CIS Exam #2 (Chapters 5-8)
• FTP
ftp, or File Transfer Protocol, is used to move files over the Internet. Google Drive and Microsoft OneDrive use ftp behind the scenes to transmit files to and from their cloud servers to your computer.
• Know the definitions of all of the following terms LAN WAN protocol
*Remember, LANs are typically faster and more secure than WANs , but WANs enable more widespread connectivity. - This slide lists basic types of computer networks. You see a LAN and you see a WAN on the drawing on the right. You might have a LAN at home and when you connect to the internet you are connecting to a WAN, or actually many WANs • We do not show a picture here of a PAN. A Personal Area Network is like your phone connected to your watch or headset connected to phone. • Whether it is a LAN or PAN ----- when we connect to the internet we are connecting to a WAN. - a protocol is a set of rules and data structures for organizing communication. Computers need to use protocols so they can exchange data. People use similar protocols to communicate. People, for example, follow a conversational protocol that says when one person talks, the other person listens. They switch back and forth until they are done communicating. Without a protocol for conversations, people would continually talk over each other and nothing would be communicated. There are many different protocols; some are used for PANs, some are used for LANs, some are used for WANs, some are used for internets and the Internet, and some are used for all of these. We will identify several common protocols in this chapter. This is a computer in your home. It has a private Internet Protocol or (IP address.) When a message leaves your home, it is assigned a public address.
• What are the elements of a database? They start with a bit and move up from there.
- A database allows us to create relationships. A database is a self-describing collection of integrated records. - A database includes Tables and files. BUT it also includes relationships between Tables and files. Additionally it includes special data called meta data that helps describe the structure of the database. - When we work with databases, we start by creating TABLES that will hold the data. - We start with Bytes. Another word for BYTE is character. Each byte is one character of data. A bunch of bytes put together Forms a field. Each field will represent a different piece of data. Then we have records. Each records will represent a different person or item or etc. A stack of paper enrollments for a group of students wanting to play baseball is an example of a group of records - each student has a piece of paper with his or her information. Each of these pieces of paper is a record. Putting all the records together, creates a Tables. -The power of a database comes when we can relate one Table to another Table. For example, a group of young baseball players might be in one Table and the parents' names and contact information and permission slips could be in another Table. - The textbook refers to THEME (or concept) when referring to a Table. They also use the term relations. There are just a lot of terms when it comes to databases. For our purposes, the term most non-database users tend to use is Table. Linking Tables together creates relationships. A database is a group of related Tables. Metadata is in play behind the scenes to describe definitions of Tables, what is expected in various fields and details about the relationships between Tables.
• Databases versus spreadsheet - when do you use a database and when do you use a spreadsheet?
- We use a spreadsheet for lists of data involving single theme (or concept). If I just want to keep track of a list of students and their grades, a spreadsheet will do. - We use a database for data with multiple themes or concepts. When I need to add student tracking, student email addresses, student office visits, and other information, it makes more sense to use a database that can handle multiple concepts.
• Social media information systems
. A social media information system (SMIS) is an information system that supports the sharing of content among networks of users.
• Domain name
A Domain name is a worldwide - unique name affiliated with a public IP address. a domain name is a worldwide-unique name that is affiliated with a public IP address. When an organization or individual wants to register a domain name, it goes to a company that applies to an ICANN ((internet corporation for assigned names and numbers)-approved agency to do so
• URL
A URL (Uniform Resource Locator) is an address on the Internet. Commonly, it consists of a protocol (such as http:// or ftp://) followed by a domain name or public IP address.
cable
A cable line is the second type of WAN connection. Cable lines provide high-speed data transmission using cable television lines. The cable company installs a fast, high-capacity optical fiber cable to a distribution center in each neighborhood it serves. At the distribution center, the optical fiber cable connects to regular cable-television cables that run to subscribers' homes or businesses. Cable signals do not interfere with TV signals
• What is the network?
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly
• Switch
A computer networking device that connects devices, multiple switches on all but small LANS. Switches detect the speed a given device can handle and communicate with it at that speed
• What is a primary key?
A key is a field or group of fields that identifies a unique record in the Table. When we have a field in its original Table, it can be the primary key.
• What is the query? What is the form?
A query is a question or inquiry about a set of data. • Typical database application Report, Query Form and Query Report. Structure of this Report creates information because it shows student data in a context meaningful to the professor. • DBMS programs provide comprehensive and robust features for Querying database data.
• What is data integrity?
Data integrity means that the data reflects reality. It implies that the data is correct and fit for purpose. Data integrity can be maximized by; suitable validation and software that prevents inconsistent states If we have a poorly designed database, we will have data integrity problems such as Incorrect or inconsistent in formation.
• What is the workgroup information system?
A workgroup information system exists to support one or more processes within the workgroup. For example, an Operations department could implement an IS to support all three of the operations processes shown in Figure 7-3. Or an Accounting department might implement two or three different IS to support the accounting processes shown. Sometimes, workgroup information systems are called functional information systems. Thus, an operations management system is a functional information system, as are a general ledger system and a cost accounting system. The program component of a functional information system is called a functional application.
• What is the disjointed process?
Additionally, when applications are isolated, business processes are disjointed. Both departments want to approve the order. It will take numerous emails and phone calls, however, to sort this out. These interacting business processes are disjointed.
• What is the tasks of the database administrator?
Another important DBMS function is to provide tools to assist in the administration of the database. Administration includes things like backups, who gets access to what data, what rights these individuals have with the data they have access to and so on. Remember, you as a manager might be intimately involved in determining user rights and permissions.
• Bluetooth
Bluetooth is another common wireless protocol used to make PAN connections. It is designed for transmitting data over short distances, replacing cables. Devices, such as wireless mice, keyboards, printers, and headphones, use Bluetooth to connect to desktop computers. Other devices like smartwatches and fitness trackers can use Bluetooth to connect to smartphones and send data over the Internet. More and more devices like clothing, automobiles, and sports equipment are becoming Bluetooth enabled.
• What is the theme client database?
Browser applications are thin-client applications that need not be preinstalled on the users' computers. In most cases, all of the code for generating and processing the application elements is shared between the users' computers and the servers
• Crowdsourcing
Crowdsourcing is the dynamic social media process of employing users to participate in product design or product redesign. Social Media also allows for crowdsourcing. Crowdsourcing obtains information or inputs from a large number of users. These users might give input on a task or a product. Users can either paid or unpaid and are usually contacted through the Internet.
• What is process efficiency? What is process flow?
Efficiency - is the Ratio of outputs to inputs. We want less inputs in the hopes of creating more outputs. Process efficiency is a measure of the ratio of process outputs to inputs. If an alternative to the process in Figure 7-1 can produce the same order approvals/rejections (output) for less cost or produce more approvals/ rejections for the same cost, it is more efficient. If, however, an information system is controlling the order approval process, then it can ensure that steps are performed in accordance with an established schedule. The information system can also be relied upon to make correct process-routing decisions for processes that are more complicated than that in Figure 7-1. SharePoint workflows, discussed in the context of collaboration in Chapter 2, can be used to automate structured processes.
• What are the benefits of enterprise application integration?
Enterprise application integration (EAI). Here we use technology across an enterprise to so we can integrate software applications and hardware systems that have most likely grown up over time in our organization. EAI is a suite of software applications. • It connects system "islands." • It enables communicating and sharing data. • It provides integrated information. • It provides an integrated layer on top of existing systems while leaving functional applications "as is." • We use what we have but we connect it! • Notice how EAI connects with CRM, which was the first category we looked at.
o What is an enterprise information system?
Enterprise processes span an organization and support activities in multiple departments. At a hospital, the process for discharging a patient supports activities in housekeeping, the pharmacy, the kitchen, nurses' stations, and other hospital departments. *Enterprise information systems support one or more enterprise processes. As shown in the second row of Figure 7-4, they typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users always undergo formal procedure training. Sometimes enterprise systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by level of authority. The solutions to problems in an enterprise system involve more than one workgroup or department.
• What is ERP?
Enterprise resource planning (ERP) is business process management software. • It is a system of integrated applications. • ERP automates many back-office functions related to technology, services and human resources. Consolidated data are stored in a centralized ERP database.
• What does it mean to normalize a database?
Fixing a poorly designed database by converting poorly structured Tables in to two or more well -structured Tables is called normalization.
• What is a freemium?
Freemiums - A freemium offers users a basic service for free, and then charges a premium for upgrades or advanced features. Where do we see this in use?
• Define human capital
Human capital: human knowledge and skills investments
• HTTPS
Hypertext Transfer Protocol (http) is the protocol used between browsers and Web servers. When you use a browser such as Microsoft Edge, Safari, or Chrome, you are using a program that implements the http protocol. At the other end, at the New Zealand hotel mentioned earlier, for example, there is a server that also processes http. Even though your browser and the server at the hotel have never "met" before, they can communicate with one another because they both follow the rules of http.
o What is an inter-enterprise information system?
Inter-enterprise information systems support one or more inter-enterprise processes. Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned, organizations. Problems are resolved by meeting, by contract, and sometimes by litigation.
• JSON
JSON (JavaScript Object Notation) A markup language used for transmitting documents. Contains little metadata and is preferred for transmitting volumes of data between servers and browsers. While the notation is the format of JavaScript objects, JSON documents can be processed by any language (see Figure 6-15b)
• Pay close attention to the structured versus dynamic process table on page 253.
Let's start with business processes. Business Processes can be structures or dynamic .• Structured processes are formally defined and standardized processes involving day -to -day operations. • Examples of structured processes include things like accepting a product return, placing an order, purchasing raw materials, and so on. • Dynamic processes are flexible, informal, and adaptive processes. • When a company decides whether to offer a new product or service, that might be a dynamic process. It is less structured.
• What is a single user database?
Single User Database Systems :In these DBMS, at one time, only a single user can access the database. Hence, the user can use all the resources at all times. All these systems are used for personal usage, such as personal computers experience. In this type of DBMS, both the physical and application layer can be used by the user. Example -Personal Computers
• What is meta-data?
Metadata makes a database self-describing. It makes it easier for those who come after the original designer to know what intended for each field. Here is an example of some meta data.
• Social CRM characteristics
Social CRM is a dynamic, SM-based CRM process. The relationships between organizations and customers emerge in a dynamic process as both parties create and process content. In addition to the traditional forms of promotion, employees in the organization create wikis, blogs, discussion lists, frequently asked questions, sites for user reviews and commentary, and other dynamic content. Customers search this content, contribute reviews and commentary, ask more questions, create user groups, and so forth. With social CRM, each customer crafts his or her own relationship with the company. Social CRM flies in the face of the structured and controlled processes of traditional CRM
• Structure and processes
Structured processes are formally defined, standardized processes that involve day-to-day operations: accepting a return, placing an order, purchasing raw materials, and so forth.
• How are cloud resources pools?
The Cloud is considered Pooled because: It allows multiple companies to share the same physical hardware which results in economies of scale. Different organizations are using the same hardware. When the company advertising during the Super bowl needs the resources, it gets them. Then the resources can be reallocated to a CPA firm later in the day or to a company in Norway, the following day. Thus we see that the Cloud is elastic in terms of how users use the Cloud and it is pooled because it allows many users to share hardware. Pooling makes it possible to have a large facility that supports multiple organizations with limited staff. • Economies of scale - Average cost decreases as size of operation increases. - Major cloud vendors operate enormous data centers (Web farms).
• 802.3
The IEEE 802.3 protocol is used for wired LAN connections. This protocol standard, also called Ethernet, specifies hardware characteristics, such as which wire carries which signals. It also describes how messages are to be packaged and processed for wired transmission over the LAN.
What is an ad click?
The ad click revenue model successfully emerged on PC devices where there is plenty of space for lots of ads
• TCP/IP
The basic plumbing of the Internet is governed by protocols that are defined according to an arrangement called the TCP/IP protocol architecture. This architecture has five layers; one or more protocols are defined at each layer. Data communications and software vendors write computer programs that implement the rules of a particular protocol. (For protocols at the bottom layer, the physical layer, they build hardware devices that implement the protocol.)
• Iaas
The most basic cloud offering is infrastructure as a service (IaaS), which is the cloud hosting of a bare server computer or data storage. Rackspace provides hardware for customers to load whatever operating system they want, and Amazon.com licenses S3 (Simple Storage Service), which provides unlimited, reliable data storage in the cloud.
• Look at success metrics - KPI's, Enterprise social networks, enterprise two point no, user generated content, CRM changes that are forecast.
The term Key Performance Indicator or KPI is a term mentioned in the book. KPIs are simply measurements used to track performance. It falls under category of success metrics as you can see on number 2 on the right side of this slide. Companies use metrics to help improve decision making. This table shows some organizational goals for its Social Media. By the way - any metric that don't improve decision making are commonly referred to as vanity metrics. The graphic or a man looking in a mirror and seeing himself as handsome when in reality he is not, is similar to a vanity metric. He sees himself as handsome and thus might be inclined to try to flirt with lots of women who might reject him. A vanity metric misleads and potentially keeps the organization from making good decisions.
• What are requirement gaps?
To specify a gap, an organization must know both what it needs and what the new product does. However, it can be very difficult for an organization to determine what it needs. Thus, gap identification is a major task when implementing enterprise systems. The second challenge is deciding what to do with gaps, once they are identified. Either the organization needs to change the way it does things to adapt to the new application, or the application must be altered to match what the organization does. Here, organizations fill gaps by choosing their lesser regret.
• VPN and tunneling
We can use virtual private networking or VPN. VPN technology uses the public Internet , but it creates the appearance of a private connection on secure network. • Virtual means something that appears to exist but, in fact, does not. • There is VPN client software that encrypts messages so their contents are protected from snooping and sends that encrypted package over the Internet to the VPN server. • Here we can a VPN client at a hotel in Denver. He wants to send a message back to headquarters in Chicago. It gets encrypted as it travels through the internet. • When the VPN server receives the encrypted message, it strips its address off the front of the message, decrypts the coded message, and sends the plain text message to the correct address inside the LAN. A virtual private network (VPN) uses the Internet to create the appearance of private, secure connections. In the IT world, the term virtual means something that appears to exist but in fact does not. Here, a VPN uses the public Internet to create the appearance of a private connection on a secure network.
• Social media definition and characteristics
We use Social Media to share content among networks of users. We use it to create groups of people who share a common interest. Social Media is an information system. It has HW, SW, Data, Procedures and people. • Social Media Providers include Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest, to name a few. • Each of these providers attract and target specific demographic groups. Each one offers blogs, wikis, discussion boards etc. • Users of Social Media Information Systems can be individuals or organizations. social media (SM) is the use of information technology to support the sharing of content among networks of users. Social media enables people to form communities of practice, or simply communities, which are groups of people related by a common interest.
• What does it mean to have an information silo?
When data is in separate information systems within the same organization, we have created information silos. For example, we might have a purchasing system that is not connected to manufacturing so in order to purchase, the manufacturing department has to send the purchasing department paper requests. Often, these silos get created over time as departments have a problem to solve and begin to search for an information system to fix it without considering what effect this might have on other departments and their information systems. Silos also get created when merger and acquisitions happen because the systems are different and separate.
• Define social capital
Wikipedia defines social capital as: the effective functioning of social groups through interpersonal relationships, a shared sense of identity, a shared understanding, shared norms, shared values, trust, cooperation, and reciprocity. So if an organization wants to increase its social capital, it will need to be visible on Social Media sites.
• XML
XML is used when relatively few messages are being transmitted and when ensuring a complete and correct document is crucial. Both WSDLs and SOAP messages are coded in XML. XML (eXtensible Markup Language) A markup language used for transmitting documents. Contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead (see Figure 6-15a).
• What is business process reengineering?
business process reengineering, which is the activity of altering existing and designing new business processes to take advantage of new information systems. Unfortunately, business process reengineering is difficult, slow, and exceedingly expensive.
• What does pay per click mean?
pay-per-click revenue model, in which advertisers display ads to potential customers for free and pay only when the customer clicks.
• SMTP
smtp, or Simple Mail Transfer Protocol, is used for email transmissions (along with other protocols)
• SaaS
software as a service (SaaS) provides not only hardware infrastructure, but an operating system and application programs as well. For example, Salesforce.com provides hardware and programs for customer and sales tracking as a service. Similarly, Google provides Google Drive and Microsoft provides OneDrive as a service. With Office 365, Exchange, Skype for Business, and SharePoint applications are provided as a service "in the cloud."
• What is a data model? What are entities? What are attributes?
when new databases are created, the designers often use data models before they begin creating a database. This figure summarizes the database application system development process. • A database must include all the data necessary for users to perform their jobs. • So, database developers must rely on end-users to tell them what to include in the database if they are going to create a good and useful data model. • One data model that could be created is called the Entity-relationship data model. • Developers use it to describe the content of a data model by defining the things (entities) to be stored in the database and relationships among those entities. • You, as an end user, may be meeting with a database designer who will use the entity-relationship data model to design the database. Instead we use entity relationship diagrams for design. There are several types of entity relationship diagrams. One is a Crows foot diagram. The book discusses the use of Crow's foot diagram to depict 1:N and N:M relationships between Tables. 1:N = one to many N:M = many to many The crows foot here means "many". It does not mean THREE. So we can see that departments can have many advisers and advisers can work for multiple departments. We also see that adviser can have many students, but students can have only 1 adviser (look at the box on the right and then trace it back to the adviser box and you can see 1 dash in the line A data model can be used to create a database from scratch. It can also be used to fix a poorly designed database
• Connection data and how it is used
your friends are connection data. The fact that you've liked particular organizations is also connection data. Connection data differentiates SMIS from Web site applications. Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data. SM providers store and retrieve SM data on behalf of users. They must do so in the presence of network and server failures, and they must do so rapidly. The problem is made somewhat easier, however, because SM content and connection data have a relatively simple structure.
• What is CRM?
• Let's start by looking at CRM. CRM - even though it only deals with managing customers, is a type of enterprise system. \ • Going out to solicit customers, managing leads, selling, management relationships with customers and customer support are all activities that happen with customers and they do not all happen in one department. • A CRM spans multiple departments. • One of the really important things a CRM offers is "relationship management ". It is important because customers have a "life cycle" which is listed in red here. • Banks, Internet service providers, insurance companies and other companies analyze customer churn because the it costs less to keep current customers than is does to get new ones. • There are CRM components for each stage of the customer life cycle. • As you can see, all the applications are using a common customer database. • This design eliminates duplicated customer data and removes the possibility of inconsistent data. • It also means that each department knows what has been happening with the customer at other departments.
• Social media risks and the policies that should be in place for social media
• Risks: - Forming erroneous conclusions about employees. - Becoming defender of belief or pushing unpopular management message organizations use Social Media to investigate prospective employees and what they have posted on their own Social Media sites. Whether you believe this is ethical or not, it happens. Thus, if you have a Social Media presence, you may want to consider what you are posting there and what your friends and family are posting about you.
• What is my SQL? What is basic SQL?
• SQL stands for Structured Query Language. SQL is used to communicate with a database. • It is the standard language for relational database management systems and is used to create databases and database structures, and process databases. • SQL is used by all popular DBMS products. Relational database programs, such as Microsoft Office Access, use SQL to work with data. • Unlike many computer languages, SQL is not difficult to read and understand. • However, Access DOES simply SQL by adding a tool called Query By Example. As you use the graphical screens, the Structured Query Language is being created for you in the background.