chap 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

knowledge base ,knowledge bases

2 . A _________ ____________ consists of a large database that allows users to find information by entering keywords or questions in normal English phrases. A knowledge management system uses _________ _______ , which are logical rules that identify data patterns and relationships.

Structured analysis,systems development life cycle

2 ___________ ___________ is a traditional systems development technique that is time-tested and easy to understand. Structured analysis uses a series of phases, called the _________ ___________ ________ _______(________) , to plan, analyze, design, implement, and support an information system.

systems planning phase,systems request

2.The __________ ________ _________ usually begins with a formal request to the IT department, called a _________ __________ , which describes problems or desired changes in an information system or a business process.

systems analysis phase,requirements modeling

2.The purpose of the _________ ________ ________ is to build a logical model of the new system. The first step is _________ _________ , where you investigate business processes and document what the new system must do to satisfy users. __________ ____________ continues the investigation that began during the systems planning phase.

User support,help desk,information center

3. __________ _________ provides users with technical information, training, and productivity support. The user support function usually is called a _______ ______ or __________ _________ (____) .

structured analysis,object-oriented (O-O) analysis,agile methods

3. the most popular alternatives are ________ _______ , which is a traditional method that still is widely used, _______-________ (O-O) _________ , which is a more recent approach that many analysts prefer, and _______ ___________

waterfall model,deliverable,end product

3.Structured analysis uses the SDLC to plan and manage the systems development process. The SDLC describes activities and functions that all systems developers perform, regardless of which approach they use. In the _________ __________ , the result of each phase is called a _________, or __________ ___________ , which flows into the next phase.

business process,business process model (BPM)

A _______ ________ is a specific set of transactions, events, and results that can be described and documented. A ______ ________ ________graphically displays one or more business processes, such as handling an airline reservation, filling a product order, or updating a customer account. The example in Figure 1-11 shows a simple model that includes an event, three processes, and a result.

business profile

A ________ _________ is an overview of a company's mission, functions, organization, products, services, customers, suppliers, competitors, constraints, and future direction. Although much of this information is readily available, a systems analyst usually needs to do additional research and fact-finding.

prototype

A ________ is an early working version of an information system. Just as an aircraft manufacturer tests a new design in a wind tunnel, systems analysts construct and study information system prototypes

mission-critical system

A _________ ________ _______ is one that is vital to a company's operations. An order processing system, for example, is mission-critical because the company cannot do business without it.

systems analyst

A __________ __________ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company's information systems. To perform those tasks, a _________ _________ constantly interacts with users and managers within and outside the company.

scalable

A __________ design can expand to meet new business requirements and volumes. Information systems development is always a work in progress. Business processes change rapidly, and most information systems need to be updated significantly or replaced after several years of operation.

system

A ___________ is a set of related components that produces specific results.

feasibility study

A key part of the preliminary investigation is a ____________ __________ that reviews anticipated costs and benefits and recommends a course of action based on operational, technical, economic, and time factors.

business rules

A process model shows the data that flows in and out of system processes. Inside each process, input data is transformed by___________ ___________ that generate the output

spiral model

Agile methods typically use a _______ _______ , which represents a series of iterations, or revisions, based on user feedback. As the process continues, the final product gradually evolves. An agile approach requires intense interactivity between developers and individual users, and does not begin with an overall objective.

critical thinking skills

Although no standard definition exists, most educators agree that _________ _________ _________ include the ability to compare, classify, evaluate, recognize patterns, analyze cause-and-effect, and apply logic. Critical thinkers often use a what-if approach, and they have the ability to evaluate their own thinking and reasoning.

object

An ____________ is a member of a class , which is a collection of similar objects. Objects possess characteristics called properties , which the object inherits from its class or possesses on its own.

MSF Microsoft Solutions Framework

Another option is what Microsoft calls ________ _________ ________(____) , which documents the experience of its own software development teams.

extensible markup language (XML)

As B2B volume soared, the development of ________ ________ _________ (_______) enabled company-to-company traffic to migrate to the Internet, which offered standard protocols, universal availability, and low communication costs

brick-and-mortar

At the other end of the scale are traditional firms, sometimes called _______-_______-_______ companies because they conduct business primarily from physical locations. Most successful brick-and-mortar firms — such as Lowe's, Target, and Wal-Mart

Network administration

Business operations depend on networks that enable company-wide information systems. _________ __________ includes hardware and software maintenance, support, and security. In addition to controlling user access, network administrators install, configure, manage, monitor, and maintain network applications.

user productivity systems

Companies provide employees at all levels with technology that improves productivity. Examples of _________ _________ _________ include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and high-speed Internet access.

business process reengineering

Corporate organizational structure has changed considerably in recent years. As part of downsizing and __________ __________ ________ , many companies reduced the number of management levels and delegated responsibility to operational personnel. Although modern organization charts tend to be flatter, an organizational hierarchy still exists in most companies.

systems implementation phase

During the ________ __________ ________ , the new system is constructed. Whether the developers use structured analysis or O-O methods, the procedure is the same — programs are written, tested, and documented, and the system is installed. If the system was purchased as a package, systems analysts configure the software and perform any necessary modifications.

systems support and security phase

During the _________ _________ and ________ _______ , the IT staff maintains, enhances, and protects the system. Maintenance changes correct errors and adapt to changes in the environment, such as new tax rates. Enhancements provide new features and benefits. The objective during this phase is to maximize return on the IT investment. Security controls safeguard the system from both external and internal threats. A well-designed system must be secure, reliable, maintainable, and scalable.

joint application development (JAD),rapid application development (RAD).

IT professionals know that the key to success is user input — before, during, and after a system is developed. Over time, many companies discovered that systems development teams composed of IT staff, users, and managers could complete their work more rapidly and produce better results. Two methodologies became popular: _________ _________ __________(_______) and ____________ _________ ________ (_____).

deployment team

If a site has a large number of remote clients, the systems support group often includes a ___________ __________ that installs and configures the workstations.

methods

In O-O design, built-in processes called ________ can change an object's properties. For example, in a Web-based catalog store, an ORDER object might have a property called STATUS that changes when a CUSTOMER object clicks to place, confirm, or cancel the order.

corporate culture

In addition to having goals, methods, and information systems requirements, every firm has an underlying corporate culture . A ________ _________ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

data ,Information

In an information system, _______ consists of basic facts that are the system's raw material. _______ is data that has been transformed into output that is valuable to users.

enterprise resource planning (ERP)

In many large companies, applications called _______ ________ _______ (_____) systems provide cost-effective support for users and managers throughout the company. For example, a car rental company can use ERP to forecast customer demand for rental cars at hundreds of locations.

e-commerce,electronic commerce

Internet-based commerce is called ____________ (__________ ____________)

fuzzy logic

Knowledge management systems do not use strict logical rules. Instead, many knowledge management systems use a technique called_________ ________ that allows inferences to be drawn from imprecise relationships. Using _________ _______, values need not be black and white, like binary logic, but can be many shades of gray. The results of a fuzzy logic search will display in priority order, with the most relevant results at the top of the list.

quality assurance

Many large IT departments also use a _________ ____________ (___) team that reviews and tests all applications and systems changes to verify specifications and software quality standards.

interactive model

Object-oriented methods usually follow a series of analysis and design phases that are similar to the SDLC, although there is less agreement on the number of phases and their names. In an O-O model, the phases tend to be more interactive. Figure 1-29 shows a system development model where planning, analysis, and design tasks interact continuously to produce prototypes that can be tested and implemented. The result is an _________ ________ that can accurately depict real-world business processes.

message

One object can send information to another object by using a _________. A _______ requests specific behavior or information from another object. For example, an ORDER object might send a message to a CUSTOMER object that requests a shipping address.

empowerment

Operational employees include users who rely on TP systems to enter and receive data they need to perform their jobs. In many companies, operational users also need information to handle tasks and make decisions that were assigned previously to supervisors. This trend, called ___________ , gives employees more responsibility and accountability. Many companies find that __________ improves employee motivation and increases customer satisfaction.

stakeholders,user, end user

People who have an interest in an information system are called _________ . Stakeholders include the management group responsible for the system, the ______ (sometimes called _______ _______) inside and outside the company who will interact with the system, and IT staff members, such as systems analysts, programmers, and network administrators who develop and support the system.

predictive approach

Structured analysis is based on an overall plan, similar to a blueprint for constructing a building, so it is called a ____________ _________.

process-centered technique.

Structured analysis uses a set of process models to describe a system graphically. Because it focuses on processes that transform data into useful information, structured analysis is called a ________-__________ ___________. In addition to modeling the processes, structured analysis also addresses data organization and structure, relational database design, and user interface issues.

business process modeling

Systems analysts use a process called _______ _______ _________ to represent company operations and information needs,________ ________ _______ requires a business profile and a series of models that document business processes.

application development

The IT _____________ ___________ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.

systems analysts

The IT department team includes _______ _______ who plan, develop, and maintain information systems.

technical support

The IT group provides ________ _________, which includes six main functions: application development, systems support and security, user support, database administration, network administration, and Web support.

system requirements document

The deliverable for the systems analysis phase is the ___________ __________ _________ . The ________ _________ ________describes management and user requirements, costs and benefits, and outlines alternative development strategies.

system design specification

The deliverable for this phase is the _________ __________ ________, which is presented to management and users for review and approval

management information systems (MIS)

The earliest business computer systems replaced manual tasks, such as payroll processing. Companies soon realized that computers also could produce valuable information. The new systems were called ___________ _____________ _________ (____) because managers were the primary users. Today, employees at all levels need information to perform their jobs, and they rely on information systems for that support

dot-com (.com)

The newest kind of company is the Internet-dependent firm, often described as a______-_______ company because its primary business depends on the Internet rather than a traditional business channel. Google, Yahoo!, Amazon, and eBay are examples of pure ______-_______ companies.

systems design phase

The purpose of the _________ ___________ ___________ is to create a physical model that will satisfy all documented requirements for the system. At this stage, you design the user interface and identify necessary outputs, inputs, and processes. In addition, you design internal and external controls, including computer-based and manual features to guarantee that the system will be reliable, accurate, maintainable, and secure.

preliminary investigation

The purpose of this phase is to perform a _________ __________ to evaluate an IT-related business opportunity or problem. The ________ ________ is a critical step because the outcome will affect the entire development process.

systems evaluation

The systems implementation phase also includes an assessment, called a _____________ _____________ , to determine whether the system operates properly and if costs and benefits are within expectations.

supply chain management (SCM), supplier relationship management (SRM)

This popular form of online B2B interaction is called ________ _________ _________ (_____) , or ________ __________ ________(_______)

radio frequency identification

To compete effectively, firms must collect production, sales, and shipping data and update the company-wide business support system immediately. The newest development in data acquisition is called ________ ________ _________ (_____) technology, which uses high-frequency radio waves to track physical objects

strategic plans

Top managers develop long-range plans, called _________ ________ , which define the company's overall mission and goals

product-oriented, service-oriented

Traditionally, IT companies were identified as ________ __________ or __________ _______. Product-oriented firms manufactured computers, routers, or the microchips shown in Figure 1-13, whereas _______ _________ companies included vendors, software developers, and service providers.

in-house applications,software packages

Traditionally, a company either developed its own information systems, called ________ __________ , or purchased systems called __________ __________

Groupware

User productivity systems also include __________. _______ programs run on a company intranet and enable users to share data, collaborate on projects, and work in teams. GroupWise, offered by Novell, is a popular example of groupware.

B2C (Business-to-Consumer)

Using the Internet, consumers can go online to purchase an enormous variety of products and services. This new shopping environment allows customers to do research, compare prices and features, check availability, arrange delivery, and choose payment methods in a single convenient session

objects

Whereas structured analysis treats processes and data as separate components, object-oriented analysis combines data and the processes that act on the data into things called _______ . Systems analysts use O-O to model real-world business processes and operations.

Software

______ refers to the programs that control the hardware and produce the desired information or results. _______ consists of system software and application software.

Systems analysis and design

_______ _______ and _______ is a step-by-step process for developing high-quality information systems.

Transaction processing (TP)

________ ______ (___) systems process data generated by day-to-day business operations. Examples of TP systems include customer order processing, accounts receivable, and warranty claim processing.

Business support systems

________ ________ ________ provide job-related information support to users at all levels of a company. These systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision-making

Application software

________ _________ consists of programs that support day-to-day business functions and provide users with the information they require.________ ________ can serve one user or thousands of people throughout an organization.

Knowledge workers

________ _________ include professional staff members such as systems analysts, programmers, accountants, researchers, trainers, and human resource specialists. _________ _________ also use business support systems, knowledge management systems, and user productivity systems

System software

________ _________ manages the hardware components, which can include a single workstation or a global network with many thousands of clients. Either the hardware manufacturer supplies the system software or a company purchases it from a vendor.

Knowledge management systems,expert systems

_________ ________ _______ are called __________ _______ because they simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied.

Information technology (IT)

_________ _________ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.

Systems support and security

_________ __________ and _________ provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure. The __________ ___________and _________ group implements and monitors physical and electronic security hardware, software, and procedures.

Web support

_________ ___________ is a vital technical support function. Web support specialists design and construct Web pages, monitor traffic, manage hardware and software, and link Web-based applications to the company's information systems.

Enterprise computing

_________ ___________ refers to information systems that support company-wide operations and data management requirements. Wal-Mart's inventory control system, Boeing's production control system, and Hilton Hotels' reservation system are examples of _______ ___________systems.

Hardware

_________ consists of everything in the physical layer of the information system. For example, hardware can include servers, workstations, networks, telecommunications equipment, fiber-optic cables, mobile devices, scanners, digital capture devices, and other technology-based infrastructure.

Computer-aided systems engineering (CASE),CASE tools

_________-________ _________ __________ (______) , also called computer-aided software engineering , is a technique that uses powerful software, called _______ ________.

Database administration

__________ ____________ involves data design, management, security, backup, and access. In small- and medium-sized companies, an IT support person performs those roles in addition to other duties. Regardless of company size, mission-critical database applications require continuous attention and technical support.

Processes

__________ describe the tasks and business functions that users, managers, and IT staff members perform to achieve specific results. _________ are the building blocks of an information system because they represent actual day-to-day business operations

Project management

____________ ___________ is the process of planning, scheduling, monitoring, controlling, and reporting upon the development of an information system.

Rational Unified Process

a popular approach offered by the Rational group at IBM is called the _______ ________ _________ (_____®)

business process modeling notation (BPMN)

analysts apply computer-based modeling tools that use a standard language called ________ _______ ________ ________ . __________ ____________ __________ _________ includes various shapes and symbols to represent events, processes, and workflows,

electronic data interchange (EDI)

electronic commerce between two companies used a data sharing arrangement called _________ ________ __________. _______enabled computer-to-computer data transfer, usually over private telecommunications lines. Firms used _________ to plan production, adjust inventory levels, or stock up on raw materials using data from another company's information system.

business-to-business (B2B)

he volume of _________-_________-__________(______) transactions is many times greater. Industry observers predict that ________sales will increase sharply as more firms seek to improve efficiency and reduce costs.


Ensembles d'études connexes

GenSpark Java Interview Questions

View Set

List the steps taken to preserve a crime scene

View Set

Basic Java Quiz (AP Computer Science in Java (Mocha))

View Set

Chapter 26- Face and Neck Injuries

View Set

Market Equilibrium and Policy SmartBook

View Set

Unit 4 Day 1 - Mood/Affect; Coping; Sexuality

View Set

UNIT #15: Insurance-Based Products

View Set

HI State Real Estate Practice Exam

View Set

Disaster Planning Adaptive Quizzing

View Set

Unit 3: Income Taxes and the Investor in Florida

View Set