Risk Neonatal Nursing Care by D&C

View Set

Java - networking Socket Class Methods

View Set