Chapters 1-6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____ is an example of transaction-processing system

Automated Payroll

_____ is an example of transaction-processing system.

Automated payroll

____ means that computers and networks are operating and authorized users can access the information they need.

Availability

A systems analyst is responsible for: a. the writing of computer programs and software segments. b. the design and implementation of information systems. c. the design and maintenance of an organization's Web site. d. the management of all the hardware and software within the information systems department.

B

Identify the external source of data in an information system. a. Personnel records b. Economic conditions c. Sales records d. Transaction reports

B

Which of the following is spreadsheet software? a. IBM DB2 b. Corel Quattro Pro c. File Maker Pro d. Microsoft Word

B

Which of the following statements is true of business intelligence (BI)? a. It is information in its raw form. b. It gives organizations a competitive advantage in the marketplace. c. It cannot be generated by an information system. d. It provides only the current view of business operations and environments.

B

Which of the following statements is true of inkjet printers? a. An inkjet printer is used in large office environments with high-volume and high-quality printing requirements. b. An inkjet printer is suitable for home users who have limited text and photo printing needs. c. An inkjet printer uses laser-based technology that creates electrical charges on a rotating drum to attract toner. d. An inkjet printer's output is called a soft copy.

B

_____ contain large-capacity hard drives and enable users to store files and applications for later retrieval. a. Application servers b. Disk servers c. Web servers d. Remote access servers

B

_____ is a set of instructions used to control the computer using 0s and 1s, which the computer understands as on or off signals. a. Object code b. Binary code c. Source code d. Unicode

B

_____ is one of the strategies identified by Michael Porter that can help organizations improve efficiency by reducing costs. a. Loss leadership b. Overall cost leadership c. Reverse costing d. Transformational leadership

B

____ security measures use a physiological element to enhance security measures.

Biometric

____ could be used to make sure people don't vote more than once.

Biometric Security Measures

____ are hackers who specialize in unauthorized penetration of information systems.

Black Hats

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.

Blog

examples of information technologies used to support information systems

Computer networks (wired and wireless) database systems POS systems radio-frequency-identification (RFID) tags

Intrusion detection system (IDS)

Can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources. This is a nonbiometric security measure.

Sniffing

Capturing and recording network traffic. Often used by hackers to intercept information.

Create, Read, Update, and Delete (CRUD)

Data adminstration is used to determine who has permission to perform certain functions, ofthen summarized as create, read, update, and delete.

A ____ plan lists the tasks that must be performed to restore damaged data and equipment.

Disaster Recovery

____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.

Discussion groups

A ____ router can build tables that identify addresses on each network.

Dynamic

_______ describes the processes used in data warehouses. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target.

E.T.L. (Extraction, Transformation, Loading)

Decentralized Processing

EACH user HAS ITS OWN COMPUTER for performing processing tasks. Disadvantages include: 1. lack of coordination; 2. high costs; 3. duplication of efforts.

______ is a(n) objected oriented design technique

Encapsulation

A virtual organization needs central offices and organizational hierarchy for participants to contribute their expertise.

F

An effective financial information system (FIS) should provide timely, accurate, and integrated information about the marketing mix.

F

An intrusion detection system cannot prevent DoS attacks.

F

An object code must be translated into source code in order for the computer to be able to read and execute.

F

Application-filtering firewalls are less expensive than packet-filtering firewalls.

F

As compared to data warehouses, consolidating information from different departments or functional areas is easier in data marts.

F

Backup facilities should never be shared in an attempt to reduce costs.

F

Both the ALU and the control unit are part of the BIOS.

F

Buy power is high when customers have few choices and low when they have many choices.

F

Buyer power is high when customers have few choices and low when they have many choices.

F

Client-based e-mail enables you to access your e-mail account from any computer.

F

Corner bolts are secured to a computer at the power outlet.

F

Customers, competitors, and suppliers are examples of internal data sources.

F

Data redundancy is eliminated or minimized in a flat file system.

F

For each database, there can be more than one physical view of data.

F

Generally,there are three sources of data: internal, external and generated.

F

In the context of an information systems job, a database administrator writes computer programs or software segments that allow the information system to perform a specific task.

F

In well-designed data-driven Web sites, changes are made to the HTML code.

F

Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.

F

Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.

F

Light pen is an output device.

F

Log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

F

Metadata is extraneous data generated from an SQL join command.

F

Most information systems avoid using graphical user interfaces.

F

NAS is composed of arrays such that if one disk is the array fails, data is not lost.

F

Open Directory is an example of an automated directory.

F

Skill in using word processing software is an example of information literacy.

F

Sometimes, 4GLs are called procedural languages.

F

The contents of Programmable read-only memory (PROM) can be erased and reprogrammed.

F

The data component of an information system is considered the output to the system.

F

The database component of an information system accesses only internal data.

F

The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.

F

The hardware components of a computer system consist of programs written in computer languages.

F

The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.

F

The network model is similar to the hierarchical model because records are organized in the same way.

F

The software component of the management information system (MIS) includes input, output, and memory devices.

F

The speed of the Internet is usually faster than that of an intranet.

F

The term CRUD stands for copy, revise, undo, and define.

F

Twitter is an example of a management information system (MIS).

F

Using VoIP for international and long-distance calls is more expensive than a standard telephone service.

F

Very-large-scale integration (VLSI) circuits were introduced in the fifth generation computers.

F

When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.

F

When solving problems, the users of an information system must avoid using information information- such as rumors, unconfirmed reports, and stories.

F

With NAS, as the number of users increase, the performance increases too.

F

With the indexed sequential access method (ISAM), records cannot be accessed randomly.

F

Spoofing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

F ; phishing

A select operation pares down a table by eliminating columns according to certain criteria.

F; projection does thiss

The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

Fair Use Docterine

The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

Fair Use Doctrine

What is a legal exception to copyright laws?

Fair Use Doctrine

A hub can choose the best possible path for packets based on distance and cost.

False

A mesh is a hardware and software device that controls the data transfer from a computer to a peripheral device and vice versa.

False

In the Open Systems Interconnection model, the session layer is responsible for formatting message packets.

False

Local area networks(LANs) are used most often to isolate resources.

False

Replacing meetings over computer networks with actual face-to-face meetings is one of the goals of green computing.

False

Social engineering is an example of an unintentional security threat.

False

IBM system z10 is an example of ___ computer

Fifth Generation

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

Green Computing

Which of the following is true of the Internet?

It has less security measures than an intranet.

The four Ms of resources are _____.

Manpower, Machinery, Materials, and Money

Sequentical file structure

In a __, the files are organized and processes in numerical or sequential order, typically the order in which they are entered.

Hierarchical method

In a __, the relationships between records form a treelike structure. Records are called nodes, and relationships between records are called branches. The node at the top is called the root, and every other node is called a child, and consequentially have a parent. Nodes with the same parent are called twins or siblings.

Which of the following is true of a database?

More information can be generated from the same data.

Which of the following is true of a flat file system?

More sophisticated security measures cannot be used.

Ring Topology

NO HOST required as each computer manages its own connectivity; EACH NODE IS CONNECT TO TWO OTHER NODES.

Comprehensive Security System

Protects an organization's resources, including information and computer and network equipment, emails, invoices transferred via electronic data interchange (EDI), new product designs, marketing campaigns, and financial statements.

The ____ view involves how data is stored on and retrieved from storage media.

Physical

_____ is 1/1,000,000,000,000 of a second

Picosecond

A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.

Podcast

The purpose of an information system's _____ component is generating the most useful type of information for making decisions.

Process

the purpose of an information system's ____ component is generating the most useful type of information for making decisions

Process

Centralized Processing

Processing is done at ONE central computer; used in EARLY DAYS of computer technology because: 1. data-processing personnel were in short supply; 2. hardware and software were expensive.

Business Intelligence

Provides historical, current and predictive views of business operations and environments and gives organizations a competitive advantage in the market place.

The ____ approach to a distributed DBMS has each site store a copy of the data in the organization's database.

Replication

With the ________ approach to setting up a distributed DBMS, each site stores a copy of data of the organization's database.

Replication

In ____ processing, each department has its own computer for performing processing tasks.

decentralized

log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive

false

metadata is extraneous data generated from an SQL join command

false

replacing meetings over computer networks with actual face-to-face meetings is one of the goals of green computing

false

the database component of an information system accesses only internal data

false

the indexed sequential access method (ISAM) is slow and becomes increasingly useful as the number of records becomes larger

false

the network model is similar to the hierarchical model because records are organized in the same way

false

the term CRUD stands for copy, revise, undo, and define

false

with the indexed sequential access method (ISAM) records cannot be accessed randomly

false

Digital divide

information technology and the internet have created a ___. Computers still aren't affordable to many people. The __ has implications for education.

Hardware components of MIS

input, output, and memory devices and vary depending on the application and the organization

Management information system's (MIS) _____ include programs developed in-house.

software components

client/ server model

software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client request \ can be horizontal - adding more workstations (clients) can be vertical - migrating the network to larger, faster servers

Biometric security measures

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

some "information paranoia" is valid because about almost every aspect of people's lives is now stored on various databases

true

sometimes cookies are useful or innocuous

true

spamming has created decency concerns, because these emails often contain explicit language or nudity and can be opened by children

true

the "integrity rules" component of a data model defines the boundaries of a database, constraints, and access methods

true

the database administrator is responsible for developing recovery procedures in case data is lost or corrupted

true

the increasing popularity of the smart phones may result in stress-related injuries of the users' hands, arms back and eyes

true

the sequential access file structure method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis

true

the use of OR operator means that only one of the conditions must be met

true

Physical view

involves how data is stored and retrieved from storage media, such as hard disks, magnetic taper, or CDs.

logical view

involves how information appears to users and how it can be organized and retrieved.

Hardware

physical devices, such as keyboards, monitors, and processing units

Web Technologies

played a major role in improving the efficiency and effectiveness of HR departments. For example, intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left or looking up how much they have in their 401(k) plans

Physical Security measures

primarily control access to computers and networks and includes devices for securing computers and peripherals from theft.

physical security measures

primarily control access to computers and networks, and include devices for securing computers and peripherals from theft

biometric security measures

use a physiological element to enhance security measures. These elements are unique to a person and can't be stolen, lost, copied, or passed on to others

Optical Disk

use laser beams to access and store data. Examples are CD-ROM, WORM discs and erasable ___

Optical Disks

use laser beams to access and store data. Optical technology can store vast amounts of data and is durable. Three common types of optical storage are CD-ROMs, WORM discs, and DVDs.

4th generation languages (4GLs)

use macro codes that can take the place of several lines of programming. The commands are powerful and easy to learn, particular for people with little computer training.

Open Systems Interconnection

Seven-layer ARCHITECTURE for DEFINING HOW DATA IS TRANSMITTED in a network; each layer is responsible for different, unique functions.

Inkjet printers produce characters by projecting electrically charged droplets of ink onto paper that create an image.

T

Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left.

T

Intranets are typically set up behind a firewall.

T

NAS is popular for WEB servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant.

T

Private information on the Web—what is posted by a person—is not subject to censorship because of our constitutional freedom of expression.

T

Random access memory can be read from and written to.

T

Redundant data is eliminated by a process called normalization.

T

Rivalry among existing competitors is high when many competitors occupy the same marketplace position.

T

Some "information paranoia" is valid because information about almost every aspect of people's lives is now stored on various databases.

T

Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

T

The "integrity rules" component of a data model defines the boundaries of a database, constraints, and access methods.

T

The World Wide Web (WWW) changed the Internet by introducing a graphical interface to the largely text-based Internet.

T

The most common personal digital assistant is a smartphone.

T

The quality of information is determined by its usefulness to users.

T

The split keyboard has been developed for better ergonomics.

T

The terms "information systems" and "information technologies" are used interchangeably.

T

Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace.

T

Trackballs are ideal for notebook computers because they occupy less space than a mouse.

T

Trojans do not replicate themselves, as viruses and worms do.

T

The ____ denotes the type of organization or country the address specifies.

TLD

Hierarchical Topology

TRADITIONAL MAINFRAME NETWORKS; two primary components: 1. controller; and 2. multiplexer.

Which of the following is a source of external data?

Tax Records

External data

Sources

Internal sales & external economic reports are examples of what?

Sources of Data Records

____ has created decency concerns, because these e-mails often contain explicit language or nudity.

Spamming

A(n) ____ is often used so remote users have a secure connection to the organization's network.

Virtual Private Network (V.P.N.)

Which of the following protocols is used for Internet telephony?

VoIP

What is the protocol used for Internet telephony?

Voice Over Internet Protocol

Random Access Memory (RAM)

Volatile Memory. Data can be read from and written to RAM. Some examples of the type of information stored in RAM include open files, the Clipboard's contents, running programs, and so forth.

____ is a major player in B2B e-commerce.

Walmart

A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

Warehouse

Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.

Web Browsers

____ is collecting data from Web sites, usually for competitive intelligence.

Web Harvesting

____ is collecting data from Web sites, usually for competitive intelligence.

Web harvesting

Remote access servers (RAS)

allow off-site users to connect to network resources, such as network file storage, printers, and databases.

Information systems vs information technologies

both are used to help organizations be more competitive and improve their overall efficiency and effectiveness

Object-oriented databases

both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the objects date.

Data Definition

component used to create and maintain the data dictionary and define the structure of files in a database.

In symmetric encryption

(also called "secret key encryption"), the same key is used to encrypt and decrypt the message.

CPU Case

(also known as a computer chassis or tower) is the enclosure containing the computer's main components.

Information technologies have created job upgrading.

T

Three Components of a Data Communication System

1. Sender and receiver devices 2. modems or routers 3. communication medium

The Internet started in ____.

1969

The Internet2 (I2) project started in ____.

1987

two - tier architecture

(the most common type) a client, (tier one) communicates directly with the server (tier two) -presentation logic always on client -data management logic always on the server -application logic can be on either client or server most of time client side.

Hand geometry is an example of a biometric security measure.

- T

symmetric encryption

-"secret key encryption" -the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the ley and keep it secret

backdoor

-a.k.a: trapdoor -is a programming routine built into a system by its designer or programmer. it enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files

Byte

1 byte= 8 bits

Decisions that MKIS support

1) Analyzing market share, sales, and sales personnel 2) Sales forecasting 3) Price and cost analysis of items sold

the 5 forces

1) Buyer power 2) Supplier power 3) Threat of substitute products or services 4) Threat of new entrants 5) Rivalry among existing competitors

A PIS/HRIS supports the following decisions, among others:

1) Choosing the best job candidate 2) Scheduling and assigning employees 3) Predicting the organization's future personnel needs 4) Providing reports and statistics on employee demographics 5) Allocating human and financial resources

Describe the four major components of an information system.

1) Data 2) Database 3) Process 4) Information

Summarize the future outlook of information systems.

1) Hardware and software costs will continue to decline making it affordable for all organizations, regardless of size, to utilize information systems. 2) Artificial intelligence will continue to improve and expand. 3) Computer literacy will improve as computer basics are taught in schools. 4) Compatibility issues between networks will become more manageable. 5) Personal computers will continue to improve in power and quality. They should become more affordable. 6) Computer criminals will become more sophisticated, and protecting personal identity information will become more difficult.

By examining various factors related to designing, implementing, and using information systems, the following predictions can be made:

1) Hardware and software costs will continue to decline, so processing information will be less expensive. These cost savings should make information systems affordable for any organization, regardless of its size and financial status. 2) Artificial intelligence and related technologies will continue to improve and expand, which will have an impact on information systems. For example, further development in natural language processing should make information systems easier to use. Also, robots will play a major role in the workforce of the future. 3) The computer literacy of typical information system users will improve, as computer basics are taught more in elementary schools. 4) Networking technology will improve, so connecting computers will be easier, and sending information from one location to another will be faster. Compatibility issues between networks will become more manageable, and integrating voice, data, and images on the same transmission medium will improve communication quality and information delivery. 5) Personal computers and tablets will continue to improve in power and quality, so most information system software will be able to run on them without problems. This trend should make information systems more affordable, easier to maintain, and more appealing to organizations. 6) Internet growth will continue, which will put small and large organizations on the same footing, regardless of their financial status. Internet growth will also make e-collaboration easier, despite geographical distances. 7) Computer criminals will become more sophisticated, and protecting personal information will become more difficult.

When choosing between a SAN and a NAS system, consider the following factors:

1) Hybrid solutions (combining a SAN and a NAS) might be available. 2) A SAN offers only storage; a NAS system offers both storage and file services. 3) NAS is popular for Web servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant. It is also becoming a useful solution for providing large amounts of heterogeneous data (text, documents, voice, images, movies, and so forth) for consumer applications. 4) The biggest issue with NAS is that, as the number of users increases, its performance deteriorates. However, it can be expanded easily by adding more servers or upgrading the CPU.

decisions an FIS is used to support:

1) Improving budget allocation 2) Minimizing capital investment risks 3) Monitoring cost trends 4) Managing cash flows 5) Determining portfolio structures

Examples of decisions supported by an LIS

1) Improving routing and delivery schedules 2) Selecting the best modes of transportation 3) Improving transportation budgeting 4) Improving shipment planning

3 main types of Secondary memory devices

1) Magnetic disks 2) Magnetic Tape 3) Optical Disks

IT jobs fall into the following categories:

1) Operations and help desk 2) Programming 3) Systems design 4) Web design and Web hosting 5) Network design and maintenance 6) Database design and maintenance 7) Robotics and artificial intelligence

Decisions that an MFIS supports

1) Ordering decisions 2) Product cost calculations 3) Space utilization 4) The bid evaluation process used with vendors and suppliers 5) Analysis of price changes and discounts

Porters 3 strategies

1) Overall cost leadership 2) Differentiation 3) Focus

2 other types of ROM

1) Programmable read-only memory (PROM) 2) Erasable programmable read-only memory (EPROM)

A computers 3 basic tasks

1) arithmetic operations 2) logical operations 3) storage and retrieval operations

To use a computer and process data, three major components are needed:

1) input 2) output 3) Memory Devices

the 4 M's of resources

1) manpower 2) machinery 3) materials 4) money

Classes of computers

1) sub notebooks 2) notebooks 3) personal computers 4) minicomputers 5) mainframes 6) supercomputers.

How long do patents last?

14-20 Years

By examining various factors related to designing, implementing, and using information systems, it can be predicted that: a. computer criminals will become more sophisticated. b. hardware and software costs will continue to increase. c. protecting personal information will become easier. d. compatibility issues between networks will become less manageable.

A

Identify a true statement about transaction-processing systems (TPSs). a. They have provided enormous reductions in costs. b. They do not focus on data collection. c. They primarily focus on generating business intelligence (BI). d. They do not have the capacity to handle enormous sources of data.

A

The field of _____ technologies involves the applications and properties of light, including its interactions with lasers and telescopes. a. optical b. space c. vacuum d. integrated circuit

A

Which of the following decisions is supported by a logistics information system (LIS)? a. Improving shipment planning b. Scheduling and assigning employees c. Determining portfolio structures d. Forecasting sales

A

_____ components of a computer are physical devices, such as keyboards, monitors, and processing units. a. Hardware b. Adware c. Software d. Spyware

A

_____ data limits the ability of decision makers to focus on specific factors. a. Aggregated b. Disaggregated c. Symmetric d. Asymmetric

A

_____ is a first generation computer language that is machine dependent. a. Machine language b. Nonprocedural language c. Assembly language d. High-level language

A

Processors

A 32-bit processor can use bytes (4 GB) of RAM; and, in theory, a 64-bit processor can use bytes (16 EB, or exabytes) of RAM. So a computer with a 64-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers; it also has better overall performance than a 32-bit system. However, to take advantage of this higher performance, you must also have a 64-bit OS.

backdoor

A __ (also called a trapdoor) is a programming routine built into the system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

Virus

A __ consists of self-propagating program code that's triggered by a specific time or event.

Trojan program

A __ contains code intended to disrupt a computer network, or website and is usually hidden inside a popular program.

Denial-of-Service attack (DOS)

A __ floods a network or server with service requests to prevent legitimate users' access to the system.

firewall

A __ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the internet.

blended threat

A __ is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

logic bomb

A __ is a type of Trojan program used to release a virus, worm, or other destructive code. __ are triggered at a certain time or by an event, such as a user pressing enter or running a specific program.

callback

A __ modem is used to verify whether a user's access is valid by logging the user off and then calling the user back at a predetermined number.

Virtual Private Network (VPN)

A __ provides a secure "tunnel" through the internet for transmitting messages and data via a private network.

Worm

A __ travels from computer to computer in a network. __ are independent programs that can spread themselves without having to be attached to a host program.

Relational Model

A __, is uses a two dimensional table of rows and columns of data. Rows are records(also called tuples) and columns are fields(also called attributes).

Data model

A ___ determines how data is created, represented, organized and maintained. It usually contains data structure, operations, and integrity rules.

Firewall

A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all the other data transmissions are blocked. This is a nonbiometric security measure.

Password

A combination of numbers, characters, and symbols that is entered to allow access to a system.

Define a computer system, and describe its components.

A computer is a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information. The instructions, also called a "program," are step-by-step directions for performing a specific task, written in a language the computer can understand. A computer system consists of hardware and software. Hardware components are physical devices, such as keyboards, monitors, and processing units. The software component consists of programs written in computer languages.

Terminal resource security

A software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

Computer programmer

A computer writes computer programs or software pieces that allow the information system to perform a specific task.

Database Administrator

A database administrator (DBA) is responsible for database design and implementation. Additionally, a database administrator should have knowledge and understanding of data warehouses and data-mining tools.

Adware

A form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser.

Cache RAM

A special type of RAM, resides in the processor. Because memory access from main RAM storage generally takes several clock cycles, ___ stores recently accessed memory so that the processor isn't waiting for the memory transfer.

Define management information systems.

A management information system (MIS) is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes. In designing an MIS, the first task is to define the system's objectives clearly. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.

Hard Copy

A printer

Backdoor

A programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

Blended threat

A security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

Logic bomb

A type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by a specific event, such as a user pressing the enter key or running a certain program.

Future progress in _____ includes further development in natural language processing that should make information systems easier to use.

AI

Bandwidth

AMOUNT of data that can be transferred from one point to another in a certain time period.

In the context of the important concepts regarding Web and network privacy, ____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

Accountability

Bus

Affects computer performance. The link between devices connected to the computer. A bus can be parallel or serial, internal (local) or external

The ____ approach to setting up a distributed DBMS combines fragmentation and replication.

Allocation

____ is a pure-play company

Amazon.com

Output device

An ___ is capable of representing information from a computer. The form of this output must be visual, audio, or digital and examples are printers, display monitors, and plotters.

_____ prevents new adware from being installed on your computer.

Anti-spyware

_____ prevents new adware from being installed on your computer.

Antispyware

Node

Any device connected to a computer network; these can be computers, personal digital assistants (PDAs), cell phones, or various other network appliances. On an IP network, this is any device with an IP address.

The ____ layer of the OSI model serves as the window through which applications access network services.

Application

Access Controls

Are designed to protect systems from unauthorized access in order to preserve data integrity. Two widely used access controls are: terminal resource security and passwords.

Typically, an organization leases the media used for a VPN on a(n) ____ basis.

As-Needed

____ encryption uses a public key known to everyone and a private key known only to the recipient

Asymmetric

Denial-of-service (DoS)

Attack floods a network or server with the requests to prevent legitimate users' access to the system.

Spoofing

Attempt to gain access to a network by posing as an authorized user to find sensitive information.

____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

Business Continuity Planning.

____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

Business continuity planning

Buyer power

Buyer power is high when customers have many choices and low when they have few choices. Typically, organizations try to limit buyers' choices by offering services that make it difficult for customers to switch, which is essentially using a differentiation strategy

a ___ is the size of a character

Byte

A _____ is 1/1,000,000,000 of a second. a. picosecond b. millisecond c. nanosecond d. microsecond

C

A _____ is also referred to as the source code. a. log file b. kernel c. program d. cookie

C

Beginning in the 1940s, first-generation computers: a. were easy to program. b. operated on integrated circuits. c. were bulky and unreliable. d. generated little heat.

C

FileMaker Pro is an example of _____ that is used in an information system. a. external data b. internal data c. a database management system d. a Remember base management system

C

In an organization, a _____ allocates human and financial resources. a. logistics information system (LIS) b. manufacturing information system (MFIS) c. personnel information system (PIS) d. financial information system (FIS)

C

The hardware components of a management information system (MIS) include: a. software developed in-house. b. commercial programs. c. memory devices. d. operating systems.

C

Which of the following statements is true of information systems and information technologies? a. Information systems and information technologies and are independent of each other. b. Information technologies are broader in scope than information systems. c. Information systems and information technologies are used to help organizations be more competitive. d. Information systems face security and privacy issues, while information technologies do not face such issues.

C

_____ is nonvolatile memory that can be electronically erased and reprogrammed. a. Random access memory (RAM) b. Main memory c. Flash memory d. Read-only memory

C

_____ is one of the forces in Porter's Five Forces model. a. Government regulations b. Rivalry among customers c. Supplier power d. Consumer groups

C

_____, a factor distinguishing the computing power of computers, means accessing data from computer memory. a. Storage b. Encapsulation c. Retrieval d. Replication

C

Information Technologies

Can be misused to invade user's privacy and to commit computer crimes. These technologies consist of: Spyware, Adware, Phishing, Pharming, Keystroke loggers, Sniffing, Spoofing.

Data encryption transforms data into a scrambled form called ____.

Cipher Text

Explain how computers are classified.

Computers are classified based on cost, amount of memory, speed, and sophistication. Computers can be classified as: subnotebook; notebook; personal computer; minicomputer; mainframes; or supercomputer.

Summarize computer operations.

Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. All other tasks are carried out by one or a combination of these operations. Computers can add, subtract, multiply, divide, and raise numbers to a power. They also perform comparison operations. Computers can store massive amounts of data in very small spaces and locate a particular item quickly.

Accuracy

Computers do NOT make mistakes

The Power of Computers

Computers draw their power from three factors that far exceed human capacities: speed, accuracy, and storage and retrieval capabilities.

Explain the factors distinguishing the computing power of computers.

Computers draw their power from three factors that far exceed human capacities: speed, accuracy, and storage and retrieval capabilities. Every character, number, or symbol on the keyboard is represented as a binary number in computer memory. A binary system consists of 0s and 1s, with a 1 representing "on" and a 0 representing "off," similar to a light switch. Computers and communication systems use data codes to represent and transfer data between computers and network systems. Three data codes are: ASCII, Extended ASCII, and Unicode.

C.I.A. triangle

Confidentially- means that a system must prevent disclosing information to anyone who is not authorized to access it. Integrity- refers to the accuracy of information resources within an organization. Availability- means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

Star Topology

Consists of a central computer and a series of nodes.

Virus

Consists of self-propagating programs code that is triggered by a specific time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continuous.

Amazon.com uses ____ to provide customized book recommendations based on past purchases.

Cookies

Which of the following is a commonly used technology for data collection?

Cookies

Generally, ____ laws protect tangible material, such as books and drawings.

Copyright

Grouping objects along with their attributes and methods into a class is called ____.

Encapsilation

External examples

Customers, competitors, and suppliers Government agencies and financial institutions Labor and population statistics Economic conditions

____ is registering, selling, or using a domain name to profit from someone else's trademark.

Cybersquating

_________ is registering, selling, using a domain name to profit from someone else's trademark.

Cybersquatting

Bradley is highly skilled in using Microsoft PowerPoint for creating office presentations. Bradley is likely to exhibit _____. a. data literacy b. network literacy c. information literacy d. computer literacy

D

To enable decision makers to make the right decisions in a timely manner, information must be _____. a. abstract b. tampered c. ambiguous d. consistent

D

Which of the following is one of the three basic tasks performed by computers? a. Lateral thinking b. Groupthink c. Brainstorming d. Logical operations

D

Which of the following statement is true of fourth-generation languages (4GLs)? a. C++ and Java are two most widely used 4GLs. b. Users need to follow a rigorous command syntax to use 4GLs. c. In 4GLs, code written for one type of computer does not work on another type of computer. d. 4GLs use macro codes that can take the place of several lines of programming.

D

_____ is where computers store data and instructions, similar to a human brain. a. Secondary memory b. Control unit c. Disk drive d. Main memory

D

Generating complex queries and reports is faster and easier with ________ than with ________.

Data Warehouse; Databases

Within the context of the various categories of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools.

DB Admin

Microsoft Access is an example of _____ in an information system.

DBMS

A ____ attack typically targets Internet servers.

DDOS

A(n) _________ stores definitions, such as data types for fields, default values, and validation rules for data in each field.

Data Dictionary

___ is a function performed by control programs that controls data integrity by generating checksums to verify that data has not been corrupted or changed

Data Management

The ________ component of a DBMS is used to add, delete, modify and retrieve records from a database.

Data Manipulation

A data ____ is usually a smaller version of a data warehouse, used by a single department or function.

Data Mart

________ are usually more limited in scope than data warehouses.

Data Marts

________ is used to discover patterns and relationships in data.

Data Mining

Business analytics uses ____ to support decision-making activities.

Data Mining Tools

A ________ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

Data Warehouse

Data vs information

Data consists of raw facts and by itself is difficult to use for making decisions. For example, XYZ Company's total sales last month were $5,000,000. This number is data, because it does not tell you how the company performed. Did it meet the sales goal? Did sales increase or decrease from the previous month? How did the company perform against its top competitors? These questions and more can be answered by the information that an information system provides.

Bits

Data is stored in bits. its a single value of 1 or 0

Data mining agents work with _____ , detecting trends and discovering new information and relationships among data items that were not readily apparent.

Data warehouses

within the context of the various categories of IT jobs, a ____ must have knowledge and understanding of data warehouse and data-mining tools

Database Administrator

The _____ component is responsible for data storage, manipulation, and retrieval.

Database Engine

Accuracy of information resources within an organization is called?

Database Integrity

Involves how information appears to users and how it can be organized and retrieved.

Database Logical View

Involves how data is stored on and retrieved from storage and media, such as hard disks, magnetic tapes, or CD's.

Database Physical View

The data ____ component is used to create and maintain the data dictionary.

Definition

A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system

Denial of Service

A ____ attack typically targets Internet servers.

Denial of Service

Webmaster

Designs and maintains the organization's Web site.

Job ____ occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position.

Deskilling

Explain the Five Forces Model and strategies for gaining a competitive advantage

Developed by Michael Porter, the Five Forces model is a comprehensive framework for analyzing an organization, distinguishing its position in the marketplace, and identifying information systems that could be used to make the organization more competitive. The five forces are: Buyer power Supplier power Threat of substitute products or services Threat of new entrants Rivalry among existing competitors

Router

Device containing software that connects network systems and controls traffic flow; chooses the best path; prevents network jams.

Synthetic compound

Devices made with this synthetic compound can emit light, withstand higher temperatures, and survive much higher doses of radiation than silicon devices.

A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.

Dictionary

Some believe that information technology has created a ________ between the "haves" and the "havenots."

Digital Divide

information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.

Digital Divide

____ is a site that facilitates C2C e-commerce

Ebay

Which of the following is a physical security measure?

Electronic Trackers

Which of the following is a physical security measure?

Electronic trackers

Binary number

Every character, number, or symbol on the keyboard is represented as a binary number in computer memory.

Mesh Topology

Every node is connected to every other node; aka plex or interconnected; advantage: highly reliable. Disadvantages: expensive and difficult to maintain and expand.

____ users include customers, contractors, suppliers, and other business partners.

External

2 sources of data

External and internal

A NAS offers only storage; a SAN system offers both storage and file services.

F

A byte is a single value of 0 or 1.

F

A computer with a 32-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers than a 64-bit system.

F

A patent protects product names and identifying marks.

F

A petabyte is 2^30 bytes.

F

A redundant array of independent disks (RAID) system is a collection of disk drives used for fault tolerance and improved performance.

F

Which of the following is a nonbiometric security measure?

Fire-Walls

Which of the following is a nonbiometric security measure?

Firewalls

Generations major attributes

First- Machine language Second- Assembly language Third- High-level language Fourth- Fourth-generation language Fifth- Natural language processing (NLP)

In a ________ some data could be stored in more than one file, causing redundancy. Causing Data integrity and Data security issues.

Flat File

_____ is one of the strategies of Michael Porter's three strategies for successfully competing in the marketplace.

Focus

Transaction Processing Systems (TPS)

Focus on data collection and processing and the major reason for using them is cost reduction.

_____ is one of the strategies Michael Porter's three strategies for successfully competing in the marketplace.

Focus or differentiation or overall cost leadership

Computer Emergency Response Team (CERT)

Focuses on security breaches and DoS attacks and offers guidelines on handling and preventing this incidents. This model is widely adopted by companies to respond to emergency security breaches.

Define transaction-processing systems.

For the past 60 years, transaction-processing systems (TPSs) have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control. TPSs focus on data collection and processing, and the major reason for using them is cost reduction.

A(n)_______ is a field in a relational table that matches the primary key column of another table. It can be used to cross reference tables.

Foreign Key

which of the following computer languages is the easiest to use

Fourth Generation

5 forces model

Harvard Business School's Michael Porter created a comprehensive framework called the Five Forces Model for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive

Java and C++ are ___ languages

High

Random Access-file Structure

In ___, records can be accessed in any order, regardless of their physical location in storage media. This method of access is fast and very effective when a small number of records need to be processed daily or weekly.

Keystroke loggers

Monitor and record keystrokes and can be software or hardware devices.

Major components of an information system

In addition to hardware, software, and human elements, an information system includes four major components, which are discussed in the following sections: data, a database, a process, and information

ASCII

In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of 0s or 1s). Up to 128 characters can be defined.

Explain the differences between computer literacy and information literacy.

In the 21st century, knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy. Computer literacy is having skills in using productivity software, such as word processing, spreadsheet, database management systems, and presentation software, and having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. Information literacy, on the other hand, is understanding the role of information in generating and using business intelligence.

Social Engineering

In the context of security, __ means using "people skills" as such being a good listener and assuming a friendly, nonthreatening air-to trick others into revealing private information.

Review the IT job market.

In the last decade the IT job market has been one of the fastest growing. Broadly speaking, IT jobs fall into the following categories: operations and help desk, programming, systems design, Web design and Web hosting, network design and maintenance, database design and maintenance, and robotics and artificial intelligence.

Threats

Includes sharing passwords with coworkers, leaving a computer unattended while logged on to the network, or even spilling coffee on a keyboard.

The output of an information system is _____.

Information

the output of an information system is

Information

Explain the importance and applications of information systems in functional areas of a business.

Information is the second most important resource (after the human element) in any organization. Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money. To manage these resources, different types of information systems have been developed. Although all have the major components (data, database, process, and information), they vary in the kind of data they collect and the analyses they perform. Major functional information systems include HRIS, LIS, MFIS, FIS, and MKIS.

____ is understanding the role of information in generating and using business intelligence.

Information literacy

Difference between information systems and information technologies

Information systems are broader in scope than information technologies, but the two overlap in many areas

information technologies

Information technologies offer many advantages for improving decision making but involve some challenges, too, such as security and privacy issues

Discuss the types of input, output, and memory devices.

Input devices send data and information to the computer. Examples include keyboards, a mouse, touch screens, light pens, a trackball, data tablet, bar code reader, optical character readers, magnetic ink character recognition, and optical mark recognition. Output devices are available for both mainframe and personal computers. Output devices are either soft copy (plasma display, LCD) or hard copy (printers). Memory is considered either main or secondary.

Convergence

Integrating voice, video, and data so that multimedia information can be used for decision making.

____ refers to the accuracy of information resources within an organization.

Integrity

Information technologies have led to "job deskilling."

T

____ users are employees who will use the system regularly, and they can offer important feedback on the system's strengths and weaknesses.

Internal

internal

Internal data includes sales records, personnel records, and so forth

____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Intrusion Detection System (I.D.S.)

____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Intrusion detection systems

Database Administrator

Is responsible for database design and implementation. Additionally, they should have knowledge and understanding of data warehouses and data mining tools.

Phishing

Is sending fraudulent emails that seem to come from legitimate sources, such as bank or university.

_____ are an external data source of an information system.

Labor statistics

ROM is different from RAM in that

It is nonvolatile

The supervisor program of an OS is called the_____

Kernel

Input device examples

Keyboard Mouse Touchscreen Light pen Track Ball Data tablet Barcode Reader

Three types of networks:

LAN - local area network WAN - Wide area network MAN - Metropolitan area network

___ are an external data source of information system

Labor Statistics

Managers could use a _____ to assess the effect on final product costs of a nine percent increase in raw materials.

MIS

Side note

MISs are often referred to as just information systems, and these terms are used interchangeably in this book.)

Magnetic tape

Made is plastic. Resembles a cassette tape and stores data sequentially. Records can be stored in a block or separately, with a gap between each record or block, called the interrecord gap (IRG). Magnetic tape is sometimes used for storing backups, although other media are more common now.

Magnetic Disk

Made of Metal and is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface. Magnetic disks are much faster but more expensive than tape devices.

semiconductor memory chip

Made of silicon and is the most common type of main memory

Distributed Processing

Maintains centralized control and decentralized operations; advantage: RELIABILITY is improved; disadvantages: ability to manage security, privacy and networking is difficult.

Discuss the history of computer hardware and software.

Major developments in hardware have taken place over the past 60 years. To understand these developments better, computers are often categorized into "generations" to mark technological breakthroughs.

____ introduced the value chain concept

Michael Porter

In a(n) _____ data model, each record can have multiple parent and child records.

Network

In the context of the important concepts regarding Web and network privacy, _____ is a method for binding all the parties to a contract.

Nonrepudiation

Read Only Memory (ROM)

Nonvolatile memory, so data can't be written to ROM

Read Only Memory (ROM)

Nonvolatile memory. Data cannot be written to ROM. The type of data usually stored in ROM includes BIOS information and the computer system's clock.

____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.

Normalization

A(n)_________ uses both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object's data.

Object Oriented Model

an example of ____ is UNIX

Operating System

Describes, methods, calculations, and so forth that can be performed on data, such as updating and querying data.

Operations

Discuss common applications of computers and information systems.

Organizations use computers and information systems to reduce costs and gain a competitive advantage in the marketplace. As a knowledge worker of the future, computers and information technology will help you be more effective and productive, no matter what profession you choose.

Business continuity planning

Outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

Soft Copy

Output displayed on a screen

Which of the following is a type of access control?

Passwords

_____ protects new processes

Patents

Scheduling and assigning employees might be handled by a _____.

Personnel Management System

___ are an example of internal source of data for an information system

Personnel Records

_____ are an example of internal source of data for an information system.

Personnel Records

Physical security measures

Primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.

A(n)________ uniquely identifies every record in a relational database such as a student I.D. number

Primary Key

the clipboards contents are stored on

RAM

In a(n) ________ model, select operation searches data in a table and retrieves records based on certain criteria

Relational Data

A(n)_________ Uses a 2D table of rows and columns of data, Rows are records (tuples) and columns are fields (attributes).

Relational Model

Side note

Remember that focus and differentiation strategies work only up to a certain point. Customers are often willing to pay more for a unique product or service or one with a specific focus. However, cost still plays a major role. If a product or service becomes too expensive, customers might not be willing to purchase it.

Which of the following protocols is used to send e-mails?

SMTP

Which of the following is a source of internal data?

Sales records

A ____ is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.

Script Kiddie

transistor was the major technology used during the ____ generation of hardware

Second

___ memory, which is nonvolatile, holds data when the computer is off or during the course of a program's operation

Secondary

A commonly used encryption protocol is ________, which manages transmission security on the Internet.

Secure Sockets Layer

____ is a commonly used encryption protocol that manages transmission security on the Internet.

Secure Sockets Layer (S.S.L.)

A ____ operation searches data in a table and retrieves records based on certain criteria.

Select

A________ Retrieve zero or more rows from one or more databases tables to database views.

Select Statement

Which of the following is a biometric security measure?

Signature Analysis

Pharming

Similar to phishing, Pharming is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as social security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site address, then alter its IP address so that the user who enter the correct Web address are directed to the pharmers's fraudulent Web site.

____ is the process of capturing and recording network traffic.

Sniffing

Which of the following is considered an intentional threat?

Social Engineering

____ take advantage of the human element of security systems.

Social Engineering Attacks

Describe the two major types of software.

Software is all of the programs that run a computer system. The two types of software include: system software and application software. System software is run by operating systems (OS). Examples of OS include Microsoft Windows, Mac OS, and Linux. Application software is used to perform a variety of tasks on a personal computer, including word processing, spreadsheet, database, presentation, graphics, etc. Examples of application software suites include Microsoft Office, OpenOffice, and Corel.

Spyware

Software that secretly gathers information about users while they browse the Web.

Green computation helps an organization save on energy costs.

T

A Web page displayed when the user first visits the site is called _____.

Splash Screen

Having a clear, specific policy can help prevent legal actions users might take against an organization, as in cases of termination.

T

If a drive in the RAID system fails, data stored on it can be reconstructed from data stored on the remaining drives.

T

In an MIS application, processes are usually methods for performing a task.

T

In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods.

T

In designing an MIS, the first task is to clearly define the system's objectives.

T

___ means saving data in computer memory and retrieval is accessing data from memory

Storage

____ gives users subtotals of various categories.

Summary Data

In accordance with Porter's Five Forces model, ____ power is high when customers have fewer options and low when customer have more options

Supplier

supplier power

Supplier power is high when customers have fewer options and low when customers have more options. Organizations might use information systems to make their products and services cheaper or to offer more services in order to distinguish themselves from competitors (another use of a differentiation strategy).

In the context of an information systems job, a chief technology officer oversees long-range planning and keeps an eye on new developments in the field that can affect a company's success.

T

Information in databases can now be cross-matched to create profiles of people and predict their behavior, based on their transactions with educational,financial, and governmental institutions.

T

Information technologies have a direct effect on the nature of jobs.

T

In ____ encryption, the same key is used to encrypt and decrypt the message.

Symmetric

In ________ (also called "secret key encryption"), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.

Symmetric Encryption

2 types of software

System software application software

A SAN is a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices.

T

A bus can be internal or external.

T

A database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS.

T

A database management system (DBMS) is used to create, organize, and manage databases.

T

A disadvantage of trackball is that positioning is sometimes less precise than with a mouse.

T

A magnetic disk is a type of secondary memory device.

T

A magnetic tape stores data sequentially.

T

A person making two copies of a software package he just bought and selling one of the copies to his friend is considered to be illegal as well as unethical.

T

A personnel information system helps in choosing the best job candidate.

T

A serial port is a communication interface through which information is transferred one bit at a time.

T

A uniform resource locator is the address of a document or site on the Internet.

T

A worm travels from computer to computer in a network, but it does not usually erase data.

T

An Extended ASCII data code allows representation of 1024 characters.

T

An e-commerce site that needs frequent updates would benefit from the use of a static Web site.

T

An intrusion detection system can protect against both external and internal access.

T

Business Intelligence (BI) includes historical views and predictive views of business operations.

T

Business intelligence uses scorecards and query reports to support decision-making activities, whereas business analytics uses data mining tools and predictive modeling.

T

C++ and Java are examples of high-level language.

T

Computers and communication systems use data codes to represent and transfer data between computers and network systems.

T

Computers are most beneficial in transaction-processing operations.

T

Confidentiality, integrity, and availability are collectively referred to as the CIA triangle.

T

Directories are indexes of information based on keywords embedded in documents, which makes it possible for search engines to find what you are looking for.

T

ENIAC is an example of a first-generation computer.

T

Flash memory is used in memory cards.

T

Flat file organization tends to take up unnecessary storage space.

T

____ is a supporting activity in the value chain

Technological Development

In a bus topology, ____ are used at each end of the cable to absorb the signal.

Terminators

replication

The __ approach to distributed DBMS has each site store a copy of data of the organizations database.

Process

The ___ component of an information system generates the most useful type of information for decision making, including transaction-processing reports, and models for decision analysis.

Discuss the differences between data and information.

The data component of an information system is considered the input to the system. An information system should collect data from external and internal sources.

Data

The data component of an information system is considered the input to the system. The information that users need affects the type of data that is collected and used. Has a time orientation

Financial information system (FIS)

The goal of a financial information system (FIS) is to provide information to financial executives in a timely manner.

Central Processing Unit (CPU)

The heart of the computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit.

American Standard Code for Information Interchange (ASCII)

The most common data code for text files, PC applications, and the Internet

Routing

The process of deciding which path the data takes on a network

Process

The purpose of an information system's process component is generating the most useful type of information for making decisions. This component generally includes transaction-processing reports and models for decision analysis that can be built into the system or accessed from external sources.

threat of substitutes

The threat of customers choosing substitute products or services is high when many alternatives to an organization's products and services are available

CTO/CIO

The top job in the informations systems field. This person is responsible for long-range information systems planning and for keeping abreast of new developments in the field that can affect a company's productivity or competitiveness.

Computer fraud

The unauthorized use of computer data for personal gain.

List the generations of computer languages.

There are four generations of computer language with a fifth generation in development. First: Machine Language Second: Assembly Language Third: High-level Language Fourth: Fourth-Generation Language Fifth: Natural Language Processing

___ computer languages are machine independent and are called high-level languages

Third Generation

Chief privacy officer (CPO)

This executive position includes responsibility for managing the risks and business impacts of privacy laws and policies.

Manager of Information Systems Services

This person is responsible for managing all the hardware, software, and personnel within the information systems department.

Systems Analyst

This person is responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position also requires a thorough understanding of business systems and functional areas within a business organization.

Systems Analyst

This person is responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position requires a thorough understanding of business systems and functional areas within a business organization.

Network Administrator

This person oversees a company's internal and external network systems, designing and implementing network systems that deliver correct information to the right decision maker in a timely manner. Providing network and cybersecurity is part of this position's responsibility.

Network Administrator

This person oversees a company's internal and external network systems, designing and implementing network systems that deliver correct information to the right decision-maker in a timely manner. Providing network and cyber security is part of this person's responsibility.

qualities for information to be useful:

Timeliness Integration with other data and information Consistency and accuracy Relevance

Discuss how information technologies are used to gain a competitive advantage

Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money. Three strategies for competing in the marketplace successfully include: Overall cost leadership Differentiation Focus Information systems can help organizations reduce the cost of products and services and assist with differentiation and focus strategies. Information systems can help bottom-and top-line strategies.

Database Management System (DBMS)

To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use. In a large organization, a DBMS such as Oracle or IBM DB2 might be used.

information technology has eliminated more jobs than it has created

false

______ protects products names and identifying marks such as nikes "swoosh" sign.

Trademark

Data encryption

Transforms data, called plaintext or cleartext, into a scrambled form ciphertext that cannot be read by others.

____ ensures data security and integrity over public networks, such as the Internet.

Transport Layer Security (T.L.S.)

Worm

Travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that cab=n spread themselves without having to be attached to a host program.

A hierarchical topology is also called a ____ topology.

Tree

A logic bomb is a type of ____.

Trojan

A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.

True

Although a database can consist of only a single file, it is usually a group of files.

True

Data encryption transforms data into a scrambled form called ciphertext.

True

Data transmission channels are generally divided into two types: broadband and narrowband.

True

Computer Speed

Typically, computer speed is measured as the number of instructions performed during the following fractions of a second: Millisecond: 1/1,000 of a second Microsecond: 1/1,000,000 of a second Nanosecond: 1/1,000,000,000 of a second Picosecond: 1/1,000,000,000,000 of a second

Word-Processing Software

Typically, this includes editing features, such as deleting, inserting, and copying text. More sophisticated graphics and data management features are in advanced softwares.

A(n) ____ is the address of a document or site on the Internet.

URL

Clerical workers using computers for word-processing tasks is an example of job _____.

Upgrading

Cloud Storage

Used for online storage and backup, it involves multiple virtual servers that are usually hosted by third parties. Examples include JustCloud, ZipCloud, MyPCBackup, and Dropbox.

Narrowband

VOICE GRADE TRANSMISSION channel capable of transmitting a maximum of 56,000 bps, so only a LIMITED AMOUNT OF INFORMATION can be transferred.

A ________ provides a secure "tunnel" through the Internet for transmitting messages and data via a private network.

Virtual Private Network

Callback modem

Verifies whether a user's access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number. This is a nonbiometric security measure.

____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.

White Hat Hackers

A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.

Wiki

Query by Example (QBE)

With ___, you request data from a database by constructing a statement made up from query forms. With current graphical databases you simply click select query forms, instead of having to remember keys, as you do with SQL. You can add AND, OR, or NOT operators to __ to fine tune the query.

Indexed Sequential Access Method

With the __, records can be accessed sequentially or randomly, depending on the number being accessed. For small numbers, random access is used, and for a large number, sequential accessed is used.

A ____ travels from computer to computer in a network, but it does not usually erase data.

Worm

Redundant Array of Independent Disks (RAID)

a collection of disk drives used for fault tolerance and improved performance, and is typically found in large network systems. Data can be stored in multiple places to improve the system's reliability. In other words, if one disk in the array fails, data is not lost. In some RAID configurations, sequences of data can be read from multiple disks simultaneously, which improves performance.

firewall

a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked

Serial Port

a communication interface through which information is transferred one bit at a time

Server

a computer and all the software for managing network resources and offering services to a network.

Computer characteristic

a computer only processes data (raw facts); it cannot change or correct the data that is entered

Storage Area Network (SAN)

a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices. A SAN network makes storage devices available to all servers on a local area network (LAN) or wide area network (WAN).

Computer

a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information.

intranet

a network within an organization that uses Internet protocols and technologies for collecting, storing, and disseminating useful information that supports business activities such as sales, customer service, human resources, and marketing. The main difference between an intranet and the Internet is that intranets are private and the Internet is public

Network-Attached Storage (NAS)

a network-connected computer dedicated to providing file-based data storage services to other network devices.

Network Attached Storage (NAS)

a network-connected computer dedicated to providing file-based data storage services to other network devices. Software on the NAS handles features such as data storage, file access, and file and storage management.

Disk Drive

a peripheral device for recording, storing, and retrieving information

Michael Porter

a professor at Harvard Business School, identified three strategies for successfully competing in the marketplace

Binary code

a set of instructions used to control the computer—uses 0s and 1s, which the computer understands as on or off signals

Programmable read-only memory (prom)

a type of ROM chip that can be programmed with a special device. However, after it has been programmed, the contents cannot be erased

Retrieval

accessing data from memory.

software

all the programs that run a computer system

instructions

also called a program, are step-by-step directions for performing a specific task, written in a language the computer can understand

5th generation languages

also called natural processing (NLP) are ideal computer languages for people with minimal computer training. These languages designed to facilitate natural conversations. between you and your computer

Database Characteristics

also important for reducing personnel time needed to gather, process, and interpret data manually. With a computerized database and a DBMS, data can be treated as a common resource that is easy to access and use.

CPU case

also known as a computer chassis or tower. It is the enclosure containing the computers main component.

Supervisor program

also known as the kernel, is responsible for controlling all other programs in the OS, such as compilers, interpreters, assemblers, and utilities for performing special tasks.

Extended ASCII

an 8-bit code that also allows representation of 256 characters.

Acceptable use policy

an __, is a set of rules specifying legal and ethical system use and activity and the consequences of noncompliance.

Parallel Port

an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.

____ is also called a corporate portal.

an intranet

An operating system is....

an operating system is a set of programs for controlling and managing computer hardware and software

Management Information System (MIS)

an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

Five Forces Model

analyzes an organization its position in the market place, and how in the market place and how information systems could be used to make it more competitive. Then the five forces include buying power, supplier power, threat of substitute powers or services, threat of new entrants and rivalry among existing competitors.

fragmentation

approach to a distributed DBMS addresses how table are divided among multiple locations. There are three variations; horizontal, vertical and mixed.

Allocation

approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often.

Mail Servers

are configured for sending, receiving, and storing e-mails.

access controls

are designed to protect systems from unauthorized access in order to preserve data integrity

Access Controls

are designed to protect systems from unauthorized access to preserve data integrity.

high level languages

are machines independent and part of the third-generation computer language. Many options are available and each is designed for a specific purpose.

Virtual organizations

are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.

Cookies

are small text files with a unique ID tag which is embedded in a web browser and are saved on the user's hard drive.

n-tier architecture

attempts to balance the workload between client and server by removing application processing from both client and server and placing it on a middle - tier sever. most common ---- is the three tired architecture - presentation logic always on client -management logic on the server

Output Devices

available for both mainframes and personal computers. output devices include hard copy and soft copy

for each database, there can be more than one physical view of data

false

Level 2 security involves ____.

back-end systems

Application software

can be commerical software or software developed in house and is used to perform a variety of tasks on a personal computer.

dynamic router

can build tables that identify addresses on each network

software components of MIS

can include commercial programs, software developed in-house, or both

intrusion detection system (IDS)

can protect against both external and internal access. It's usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources

An Intrusion detection system (IDS)

can protect both external and internal access. They're usually in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator and cause routers to terminate connections with suspicious sources.

External Bus

capable of communicating with external components, such as a USB device.

Unicode

capable of representing 256 characters

Sniffing

capturing and recording network traffic.

Internal data

collected within organizations

hierarchical topology (tree)

combines computers with different processing strengths in different organizational levels. -company's that are geographically disbursed and organized hierarchically are good candidates. -traditional mainframe networks use this

Join operation

combines two tables based on a common field.

Data Manipulation

component is used to add, delete, modify, and retrieve records from a database.

Application Generation

component is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages.

bus topology (linear bus)

connects to nodules along a network segment, ends of cables are not connected as in ring topology. -device called terminator used at the end of each cable to absorb signal. < without this no network communication -nodule failure has no effect on other nodule -uses least amount of cable of all topology

Binary System

consists of 0s and 1s, with a 1 representing "on" and a 0 representing "off," similar to a light switch.

Machine language

consists of a series of 0s and 1s representing data or instructions and was part of the first generation of computer languages. It depends on the machine, so a code written for one type of computer does not work on another type of computer.

Information

consists of facts that have been analyzed by the process component and is an output of an information system

Software

consists of programs written in computer languages.

Data

consists of raw facts and is a component of an information system.

virus

consists of self-propagating program code that's triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues

Disk Servers

contain large-capacity hard drives and enable users to store files and applications for later retrieval.

File Servers

contain large-capacity hard drives for storing and retrieving data files

Fax Servers

contain software and hardware components that enable users to send and receive faxes.

Trojan program

contains code intended to disrupt a computer, network, of Web site, and it is usually hidden inside a popular program. users run the popular program, unaware that the malicious program is also running in the background

Trojan Program

contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the popular program, unaware that the malicious program is also running in the background.

Fourth Generation Computers

continued several trends that further improved speed and ease of use: miniaturization, very-large-scale integration (VLSI) circuits, widespread use of personal computers, and optical discs (discs written or encoded and read using a laser optical device)

Level 3 security involves ____.

corporate networks

A successful _____ program helps improve client service and create a long-term relationship between an organization and its clients.

customer relationship management

in a relational model, the rows are called attributes and the columns are called tuples

false

in well-designed data-driven Web sites, changes are made to the HTML code

false

Extraction, Transformation, and Loading (ETL)

describes the processes used in data warehouses. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target.

information systems

designed to collect data, process the collected data, and deliver timely, relevant, and useful information that can be used for making decisions

personnel information system (PIS) or human resource information system (HRIS)

designed to provide information that helps decision makers in personnel carry out their tasks more effectively

Project Management Software

designing a web site or setting up an order entry system, consists of a set of related task.

Webmaster

designs and maintains the organization's Web site. Because of the popularity of e-commerce applications, webmasters have been in high demand.

Internal bus

enables communication between internal components, such as a video card and memory;

A database ____ is responsible for data storage, manipulation, and retrieval.

engine

information technologies have decreasedthe ease of access to information for hackers as well as for legitimate organizations

false

fault-tolerant systems

ensure availability in the event of a system failure by using a combination of hardware and software

Fault-tolerant systems

ensure availability in the event of a system failure by using a combination of hardware and software.

Fault-tolerant systems

ensures availability in case of a system failure by using a combination of hardware and software.

Availability

ensures that computers and networks are operating, and authorized users can access the information they need.

Integrity

ensures the accuracy of information resources in an organization.

Dual core processer

essentially two processors in one, to improve processing power. Dual-core processors are common in new PCs and Apple computers

mesh topology (plex or interconnected)

every node (which can differ in size and configuration from the others) is connected to every other node one node failure, does not cause large problems, costly and difficult to maintain and expand.

The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.

extranet

In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.

extrction

a credit card company selling its customers' mailing addresses to its competitors is considered to be ethical

false

a patent protects names and identifying marks

false

a select operation pares down a table by eliminating columns according to certain criteria

false

a virtual organization needs central offices and organizational hierarchy for participants to contribute their expertise

false

an e-commerce site that needs frequent updates would benefit from the use of a static Web site

false

any changes to a database's structure, such as adding a field, changing a field's size, or changing the data type stored in a field, are made with the data manipulation component

false

as compared to data warehouses, consolidating information from different departments or functional areas is easier in data marts

false

cookies cannot provide information about the user's location and computer equipment

false

copyright laws do not cover online material

false

data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions

false

data redundancy is eliminated or minimized in a flat file system

false

disks are sequential access devices, whereas tapes are random access devices

false

1940's

first-generation computers used vacuum tube technology. They were bulky and unreliable, generated excessive heat, and were difficult to program

denial-of-service (DoS) attack

floods a network or server with service requests to prevent legitimate users' access to the system

In a relational model, when a primary key for one table appears in another table it is called a ____ key.

foreign

Database Administrators (DBA)

found in larger organizations, design and set up databases, establish security measures, develop recovery procedures, evaluate database performance and add and fine-tune database functions

Level 1 security involves ____.

front-end servers

routing table

generated automatically by software, is used to determine the best possible route for a packet

Online Analytical Processing (OLAP)

generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product and location.

The focus of a top-line strategy

generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers. For example, e-commerce businesses are adapting business models to reduce distribution costs dramatically. A good example is antivirus vendors using the Internet to distribute software. For a subscription fee of around $30, you can download the software and receive updates for a year. Without the Internet for easy, inexpensive distribution, vendors could not afford to offer software at such a low price.

byte

group of eight bits, which operates as a single unit.

Table

group of related records

Encapsulation

grouping objects along with their attributes and methods into a class is called __, which essentially means grouping similar items into a single unit. It helps more complex types of data such as images and groups.

the IT job market

has been one of the fastest growing segments in the economy, and it continues to be so.

Transaction Processing systems (TPS)

have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. Payroll, for example, was one of the first applications to be automated. TPSs focus on data collection and processing, and they have provided enormous reductions in costs. Computers are most beneficial in transaction-processing operations.

Motherboard

he main circuit board containing connectors for attaching additional boards. In addition, it usually contains the CPU, Basic Input/Output System (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard

Information Technologies benefits

help bottom-line and top-line strategies

benefits of information systems

help organizations reduce the cost of products and services and, if designed correctly, they can assist with differentiation and focus strategies

Traditional mainframe networks use a ____ topology.

hierarchical

Rivalry among existing competitors

high when many competitors occupy the same marketplace position; it is low when there are few competitors

You make two copies of a software package you just bought for personal use, incase the original software fails and you need a backup. This action is ____.

illegal but ethical

Normalization

improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.

The focus of a bottom-line strategy

improving efficiency by reducing overall costs

convergence

in data communication --- refers to integrating voice, video and data so that multimedia information can be used for decision making.

Fifth Generation Computer (Current Computers)

include parallel processing (computers containing hundreds or thousands of CPUs for rapid data processing), gallium arsenide chips that run at higher speeds and consume less power than silicon chips, and optical technologies.

The field of Optical Technologies

involves the applications and properties of light, including its interactions with lasers, fiber optics, telescopes, and so forth.

Structured Query Language (SQL)

is a __ used by many DBMS packages, such as Oracle 11g and Microsoft __, consists of several keywords specifying actions to take.

Database

is a collection of all relevant data

Packet

is a collection of binary digits - including message data and control characters from formatting and transmitting- sent from computer to computer over a network

Data warehouse

is a collection of data from a variety of sources, used to support decision making applications and generate business intelligence.

Redundant array of independent disk systems (RAID)

is a collection of disk drives used for fault tolerance and improved performance, typically in large network systems.

secure sockets layers (SSL)

is a commonly used encryption protocol that managers transmission security on the Internet

Server

is a computer and is the software for managing network resources and offering services to a network.

Transport Layer Security (TLS)

is a cryptographic protocol that ensures data security and integrity over public networks, such as internet.

transport layer security (TSL)

is a cryptographic protocol that ensures data security and integrity over public networks, such as the internet

Storage area Network (SAN)

is a dedicated high-speed network consisting of both hardware and software used to correct and manage shared storage devices, such as disk arrays, tape libraries and optical storage devices.

Foreign keys

is a field in a relational table that makes the primary key column of another table. It can be used to cross-reference tables.

Adware

is a form of spy-ware that collects information about the user(without the user's consent) to display advertisements in the web browser, based on information it collects from the user's browsing patterns

controller

is a hardware and software device that controls data transfer from a computer to a peripheral device -examples - monitor, printer, keyboard.

multiplexer

is a hardware device that allows several noes to share one communication channel.

Intellectual property

is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets and patents for "creations of the mind" developed by people or businesses.

bus

is a link between devices connected to the computer. It can be parallel or serial or internal or external.

Computer

is a machine that accepts data as input, process dad without human intervention by using stored instructions and outputs information.

router

is a network connection device containing software the connect network systems and controls traffic flow between them.

mobile network (cellular network)

is a network operating on a radio frequency(RF), consisting of radio cells, each served by a fixed transmitter, known as the cell site or base station

wireless network

is a network that uses wireless instead of wired technology

disk drive

is a peripheral device for recording, storing and retrieving information.

blended of threat

is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks

Operating Systems (OS)

is a set of programs for controlling and managing computer hardware and software. Provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and performing repetitive tasks for users.

logic bomb

is a type of Trojan program used to release a virus, worm, or other destructive code. they are triggered at a certain time or by a specific event, such as a user pressing Enter or running a certain program.

Spoofing

is an attempt to gain access to a network by posting as an authorized user in order to find sensitive information, such as passwords and credit card information.

transmission control protocol/ internet protocol (TCP/ IP)

is an industry - standard suite of communication protocols that enables interoperabillity standard protocol fr UNIX network communication 2 major protocols- transmission control - operates OSI model network layer. internet protocol- OSI model at the network layer major functions are establishing integrity, sequencing and acknowledging packet delivery, regulating data flow between source and destination nodes.

Management Information Systems (MIS)

is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision making purposes.

Spreadsheet Software

is capable of performing numerous tasks with the information in a spreadsheet.

Security Sockets Layers (SSL)

is commonly used encryption protocol that manages transmission security on the internet.

Green Computing

is computing that promotes a sustainable environment and consumes the least amount of energy.

Database Software

is designed to perform operations such as creating, deleting, modifying, searching, sorting, and joining data.

Graphics Software

is designed to present data in a graphical format, such as line graphs and pie charts.

logistics information system (LIS)

is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.

Computer literacy

is having the skills in using productivity software, such as word processing, spreadsheets, database management systems, and presentation software, and having a basic knowledge of hardware and software, the internet and calibration tools and technology.

Financial Planning and Accounting Software

is more powerful than spreadsheet software, is capable of performing many types of analysis on large amounts of data.

Secondary memory

is nonvolatile, serves mostly as archival storage, as for backups.

Cybersquatting

is registering, selling, using a domain name to profit from someone else's trademark.

Phishing

is sending fraudulent emails that seem to come from legitimate sources, such as a bank or university, for the purpose of capturing private information, such as a bank account numbers and Social Security numbers.

throughput

is similar to bandwidth. It is the amount of data transferred or processed in a specified time, usually one second.

Network Model

is similar to hierarchical model, but records are organized differently. Unlike the model, each record in ___ can have multiple parent and child records.

Database Management Systems (DBMS)

is software for creating, storing, maintaining, and accessing database files. A ___ makes using databases more efficient.

Spyware

is software that secretly gathers information about the user while they browse the web.

Central Processing Unit (CPU)

is the heart of the computer. It's divided into two components; the arithmetic logic unit and the control unit.

Motherboard

is the main circuit board containing connections for attaching additional boards. It usually contains the CPU, Basic Input/Output System (BIOS), memory, storage interfaces, serial and parallel parts, expansion slate and all the controllers for standard peripheral devices such as display monitor, disk drive, and keyboard.

routing

is the process of deciding which path to take on a network. This is determined by the type of network and software used to transmit data

Data hierarchy

is the structure and organization of data which involves fields, records, and files.

Information Literacy

is understanding the role of information in generating and using business intelligence

Information literacy

is understanding the role of information in generating and using business intelligence.

Spam

is unsolicited emails sent for advertising purposes.

Computer-Aided Design Software

is used for drafting and design and has replaced traditional tools such as, T-squares, triangles, paper and pencil.

Data Administration

is used for tasks such as back and recovery, security, and change management.

Presentation Software

is used to create and deliver slide shows.

Data-mining analysis

is used to discover patterns and relationships.

Desktop Publishing Software

is used to produce professional-quality documents without expensive hardware and software.

Data mart

is usually a smaller version of a data warehouse, used by a single department or function.

Random Access Memory (RAM)

is volatile memory, in which data can be read from and be written to read-write memory.

A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____.

legal but unethical

The ____ view involves how information appears to users and how it can be organized and retrieved.

logical

Threat of new entrants

low when duplicating a company's product or service is difficult. Organizations often use focus strategies to ensure that this threat remains low

Magnetic disk

made of mylar or metal is used for random access processing. In other words data can be accessed in any orders, regardless of its orders on the surface.

Magnetic tape

made of plastic materials, resembles a cassette tape and stores data sequentially.

2 types of memory for a computer

main memory and secondary memory

Control Programs

manage computer hardware and resources by performing the following functions: Job management—Control and prioritize tasks performed by the CPU. Resource allocation—Manage computer resources, such as storage and memory. In a network, control programs are also used for tasks, such as assigning a print job to a particular printer. Data management—Control data integrity by generating checksums to verify that data has not been corrupted or changed. When the OS writes data to storage, it generates a value (the checksum) along with the data. The next time this data is retrieved, the checksum is recalculated and compared with the original checksum. If they match, the integrity is intact. If they do not, the data has been corrupted somehow. Communication—Control the transfer of data among parts of a computer system, such as communication between the CPU and I/O devices.

A data ____ is usually a smaller version of a data warehouse, used by a single department or function.

mart

Confidentiality

means a system must not allow the disclosure of information to anyone who isn't authorized to access it.

inheritance

means new objects can be created faster and more easily by entering new data in attributes.

confidentiality

means that a system must prevent disclosing information to anyone who isn't authorized to access it

availability

means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster

Social engineering

means using "people skills"--such as being a good listener and assuming a friendly, unthreatening air--to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems. Social engineers often search though dumpsters or trash cans looking for discarded material--such as phone lists and bank statements- that they can use to help break into a network.

social engineering

means using people skills - such as being a good listener and assuming a friendly, unthreatening air- to trick others into revealing private information. Tis attack takes advantage of the human element of security systems.

Keyloggers

monitor and record keystrokes and can be software or hardware devices.

business intelligence (BI)

more than just information. It provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

Supercomputers

most powerful

Source code

must be translated into object code—consisting of binary 0s and 1s.

ALU

performs arithmetic operations (+, -, ∗, /) as well as comparison or relational operations (<, >, =); the latter are used to compare numbers

Arithmetic Logic Unit (ALU)`

performs arithmetic operations and logical operations such as comparing numbers.

In the ____ model, each record can have multiple parent and child records.

network

ring topology

no host computer is required because each computer manages its own connectivity. nodule is connected to two other nodules upstream and downstream neighbors if any link is severed, entire network effected, disrupts entire network.

A routing table lists ____.

nodes on a network

Secondary Memory Devices

nonvolatile and used for storing large volumes of data for long periods. As mentioned earlier, they can also hold data when the computer is off or during the course of a program's operation

Gigabyte

one billion bytes

Megabyte

one million bytes

centralized routing

one node is in charge of selecting the path for all packets. This node, considered the network routing manager, store the routing table, and any changes to a route must be made at this node

Petabyte

one quadrillion bytes

Kilobyte

one thousand bytes

Terabyte

one trillion bytes

Third Generation Computers

operated on integrated circuits, which enabled computers to be even smaller, faster, more reliable, and more sophisticated. Remote data entry and telecommunications were introduced during this generation.

Business continuity planning

outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

business continuity planning

outlines procedures for keeping operational in the event of a natural disaster or network attack

project operation

pares down a table by eliminating columns according to certain criteria.

A ____ operation pares down a table by eliminating columns according to certain criteria.

project

virtual private network (VPN)

provides a secure "tunnel" through the Internet for transmitting messages and data via a private network

integrity

refer to the accuracy of information resources within an organization

The ____ in a database model describes methods, calculations, and so forth that can be performed on data, such as updating and querying data.

set of operation rules

distributed routing

relies on each node to calculate its own best possible route. Each node contains its own routing table with current information on the status of adjacent nodes so packets can follow best possible route.

network topology

represents network's physical layout, including the arrangement of computer cables.

static router

requires the network routing manager to give it information about which addresses are on which network.

Online brokerage firms operate in a highly combative and ambitious environment, so they use information technologies to make their services more unique in order to combat _____.

rivalry among existing competitors

Erasable programmable read-only memory (EPROM)

s similar to PROM, but its contents can be erased and reprogrammed.

Storage

saving data in computer memory,

Select operation

searches data in a table and retrieves records based on certain criteria.

Input Devices

send data and information to the computer

The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field.

set of integrity rules

Operating System (OS)

set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users

bit

short binary code, either a 1 or 0

Which of the following is a biometric security measure?

signature analysis

Data-driven Website

site acts as an interface to a database, retrieving data for users and allowing users to enter data in the database/

Computer literacy

skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.

Database Servers

store and manage vast amounts of data for access from users' computers

Application Servers

store computer software, which users can access from their workstations

Main memory

stores data and information and is usually volatile, meaning its contents are lost when electrical power is turned off.

Main Memory

stores data and information and is usually volatile.

Distributed database

stores data on multiple servers throughout an organization.

Date dictionary

stores definitions, such as types for fields, default values, and validation rules for data in each field.

Input devices

such as keyboards, are used to send data and information to the computer

Output devices

such as monitors and printers, display the output a computer generates.

Enterprise systems

supply chain management (SCM), customer relationship management (CRM), enterprise resource planning (ERP), knowledge management (KM), and collaboration software, to reduce costs and improve customer service

Information Technologies

support information systems come in the form of internet, computer networks, database systems, POS systems, and radio frequency identification tags (RFID).

Control Unit

tells the computer what to do, such as instructing the computer which device to read or send output to.

one advantage a database has over a flat file is that more information can be generated from the same data

true

Designing an MIS

the first task is to clearly define the system's objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.

Database

the heart of an information system, is a collection of all relevant data organized in a series of integrated files.

Database Engine

the heart of the DBMS software, is responsible for data storage, manipulation, and retrieval.

private information on the web-what is posted by a person-is not subject to censorship because of our constitutional freedom of expression

true

redundant data is eliminated by a process called normalization

true

Information

the output of an information system—consists of facts that have been analyzed by the process component and are therefore more useful to the MIS user.

Assembly language

the second generation of computer languages is a higher level language than machine language but is also machine dependent; it uses a series of short codes, mnemonics, to represent data or instructions.

importance of information

the second most important resource (after the human element) in any organization. Timely, relevant, and accurate information is a critical tool for enhancing a company's competitive position in the marketplace and managing the four Ms of resources

chief technology officer (CTO) or the chief information officer (CIO)

the top information system job belongs to one of these 2 guys. This person oversees long-range planning and keeps an eye on new developments in the field that can affect a company's success.

Multiprocessing

the use of two or more CPUs in a single computer system

ultimate goal of an information system

to generate business intelligence (B.I)

code division multiple access (CDMA)

to improve the efficiency and quality of digital communications ---- transmits multiple encoded messages over a wide frequency and then decodes then at the receiving end.

presentation, application, data management

what are the 3 levels of logic of client server model ?

time division multiple access (TDMA)

to improve the efficiency and quality of digital communications,---- divides each channel into 6 time slots. Each user is allocated two slots: one for transmissions and one for reception. This method increases efficiency by 300 percent as it allows carrying three calls on on channel.

why use porters 3 strategies?

to increase customer loyalty, thus combating the threat of new entrants or substitute products. However, certain information technology tools, such as the Internet, have evened the playing field by giving customers more access to all sorts of data, such as the various prices for products and services. This increases buyers' bargaining power and decreases supplier power,

Goal of enterprise systems

to use information technologies to create the most efficient, effective link between suppliers and consumers. A successful CRM program, for example, helps improve customer service and create a long-term relationship between an organization and its customers.

Data encryption

transforms data, called "plaintext" or "cleartext" into scrambled form called "ciphertext" that can't be read by others.

data encryption

transforms data, called "plaintext" or "cleartext"; into a scrambled form called "ciphertext" that cant be read y others

worm

travels from computer to computer in a network, but it doesn't usually erase data. unlike viruses, these are important programs that can spread themselves without having to be attached to a host program

a database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS

true

a database is a critical component of information systems because any type of analysis that is done is based on data available in the database

true

a distributed database is not limited by data's physical location

true

a person making two copies of a software package he just bought and selling one of the copies to his friend is considered to be illegal and unethical

true

a supervisor fires a programmer who has intentionally spread viruses to the organization's network. The supervisor's behavior is both ethical and legal

true

although a database can consist of a single file, it is usually a group of files

true

an organization can generate revenue by licensing its patent to others

true

business intelligence uses scorecards and query reports to support decision-making activities, whereas business analytics uses data mining tools and predictive modeling

true

cookies can be considered an invasion of privacy

true

even a small response for spam is worthwhile return on investment because, sending emails are very inexpensive

true

flat file organization tends to take up unnecessary storage space

true

green computation helps an organization save on energy costs

true

having a clear, specific policy can help prevent legal actions users might take against an organization, as in cases of termination

true

in a hierarchical data model, nodes with the same parents are called siblings

true

in contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods

true

information in databases can now be cross-matched to create profiles of people and predict their behavior, based on their transactions with educational, financial, and governmental institutions

true

information technologies have created job upgrading

true

information technologies have direct effect on the nature of jobs

true

information technologies have led to "job deskilling"

true

star, ring, bus, hierarchical and mesh

what are the five common types of topography?

marketing information systems (MKISs)

used to improve marketing decisions. An effective MKIS should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product.

A manufacturing information system (MFIS)

used to manage manufacturing resources so companies can reduce manufacturing costs, increase product quality, and make better inventory decisions. MFISs can perform many types of analysis with a high degree of timeliness and accuracy. For example, managers could use an MFIS to assess the effect on final product costs of a 7 percent increase in raw materials or to determine how many assembly-line workers are needed to produce 200 automobiles in the next 3 weeks

Second Generation Computer

used transistors and were faster, more reliable, and easier to program and maintain

Client/Server database

users' worksheets are limited in a local area network (LAN) to share the services of a single server.

Biometric Security measures

uses physiological elements to enhance security measures. These elements are unique to a person and can't be stolen, lost, copied, or passed onto others.

Asymmetric encryption

uses two keys; a public key known to everyone and a private or secret key known only to the recipient.

asymmetric encryption

uses two keys; a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient's private key, too. Anyone intercepting the message can't decrypt it because he or she doesn't have the private key

static and dynamic

what are two types of routers?

star topology

usually consists of a central computer (host computer, often a server) and a series of nodes (typically, workstations or peripheral devices) - if one nodule fails its okay, if central computer fails entire network is down.

callback modern

verifies weather a user's access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number

Main (primary) memory

where computers store data and instructions, similar to a human brain

Log Files

which are generated by web server software, record a user's actions on a website.

Secondary Memory

which is nonvolatile, holds data when the computer is off or during the course of a program's operation.

A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.

wiki

Computer Programmer

writes computer programs or software segments that allow the information system to perform a specific task. There are many computer languages available, and each one requires a specific knowledge suitable for a specific application. Because of the popularity of smartphones and mobile devices, many programmers are now developing apps for iOS and Android devices. There is a huge demand for these applications and for the programmers who develop these apps.


Ensembles d'études connexes

8th Grade Science - Astronomy 1-2

View Set

Ch.10 - Virtualization, Cloud Computing, and Printers

View Set

Physics and Math 1.3 Displacement and Velocity

View Set

REAL ESTATE PRE-LICENSE STUDY GUIDE

View Set

Social Science Senior Project: Equal Pay

View Set

Structure of Prokaryotic vs. Eukaryotic Organisms

View Set