Information Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Why would we be against Standardization of Processes Based on Standard Software

USP is the basis of company success and value (Competitive advantage from special software) Strategic differentiation Need for secrecy

Digitalization

the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to a digital business

List 4 uses of normalization

-For detection and elimination of redundancies -For transforming existing data (e.g. Microsoft Excel spreadsheets) into a relational model -For creating stable and flexible data structures (relational models) that need to be changed as little as possible in the case of extensions -For transforming complex relationships (n:m) into hierarchical relationships (1:n)

What are the elements of the Business Model Canvas

1. Value Propositions (what do we deliver) 2. Customer Segments 3. Customer Relationships 4. Key Partners 5. Key Activities Required 6. Key Resources Required 7. Distribution Channels (how do customers integrate our product or service in their routines 8. Cost Structure 9. Revenue Structure

Describe Fragmented Database

A type of distributed database (data stored in several places) which puts parts of the database in different partitions. The database is the sum of all those parts. Two Types: With horizontal fragmentation, the table is split by rows. A company could store personnel data at the headquarters of each geographic region, with each region keeping data for employees who work in that region With vertical fragmentation, the table is split by columns. A bank could keep checking account information in one place, mortgage information on another. All fragments of a vertically fragmented row must include its primary key.

Define Read Only Memory

A type of non-volatile memory used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware, and unlikely to need frequent updates) or application software in plug-in cartridges.

Define Freeware

A type of software license provided by the author for free use. There are no warranty or maintenance obligations. Think google chrome or free antivirus programs.

Define Application Virtualization

A virtual environment contains all files, components, registry entries and is provided to run applications without the need to install them locally (e.g. Citrix Receiver).

What is a Common / Shared Workspace

An Internet-based application where members can access shared resources (storage space, files and applications) via a web browser. Members can communicate in multimedia with each other and symbols show which group members are online and currently ready to communicate (Group Awareness).

What is the A in B.O.A.T. Model

Application View - Overview of business information systems, distribution of functions, place of data storage, integration layers

Describe Artifacts in BPMN

Artifacts are used to extend the notation elements and complement them with a comment or a data object. Artifacts can be both electronic and physical data objects.

Discuss data backup in a hardware context

At least one copy of a backed up database should be kept at a remote location. Most organizations create full backups from time to time and incremental backups (copies only changed data) at least daily. They also keep transaction logs to restore database changes. Cloud based backup services are increasingly popular especially for smaller companies (because to maintain it themselves is quite expensive).

How does BPMN Differ from eEPC

BPMN defines: - How BPDs can be converted into machine-readable, XML-based process descriptions. - How these can be executed with the help of a "Process Engine" (Workflow Engine) BPMN should be understandable by all stakeholders which are involved in the area of business process management. To formulate it with the well-known and often used metaphor: BPMN builds a bridge between business process modeling, implementation and execution.

Batch Processing vs Online Transaction Processing

Batch Processing is programs that are executed with minimum human interaction. Batch process jobs can run without any end-user interaction or can be scheduled to start up on their own as resources permit. However, it does not provide timely information and someone has to go to the trouble of correcting in case of bad input. Online Transaction Processing (used way more than Batch) - Used by applications - Each transaction is processed as it occurs. Immediate updating.

A Primary Key Should Never...

Be changed and it can not be empty

Define Social Engineering

Befriending an authorized employee in order to gain unauthorized access to an information system. This is a top top concern for businesses. One example is tailgating or piggybacking, striking up a conversation then following that person through a key card only area. Much social engineering involves telephone, these people are usually very good at convincing someone else why they need specific codes etc

SAM Model - Business Alignment Approach

Business Alignment - This perspective is focused on how to build world class IS/IT in an organization. This requires an understanding of the external dimensions of IS strategy with corresponding internal design of the I/S infrastructure and processes. This strategic fit for creates the capacity to meet the needs of I/S customers. In this perspective, the role of business strategy is indirect and is viewed as providing the direction to stimulate customer demand. The specific role of top management to make this perspective succeed is that of the prioritizer, the one who articulates how best to allocate the scarce resources both within the organization and in the marketplace.

Define Business Engineering

Business Engineering aims to accompany the complete process, from the initial strategy development and the subsequent design of business models to the development of the organization and systems. In addition, the continuous change and further development in ongoing operations, which may result from changed framework conditions, for example, are considered

What are the 4 layers of Enterprise Architecture (top to bottom)

Business Perspective: This includes the goals, objectives and strategy of an organization Application Perspective: The various integrated applications that enable the business strategy. Information Perspective: Identification of the relevant data for the processes. Modelling of data relationships (e.g. with ER models). Embodies the storage, analysis and usage of data, including the policies that govern its use Technology Perspective: All devices, servers, cloud instances and networking protocols that enable applications and data.

What is the B in B.O.A.T. Model

Business View - Objectives - Involved business partners and their roles, business concept, contracts, strategic and operative targets

What are examples of customizing Standardized Software

By selecting program modules (add-ons, plugins) By parameters: making settings that are intended as variants in the program. The source code of the programs is not affected. For example: - Regional settings, language, By programming with tools supplied By altering the source code (release capability is definitely lost) Through external programming or integration with external software, e.g. integration of a web shop into an ERP system The more comprehensive the configuration options are, the greater the effort involved in the adaptation. Software is considered release-capable if the modifications made by the customer are not lost with the installation of a new software version (update).

What makes up Hardware

CPU + RAM (electronics subsystem) influenced by input and output devices and storage devices

Define CPU

Central Processing Unit. This is the brain of the computer doing most of the processing, located in main mainmemory (RAM), created by INTEL or AMD

Define Computer Planning

Computer-supported planning refers to the overall scope of a single division, several divisions (integrated planning) or the entire company (corporate planning), not to short but to medium-and longterm periods (planning horizons) and not to operational, but to tactical and strategic decisions

Define Conceptual Model

Conceptual ERDs model information gathered from business requirements. Entities and relationships modeled in such ERD are defined around the business's need. The need of satisfying the database design is not considered yet. Conceptual ERD is the simplest model among all.

Define Computer Networks

Connections enabling the centralisation of applications through supporting client-server architectures with access protection and data security.

Describe the Operator Element of the Event-Driven Process Chain

Connectors identifying factual logical links in process branching and merging. A distinction is made between the following operators. - AND: AND operation / conjunction - OR: And/Orlinkage / Adjunction - XOR: Either/or operation / disjunction - The control flow describes the temporal and logical dependencies of events and tasks. Representation of Operators - Operators are represented with circle.

Describe General Data Protection Regulation (GDPR)

Consent: The GDPR introduces a much higher bar for obtaining valid consent. Companies who rely on consent as a lawful basis for data processing must secure informed consent from customers, employees or research participants in clear, unconditional and unambiguous terms before collecting their personal data. Data erasure: Companies need to respect the customer's, employee's or research participant's right to be forgotten by deleting personal data when it's no longer relevant or when consent is withdrawn. Privacy by design & Privacy by default: Companies must build systems or select solutions with privacy by design and by default. data privacy cannot be tacked on as an afterthought. Any system that processes personal data should only collect the data they need to collect—and nothing more.

What Are 2 Purposes of Process Modeling

Creation of a basis for decision-making: - Facilitated communication within the company between management, specialist departments and IT department, across projects between project teams & analysis of problems and errors Documentation of facts: - Preserving implicit knowledge, development of design hypotheses, and explanation of processes and possible automated processing

Define ERP

Cross-departmental software solutions that control and evaluate business processes, e.g. in production, sales, logistics, finance and human resources. An ERP system is characterized by the uniform control of the different company divisions. This makes it a valuable controlling and management tool. Newer ERP systems can also be used to control and evaluate external business processes.

Describe Data Definition in SQL Commands

DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in database. Examples of DDL commands: CREATE - is used to create the database or its objects (like table, index, function, views, store procedure and triggers). DROP - is used to delete objects from the database. ALTER-is used to modify the structure of the database.

What are the 3 Groups of SQL Commands

Data Definition; Data Manipulation; Data Query

What is the Internal View in 3 Tier Architecture

Data Tier (Internal View): Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic. This could be MSSQL, MySQL, Oracle, or PostgreSQL, Mongo, etc

Dimensional Databases are optimal for...

Data Warehousing

Benefits of a 'good data' company

Data and information can be a differentiation factor. A good handling of data and information is therefore important to stay competitive. You have to understand the basics and challenges of database management, understand the requirements of the various levels of an organization for data and information, and be able to specify your own requirements and to recognise the complexity of data management.

List some nontechnology security precautions

Data backups, power protection (generators, hot sites, cold sites), physical access control

What are Data Cubes and their uses

Data cubes are used to represent data that is too complex to be described by a table of columns and rows. A data cube is generally used to easily interpret data. It is especially useful when representing data together with dimensions as certain measures of business requirements.

Define Transaction Data

Data describing an event (the change as a result of a transaction) and is usually described with verbs. Transaction data always has a time dimension, a numerical value and refers to one or more objects (i.e. the reference data). Typical transactions are: Financial: orders, invoices, payments.

What is the basic structure of a database system

Database System: A database system consists of one or more databases and a database management system (DBMS). Database Management System (DBMS): A DBMS is a system software for the management of databases. This software for builds, checks, changes and retrieves a database. It also has interface software for the use of data by application software Database: Several linked files made up of a collection of structured, content-related data

What are the three main tasks of an operating system

Defining the User interface (how we see the SW) Managing Shared Resources: coordinating the resources that applications use (RAM, disk space, screen space, printers, etc) Providing Shared Services: applications do things the same way (print on one site you can print on another), apps are easier to create (new tabs), tasks are handled better

Describe the Control Element of the Event-Driven Process Chain

Describes the temporal and logical dependencies of events and functions. Representation of the control flow - The control flow is displayed with directed lines (arrows).

What limits maximum RAM

Design, number of memory slots, capacity of each card

What are the three main requirements for DBMS from the view of the user

Different user groups have access rights to different data. Data can be analysed and linked according to any characteristics. Queries on the database provide answers in a short time

Define Distributed Computing

Distributed computing is a model in which components of a software system are shared among multiple computers to improve efficiency and performance. According to the narrowest of definitions, distributed computing is limited to programs with components shared among computers within a limited geographic area. Broader definitions include shared tasks as well as program components. In the broadest sense of the term, distributed computing just means that something is shared among multiple systems which may also be in different locations.

How Do Decision-making databases access difer from Transaction processing access

Each access retrieves many records, not just one. It is difficult to optimize a database for both single-record and multiple-record access. Analysis does not change the data. Transaction processing requires up-to-the-second data. Decision-making does not. Transaction data should often be organized by application for speed. Decision- making data should be organized by subject to provide users with an integrated view. Decision making application user do not access records by primary key (OLAP uses the cube)

Define Information Systems Security

Ensuring that the organization's information resources are available only for AUTHORIZED uses. More formally, it is the protection of information against unauthorized access, modification, or destruction.

5 Steps of Conceptual Information System Processing Flow

Entering Data, Processing Data, Storing Data, Sending Data, Extracting information

Define Enterprise Architecture

Enterprise architecture comprises coherent, uniform principles, methods and models that are used in the development and implementation of enterprise organization structures, business processes, information systems and technological infrastructures.

Define Metadata

Essentially, data about data. The DBMS uses this to access data (think SQL). It may also include access control information.

How should the data be obtained, prepared and made available in an (Executive) Information System

External data: Manual direct input, through direct retrieval from online services; Access to online databases, in particular business databases, e.g. competitor products, market shares, exchange rates and interest rates Internal data: Direct transfer from the operative application systems, e.g. by file transfer, usually combined with selection or aggregation; Manual direct input (including planned values or target specifications)

Describe FROM in SQL

FROM specifies which tables are used to query records.

Describe Data Types in Attributes in Relational Database Model

For each attribute in the relational model, a data type must be specified, at the latest when the attributes of the relation are to be transferred to a database system. Data types (a selection fromMicrosoft Access): -Short text, max. 255 characters - Longtext, up to severalgigabytes long - Number or decimal number - Automatic value, e.g. for numbering primary keys - Date and Time - Currencies - Yes or no

What is the Use of ITIL

Framework with processes that are important for IT service management (best and good practices). ITIL helps to create and manage IT services, It is distributed and established worldwide, Describes many terms that are part of the standard vocabulary of IT today (e.g. "Change Management"). Can help to better understand internal IT staff or external service providers

What are some software quality criteria

Functionality Does the software meet the user's business requirements? Reliability Can the software be used error-free and stable? Usability Is the software easy to learn and use? Efficiency What time behaviour (response time behaviour in dialog mode or runtime in batch mode) does the software exhibit? How high is the resource requirement of the software? Portability Can the software be transferred to other system software environments (other hardware, networks, operating systems)? Adaptability can SW be adapted for org changes?

Describe GROUP BY in SQL

GROUP BY, data sets can be grouped together and further processed with special group functions (e.g., sum, average, minimum, maximum, number). Note, HAVING can only be used with GROUP BY..

Describe the Communication Across Layers

Goal: Splitting the complexity of communication into subtasks. Modern communication takes place in layers. Each layer has its own protocols. Participants perceive the communication as "horizontal", in fact the communication is vertical; exception: lowest layer. Each layer provides its services to the layer above it. The layer-specific protocols are independent of each other. Exception: the defined interfaces between the layers

Describe HAVING in SQL

HAVING specifies which conditions a group of data records must meet in order to be further processed (only with GROUP BY).

What belongs to an enterprise application system?

Hardware: Computer systems for end users as well as for central processing and data organization, input and output devices. Software: operating systems, database systems, enterprise application software Data: master data, change data, non-cumulative data, and transaction data Networks: wired and wireless networks, routers, firewalls and other communication systems such as VPN, DNS

Two or more records in a relation never...

Have the same attribute value or attribute value combination in the primary key.

What is the purpose of promoting IT acceptance

High IT acceptance leads to higher success: Users create benefits by using the systems. The concrete implementation of projects has a great influence on acceptance: • Were users asked what they want during the project? • Were the users regularly informed about the progress and the current status of the project? • Acceptance can be measured in the scope of employee surveys. • On an regular basis, e.g. once a year • On an exceptional basis, e.g. due to special occurrences like longer downtime or complaints

The approach a business should take to manage its information resources is influenced by what two factors

How dependent an organization is on reliable, well-performing IS Dependency on said IS to maintain or enhance competitive advantage

Most security breaches are due to:

Human error

Define HTTPS

Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard web transfer protocol (HTTP) that adds a layer of security on the data in transit through a secure socket layer (SSL) or transport layer security (TLS) protocol connection. HTTPS enables encrypted communication and secure connection between a remote user and the primary web server. HTTPS is primarily designed to provide enhanced security layer over the unsecured HTTP protocol for sensitive data and transactions such as billing details, credit card transactions and user login etc. HTTPS encrypts every data packet in transition using SSL or TLS encryption technique to avoid intermediary hackers and attackers to extract the content of the data; even if the connection is compromised.

Define IS Planning

IS Planning - IS planning is about conducting projects for the planning, development and introduction of information systems in organisations. Decisions in this area have to be consistent with the corporate strategy and IS strategy. At the same time, they have a direct influence and effect on the operation of the systems.

Describe the Alignment of Business & IT

IT on business: Efficient, cost-effective, user-friendly and technically correct provision of the desired services Business on IT: Introduction of innovations that enable new services (e.g. app for registration with e-banking)

Define IT Outsourcing

IT outsourcing means that individual IT tasks, such as infrastructure, applications, processes or personnel, or the entire IT tasks are transferred to another company for a defined period of time on the basis of a contractual agreement. It includes outsourcing (external outsourcing), i.e. the transfer of tasks to a (legal) external company, as well as outsourcing (internal outsourcing) to a legally affiliated company.

When do we make data driven decisions

If a decision doesn't have enough structure to build a model. An IS can help by analyzing and presenting the data, often with help from data warehouses.

What is a combined primary key and some of its rules

If the primary key consists of several attributes, it is called "combined primary key". A combined primary key must be minimal: it is minimal if the uniqueness is lost when removing any attribute from the combination. Combined primary keys often consist of secondary keys.

Define Individual Software

Individual software is developed especially for a single company and a specific task.

What is the main objective of OLAP Tools

Information aggregation to inform decision-makers

What is the Information Basis of Computer Supported Corporate Planning

Information-basis: Summarized information (Executive Information System (EIS)) from administration and disposition systems.

2 Reasons Why IS Management is Nowadays an Important Component of (Almost) Every Company

Integral - Today's business models often contain an important technological component (IT) without which certain services would not be possible. Competitive Advantage - Information systems are often used to achieve business goals or to differentiate from competitors (e.g. by realising a cost leadership or differentiation strategy*).

Define Computer-Supported Corporate Planning

Integrated planning of the production, financial, sales, procurement and personnel areas, taking into account the company's objectives. Integration can take place on the basis of successive planning or simultaneous planning; individual and overall plans are drawn up. Information-basis: Summarized information (Executive Information System (EIS)) from administration and disposition systems. Methodological principles: Simulation models, time series analysis, optimization models (e.g. linear optimization) etc. Tools: Special planning languages and methods are sometimes used for corporate planning. In addition, the use of external databases has become increasingly important.

3 Benefits of Basic knowledge in the area of IT management

It helps you to understand how collaboration can and should work in the company. You can place IT management strategies in the context of the company, understand them and question them critically. You know the necessary steps to be able to derive concrete measures for their implementation from goals and IT strategy.

What differentiates Primary Storage from other storages

It is directly accessible by the CPU, it is volatile, and it is non-removable

What information is needed in an (Executive) Information System

It is necessary to include information in the system, which supports the tasks in the "management cycle". 1. Setting objectives: Orientation information, information derived from internal and external situation analyses 2. Planning and decision: Information for planning and decision support 3. Realization: This is not an actual management task. The implementation of plans and decisions is delegated to the operational level. Therefore, no information is required in the EIS. 4. Controlling: Information for the comparison of target/actual data (absolute and percentage, also cumulative)

Define stock data

Large data sets such as stock volume, actual data and target data, performance indicators (KPIs)

3 Main types of strategies

Low Cost, Differentitation (quality, innovation, customer care), and niche

Why would we be for Standardization of Processes Based on Standard Software

Lower costs and higher availability (IT components, Service Provider, Consultant Qualified employees, Training) Higher investment security, as survivability increases with the number of installations

Define Management Information System

MIS is a software system that provides management with information for the preparation of strategic or tactical decisions. These are aggregated from data from the computer-supported administration system and computer supported disposition system. Management Information Systems (MIS) form the basis for computer supported corporate planning.

Do companies overspend or underspend on IS security? Why?

Many companies overspend, according to the probability calculations. They do this because the probability calculation understate the true damage of a breach (cost of a rare event can be crippling). Another reason for the overspend is that security decisions are often made by technical professionals and their reputation is on the line. However, security has no visible benefit, which could make it hard to raise funds.

What are the four types of business data

Master data, modifidata, transaction data, stock data

What are the methodological principles of Computer Supported Corporate Planning

Methodological principles: Simulation models, time series analysis, optimization models (e.g. linear optimization) etc.

Why can Microsoft limit your rights with Microsoft Office?

Microsoft office is a type of Off-the-shelf software / package of applications. Rights are limited because you don't buy the software, you buy a license to use it. Most software is licensed, not sold.

Compare and Contrast Mid-Sized Systems and Mainframes

Mid-sized Systems - Multi using, 20 to 100 work stations connected. Central data storage, central application servers for departments or small companies, control systems for technical processes. Often used operating systems: Unix, Linux Mainframes - Multi using. Up to thousands of terminals. Computer centres of large companies and public authorities. Often used operating systems: Unix, Linux

Describe the Client Server Model of the Internet

Most Internet services are based on the client server model. The client program establishes the connection to a server (servers wait for incoming requests). The server executes the desired service and transmits the data to the client program. In order to understand each other, servers and clients use a common protocol.

Discuss Application Security

Most database access is via an application, hence failure to protect application access opens a door to a database. Web applications are prime targets for several reasons: - Web based applications are exposed to the internet. Attackers can easily discover them and look for vulnerabilities. - Web sites are refreshed frequently to attract and retain users. This leads to shortcutting software test and control procedures. - Web applications often include off-the-shelve software, business or contractor developed applications, and open-source components. The variety and complexity of these components, and the unfamiliarity of system developers with their insides, can hinder software testing.

Define Network Virtualization

Network resources are distributed or combined into logical units regardless of physical conditions (e.g. VPN + Load Balancing + Failover).

Describe the Relevance of Legal Foundation in IMS

New (digital) business models are often based on personal data: Google: Collection of places where someone was, interests, search history (for targeted advertising); Facebook: Links to other people, interests, places visited (for targeted advertising) etc. When developing new products or business models, you need to know what is allowed and what not and what to pay attention to (data protection and data security).

Describe the data analysis method in OLAP

OLAP relies on human user to ask increasingly informed questions until analysis is complete. Its a method of accessing data warehouses.

What is the External View in 3 Tier Architecture

Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network. This sends content to browsers in the form of HTML/JS/CSS. This might leverage frameworks like React, Angular, Ember, Aurora, etc.

What are the two ways of deploying application systems

One can either Purchase / Procure (off-the-shelf) software via buying standard software or renting Or one can make (individual software) via external or internal IT development or End-User Computing

Define OLAP (they use Data Cubes)

Online Analytical Processing; Query method, Essentially End-user tools that are so easy to use that they can only be used occasionally - Linking query and analysis - Evaluation of data according to different dimensions (multidimensional access) - Multidimensional key figure determination, for example, by region, period, product group

What is the significance of database management for organizations

Organisations create and use data in business processes, in application software, and in exchange with other organisations. Therefore, data has to be stored reliably and retrieved and accessed easily.

What is the O in B.O.A.T. Model

Organizational View (Process View) - Detailed business processes, process links among the involved parties, assessment of process quality

Define Mobile Operating Systems and list some of their necessary optimizations

Perform the same tasks as other operating systems but naturally have optimizations and extensions that are necessary for mobile devices such as smartphones such as: Strong connection to the mobile network modem, Full integration of touch functionality, Energy saving possibilities (resource distribution to programs -limited multitasking)

List concerns with ERP

Price (initial and maintenance) Customization is complex and could take ages Implementation and training is time consuming and expensive Technical staff may leave after receiving training for higher paying jobs

Contrast Privacy and Security

Privacy is keeping personal or confidential information out of the wrong hands Security is the protection of data. Privacy relates to any rights you have to control your personal information and how it's used. Think about those privacy policies you're asked to read and agree to when you download new smartphone apps. Security, on the other hand, refers to how your personal information is protected.

What is Query Concept 'projection' in SQL

Projection is the selection of individual attributes (columns) of a table. Example: SELECT A_Kontakt.Nachname, A_Kontakt.Vorname FROM A_Kontakt;

What is the purpose of IS Planning

Purpose of IS Planning - 1. Plans the use of IT in the company. 2. Decisions have a direct influence on IT Operations. 3. Medium-term planning of the use of IT in the company (planning horizon of one to three years)

What are the Purposes & Tasks of IT Operations Management

Purpose: - Supports (existing) business processes, products and services of a company - Planning the operative tasks of IT operations (planning horizon of max. one year) Tasks: - Assurance of the operation of all application systems in the company - Maintenance and repair - IT security - IT controlling - Cost-benefit comparison

Define Software Quality and When it can be ensured

Quality is the set of characteristics of software that are suitable to meet defined requirements. Software quality can be ensured both during the development process and on the basis of the quality of the end product.

What are 4 Potential Benefits of Business Process Management

Reduce costs: Avoid redundancies in the functional areas (= the same activities performed several times, e.g. control activities) Increase sales through improved customer orientation Increased efficiency through process automation (e.g. workflow systems) Better comparison through standardized processes (benchmarking)

What are 4 problems with data

Redundancy, inconsistencies, errors, extra work

6 Most Important Data Protection Obligations for Organisations

Register data collections: Under certain conditions, data collections have to be registered. Under Swiss law, a data collection is any set of personal data that is structured in such a way that the data can be accessed by the affected persons. Ensure accuracy: Ensure that the collected or purchased data is correct. Every person affected may request that inaccurate data be corrected. Purpose: Data must only be used for the purpose indicated (e.g. sending newsletter) or for the purpose legally required. Duty to inform: Affected persons must be able to recognise that data are collected and for which purpose they are processed. Personal data requiring special protection: Data about religious and political views, health, race, etc. require special protection. When processing these data, the consent must be given explicitly. Obligation to provide information: Organisations have to communicate the persons affected, which data on him or her is stored in the data base and for which purpose the data are processed.

How are relationships between relations established

Relationships between relations are established using primary and secondary keys.

What are some rules of relationships between relations

Relationships between relations are established using primary and secondary keys. A relation can contain any number of secondary keys. Primary and secondary key attributes must have the same data type (but do not need to be named the same). If no input for a secondary key attribute is required, this attribute may also contain NULL values. But: Secondary key attributes that belong to a combined primary key must never contain NULL values

Give some characteristics of SQL

SQL is the most widely used language for relational database systems today. The 1st prototype developed in 1970 by E. F. Codd, in 1986: 1. Standardization by the ISO, 1989 to today: further standardizations. It is a small instruction set and relatively easy to use. Queries return results in tabular form. Manufacturers of DBMS provide proprietary extensions to "pure" SQL. Manufacturers implement different "dialects" (syntax slightly different).

What is SQL Used For

SQL is used to communicate with the database management system (DBMS). SQL Is a programming language with commands for defining and changing a database and to query, evaluate and modify data in a database. Essentially, storing and retrieving data in relational databases.

What is an Information Security Policy

Security policies are needed to ensure people do not, through ignorance or neglect, behave in a manner that threatens the security of information resources. Policies deals with general principles. It covers the need to protect corporate data, that this need is everyone's responsibility. It also states who is responsible for making sure the policy is followed and the penalties for violation.

What is the query concept selection in SQL

Selection is the selection of certain rows (data records) as a subset (subset) of a table. Often a projection is made at the same time, i.e. only certain columns (attributes) are selected. Example: SELECT A_Kontakt.Nachname, A_Kontakt.Vorname FROM A_Kontakt WHERE A_Kontakt.Geschlecht="weiblich";

List Characteristics of Cloud Computing

Self-allocation - of services from the cloud by users, which should be available on demand (self-service provisioning/As-needed availability). Scalability - offers the decoupling of usage fluctuations and infrastructure restrictions Reliability and fault tolerance - guarantees permanently defined quality standards of the IT infrastructure for the user (reliability and fault-tolerance). Optimization and consolidation - offers efficiency and economy in line with ongoing environmental protection standards that can be successively optimized by the cloud service provider (optimization/consolidation). Quality assurance and quality control - can be continuously monitored and ensured by the service provider without burdening users (QoS-Quality of Service).

Define Community Cloud Service

Sharing a cloud across multiple organizations, such as organizations in a specific industry. To achieve this, several private clouds are combined to form a community cloud, which all organizations have access to and can thus save costs. Used e.g. by several municipal authorities, universities, companies with similar interests, research communities.

Define Embedded Systems

Small systems, partly little power. Examples: control systems in washing machines, dish washers, SmartTVs. Often used operating system: Linux

Define Storage Virtualization

Storage space is provided regardless of physical limits. Resources are either shared (e. g. partitions on a hard disk) or grouped together in pools and logical drives that can contain multiple hard disks.

SAM Model - Strategy Implementation / IT Alignment Approach

Strategy Implementation / IT Alignment - This perspective views the business strategy as the driver of both organizational design choices and the logic of IS infrastructure (classic hierarchy view of strategic management). Top management is strategy formulator, IS is strategy implementer.

Describe the 4 Levels of Business IT Alignment

Strategy: Business and IS Strategy Culture: IT employees need to understand business and vice versa Structural: departments, committees, etc. (e.g. business analysts in the specialist department and their counterparts; e.g. application managers in the IT department) Architectural: IT architecture and business process architecture

What is big data and what are its three main characteristics

Structured, semi, or unstructured data which has potential to be mined for information. Three main characteristics are: Volume - A shit ton of data Variety - structured, unstructured, audio, video, etc Velocity - Data must be analyzed quick

What are some Capabilities of a Decision Support System

Support for problem-solving phases Support for different decision frequencies (ad-hoc / institutional) Support for different problem structures: Highly structured, -Semi-structured, or Unstructured Support for various decision-making levels -Operational, -Tactical, -Strategic

Describe Swimlanes in BPMN

Swimlanes represent responsibilities for activities. Swimlanes can be organizations, roles or systems. BPMN distinguishes between two types of swimlanes: Pools represent participants in a cooperation. A Lane is a subdivision of a process (usually in a pool).

Define Domain Name

Symbolic name which equals the numeric IP address of a host computer connected to the Internet, e.g. www.fhnw.ch

What are the goals of Data Warehousing

Systematically merge data from different databases Organize data independently of the operational systems Create a suitable data basis for analytical, decision-oriented data processing Control the vast amount of data and flood of information.

Define TCP

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. Together, TCP and IP are the basic rules defining the Internet. OSI layer 4: Transport layer. Controlling and monitoring of the logical connection between sender and receiver (end-to-end communication). TCP "packs" and "opens" the data packets. TCP brings the packets in the right order. If packets have been lost, TCP ensures the retransmission. TCP/IP guarantees complete transmission. Examples of services using TCP: SMTP, HTTP

Contrast tactical and operational decisions

Tactical decisions are usually made by managers and commit part of the org for a while. Operational decisions are made by lower employees and on a regular basis with short term impact usually.

2 Challenges in Digitalization for Companies

Taking the customer's perspective; Accepting the competition in digitalization

What is the T in B.O.A.T. Model

Technical View - Involved system components, networks, data transfer

Define Business Model Canvas

The Business Model Canvas is a generalized model to describe a company's business model. It can be used as a mediator between different departments and it enables a common understanding. It should reduce complexity, but still be meaningful enough. The model is industry-independent and can be used everywhere.

Define the Internet

The Internet is a global computer network consisting of a large number of major international and national subnets as well as local area networks, all using the communication protocol TCP/IP (Transmission Control Protocol/Internet Protocol). Hundreds of thousands of individual networks, all of which use the TCP / IP communication protocol, are interconnected. Applications and services are based on standardised protocols.

What are the elements assigned to Computer-Supported Corporate Planning

The basis of this is formed by MIS. This is part of the computer-supported planning systems. It is the integrated planning of production, financial, sales, procurement, etc taking into account company's objectives. Elements: Information Basis (summarized info) Methodological Principles (simulation models, time series analysis, etc) Tools (special planning languages, methods, and external databases used)

Define Client Server Architecture

The client-server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Think of a restaurant: consists of one or more clients (clients), a server (contractor) and a communication service (network, intermediary).

Define Master Data

The consistent and uniform set of identifiers and extended attributes that describes the core entities of the enterprise including customers, prospects, citizens, suppliers, sites, hierarchies and chart of accounts.

What is the expected cost of a security breach

The cost if a breach occurs times the probability that it will occur. The costs of a breach include all the costs of recovering; compensating stakeholders for resulting damages; lost business from an outage; lost future business

Define Event-Driven Process Chain

The event-driven process chain (EPC) is a method for representing business processes in interaction with information systems. The EPC differs from other flowcharts in that it maps states as well as activities. It is a directed graph consisting of sequences of functions, events and link operators. The sequence of tasks (functions) corresponds to the control view of a system. The connections between the elements indicate the control flow. Each EPC diagram contains start and end states and, if necessary, additional intermediate states. States are reflected in the data characteristics of the process at runtime.

What are the 4 main types of Primary Storage

The four main types of primary storage are (1) register, (2) cache memory, (3) random access memory (RAM), and (4) read-only memory (ROM).

What is the ultimate goal of Normalization

The goal of the normalisation process is to design a database in a way that avoids redundancies. Relations that are in the third normal form are called normalised. The information contained therein is redundancy-free from a practical point of view.

Explain best practices in the context of operational IS management

The goal of this is continuous improvement of processes and performance of operational IT for the company. Measures: - Continuously determine and analyze the current status of IT operations. - Continuous further development of IT services. - Checking the use of new technologies. - Coordinate IT strategy and IT planning with corporate strategy and planning. - Creation of time schedules (roadmap) for the continuous further development of IT

Define OSI Model

The open system interconnection model, better known as the OSI model, is a network map that was originally developed as a universal standard for creating networks. But instead of serving as a model with agreed-upon protocols that would be used worldwide, the OSI model has become a teaching tool that shows how different tasks within a network should be handled in order to promote error-free data transmission. These jobs are split into seven layers, each of which depends on the functions "handed-off" from other layers. As a result, the OSI model also provides a guide for troubleshooting network problems by tracking them down to a specific layer.

Digital Transformation

The profound and accelerating transformation of business activities, processes, competencies, and models to leverage digital technologies

Describe a Recursive Relationship

The recursive relationship is a relationship type between the same entity type. That means the entities of the same entity type are related to each other. For recursive relationship types, the same rules apply as for relationship types between different entity types. Recursive relationship types can have the cardinalities 1:1, 1:n or n:m. Recursive n:m relationship types must also be transformed into two 1:n relationship types when they are transferred to the relation model.

Define architecture of an application system

The structures of the system, its components as well as their properties and relationships to each other

Define Interactive/Dialogue Processing Mode

The user defines the order step by step interactively. Examples: Check out in an online shop, Writing a single e-mail, Writing a document and formatting it, Gather customer data with the help of a form.

What are 4 Characteristics of Results Tables in Nested Queries

They have attributes such as a normal table (relation). But they do not have a primary key. They may have redundancies again. They usually have no relationship to other tables in the relational model.

What do we do with Recursive n:m relationship types before transferring to the relation model

They must also be transformed into two 1:n relationship types when they are transferred to the relation model

Describe Distributed Database

This database stores data in several places, while allowing users to access the data as a unit. Potentially higher performance (by spreading workload over several computers), reliability (some copies of data usable if other become unavailable due to failures), and control (more management over local data). Operates via partitioned / fragmented databases (parts of database in different locations) - Horizontal Fragmentation or Vertical Fragmentation; replicated (complete copy in more than one location) - synchronous & asynchronous; or federated (autonomous databases).

List the Two Central Goals of Strategy

To achieve sustainable competitive advantage over rivals and to ensure lasting profitability.

What are the tools used in Computer Supported Corporate Planing

Tools: Special planning languages and methods are sometimes used for corporate planning. In addition, the use of external databases has become increasingly important.

What are 3 approaches to using ERP

Traditional (most orgs): License software and use it on own computer SAAS: Use ERP on demand. Lower costs, easier installation, but could offer less flex for customization. Makes more sense in the coming future. Licensing ERP software to be operated by the ERP vendor or third party.

Describe Data Validation in Transaction Processing

Transactions begin with input from an external source. Before its processed, the input must be validated. Nearly all data starts with manual entry.

What 4 Aspects are of High Importance in Business Engineering

Transformation management Separation of design levels Holistic nature Engineering approach

Define Computer-supported Cooperative Work (CSCW)

Tries to understand social interaction and outlines, develops and evaluates information systems to support social interaction. Goal: Improving group communication and work processes Cooperative work means the joint processing of a task by a group or a team. A distinction can be made between: - Conference Systems - Common or Shared Workspaces - Workflow Management Systems - Document Management Systems

Define Workflow Management

Type of CSCW focusing on control and automation of structured processes e.g. transaction processing. Characteristics are: Larger groups, structured processes, many repetitions, the coordination process is known in advance, and communication can be planned.

Define Workgroup Computing

Type of CSCW focusing on information sharing and coordination of unstructured processes e.g. group work, teamwork. Characteristics: Smaller groups, unstructured processes, none or few repetitions, ad hoc development of the coordination process, ad hoc communication.

Extended Event Driven Process Chain

Various explanatory notes can be added to a process mapping based on the EPC. The extended event-driven process chain (eEPC) can address other aspects of the data view, the organizational structure view and the system view. The description of an information system in the views Control, Functions, Data and Organization corresponds to the ARIS method.

Distinguish Between Horizontal & Vertical Applications

Vertical applications are useful only for a segment of the economy (manufacturing, healthcare, etc) Horizontal Applications is useful in a wide range of industries (accounting, payroll, etc) like word processing and spreadsheets. These are support activities in the value chain.

How is data processed into information

Via computation (carrying out predefined process on two or more data items) or via comparison

Define VPN

Virtual Private Network (VPN) is a technology that allows data to be transmitted over an encrypted connection (secure tunnel). Through this tunnel, a remote computer can gain access to a company's private network and access internal resources. The connection is established between a VPN server (for example, FHNW location) and the installed VPN client on your device. That means, a VPN client must be installed locally on the computer. VPN clients are often available for download for various operating systems.

Describe WHERE in SQL

WHERE specifies what conditions a record must fulfil for being displayed or further processed.

What are some criteria that helps us decide what Application System to use

What Business area / process area (HR, Finance, etc) Is it used by customers or internally standardized vs customized / individual systems Architecture (client-server, SAAS, installation on PC); Devices used (tablet, smartphone, mainframe, PC, Apple) Specific devices (ATM, Navigation system); According to licenses (open source software, freeware, etc.) Customization options available or not?

Define Packet Switching

When data that is broken down into packets is sent through different routes and reassembled by the recipient. No physical, but only a virtual connection between the data stations. Data (including voice) is sent in the form of standardized packages. Switching units store packets and forward them. Packets can take different routes (routing). Overhead in the form of address information, order of the packages. Higher utilization degree of the networks, but delays in case of heavy usage.

When do we make simulation based decisions (part of model driven decisions)

When the behavior of a complex system cannot be predicted by a mathematical formula that one might put into a spreadsheet, even allowing for statistical variability in the input data.

Define 3NF

When the table is in 2NF and none of the columns are transitively reliant on another. A relation is in the third normal form, if it is already in the second normal form and all attributes, which do not belong to the primary key, only depend on this. That means: Attributes within a relation are functionally dependent only on the primary key. and there are no other functional dependencies among each other.

What are the Primary Activities of the Value Chain

inbound logistics, operations, outbound logistics, marketing and sales, service

What are the Support Activities of the Value Chain

procurement, technology, human resources, firm infrastructure

Discuss Power Protection in Physical Outages

The simplest solution is to install an uninterruptible power supply (UPS). It contains a battery or flywheel which runs protected systems for a few minutes at most (longer than nearly all power outages). If the outage lasts longer the UPS gives time to shut down protected systems in an orderly fashion or switch it to alternate power. Other protections include standby generators, bringing power from more than one utility substations, or burying cables instead of using overhead wiring (protect from storms).

Define Data Warehouse

Warehouse for data, collection of prepared data for analyses and reports for management, synonym Data warehousing emphasizes the capture of data from diverse sources for access and analysis rather than for transaction processing.

What is Web 2.0

Web 2.0, the Social Web, differs from the original World Wide Web in that most content comes from sites' users, not their owners. Any site can add web 2.0

Describe JOIN in SQL

With JOIN, the data records from several tables can be linked via attributes.

Define Full Dependency

An attribute B is then fully dependent on an attribute combination A, if B is functionally dependent on all attributes in A and not only on some of the attributes in A.

Define Enterprise Application Systems

In the broader sense, the totality of all programs for a specific business application or specialist area.

Define Proprietary Software (Licensed Software)

Software is protected by copyright and a license agreement must be signed with the author/legal owner (software manufacturer) for use.

What are the Direct Costs in IT Operations

1. Acquisition costs for hardware and software 2. Costs from maintenance contracts with manufacturers or service providers 3. Costs for IT infrastructure (networks, servers) 4. Planning and implementation of training courses 5. Disposal expenses

What 4 things does Privacy require

1. An understanding of what information is considered personal or confidential 2. An understanding of who 'the wrong hands' refers to 3. A policy that states these clearly 4. Security to enforce the policy. Privacy is meaningless without security to ensure it.

List the 3 steps in data modeling

1. Capture and description of the objects (real objects, abstract objects, events) 2. Capture and description of the relations 3. Depiction of entity types and relationship types

List 6 advantages of IT outsourcing as IT Strategy

1. Costs 2. Staff 3. Risk 4. Concentration 5. Finance 6. Technology / Know-how

What encompasses the Model of a Three-tier Client-Server Architecture

Clients are connected via a network to an application server which is connected via network to a database server

What are some Questions Regarding the Requirements for Setting up an (Executive) Information System

1. What information do we need / included in the system 2. How should the data be obtained, prepared and made available? 3. In what form should the information be provided? 4. How should the system be developed and implemented?

Differentiate Between Single User and Multi User Operation Mode

1 user example - desktops, laptops. This is a poor use of resources More users - Several computers are connected to a central computer at the same time. Examples: thin clients connected to a web server, web server connected to different applications. Preconditions: Multi-programming, high performance of the central computer. Disadvantages: complex, higher system requirements

List the 7 layers of the OSI model

1-Physical / 2- Datalink / 3- Network / 4- Transport / 5-session / 6- Presentation / 7- Application

Describe Some Enterprise Modeling Types

(Organization) Business process modeling gives professionals a bird's eye view of a particular business process in order to help with change management. Data modeling helps database administrators and others to more efficiently plan methodology for the use, storage and recall of data, one of a contemporary business's largest assets. Another kind enterprise modeling is function or activity modeling, which can help provide a visual demonstration of work flow.

What are 4 Types of Conference Systems

- Asynchronous computer conferences: conversations at different times, mainly based on e-mails which are managed by the system; - Real-time computer conferences: synchronous conferences, documents or programmes are manipulated simultaneously by several users; - Teleconferences: synchronous conferences, physically distributed users are being connected via audio and video, manipulating documents or programmes is not possible; - Desktop video conferences: synchronous conferences, a combination of real-time computer conferences and teleconference

List 6 Benefits of Computer Networks

- make manual data exchange unnecessary - allow access to data from anywhere - help in avoiding duplication - enable communication via different channels - allow the shared use of resources (printers, scanners, files, etc.) - enable the automatic data exchange with customers, suppliers, partners, e-business

What are some Indirect Costs in IT Operations

1. Costs due to PC failure (Personnel costs in lost business activities) 2. Adaptation of software by the user 3. Costs for air conditioning and electricity 4. Self-help and occasional training 5. Migration costs from the old system to the new system 6. Loss of efficiency in the initial phase of a new solution

4 Advantages of Storing Data in Databases

1. Data organisation in databases: Database management system is between applications and database files meaning a separation of data and applications. One or more applications indirectly access data stored in databases. 2. Data independence: Data can be processed with any application via standardised interfaces 3. Flexible data analyses: Logical data models allow flexible analyses 4. No redundancies: Redundancy-free database basically possible. A very high degree of redundancy (achieved through normalisation) might be inefficient.

4 Disadvantages of storing data in data files

1. Data organisation with files: Files containing data records are stored with unique naming on a physical storage medium managed by the operating system. 2. Application dependency: Files can only be opened and edited with specific applications (e.g., Excel spreadsheets with Microsoft Excel or LibreOfficeCalc). 3. High preparation effort for analyses: Merging and evaluating of data stored in multiple files is only possible through time-consuming sorting and searching. 4. Redundancy leads to inconsistencies and high maintenance effort: Several files with partially identical records. Here you have the danger of data inconsistency and high maintenance and modification efforts

What are the 7 Principles for the Design of Event Driven Process Chain (EPC) - Helpful to brainstorm what it looks like

1. Each EPC starts with at least one start event (or process interface). 2. Each EPC ends with at least one end event (or process interface). 3. An event is followed by either a function or a connector (exception: final event). 4. A function is followed by either an event or a connector. 5. Each function has exactly one incoming and exactly one outgoing edge. 6. Each event has exactly one incoming and exactly one outgoing edge (exception: start and end event). 7. A connector has either several incoming and exactly one outgoing edge or exactly one incoming and several outgoing edges

Describe the 5 Computer Categories and list them in Increasing Size

1. Embedded Systems 2. Mobile Devices - Single using. Examples: smartphones, tablets. Often used operating systems: Android, iOS 3. Personal Computers - Single using. Examples: desktop, notebook. Often used operating systems: Windows, Mac OS X 4. Mid-sized Systems - Multi using, 20 to 100 work stations connected. Central data storage, central application servers for departments or small companies, control systems for technical processes. Often used operating systems: Unix, Linux 5. Mainframes - Multi using. Up to thousands of terminals. Computer centres of large companies and public authorities. Often used operating systems: Unix, Linux

Identify the 5 different maturity levels based on the Capability Maturity Model

1. Initial / Ad-Hoc - Entrepreneurial management: Few activities are defined and success depends on the individual efforts and heroics. 2. Managed / Repeatable - Base-management: Basic management processes and controls are established to track progress. Discipline is in place to repeat earlier success. 3. Defined - Process Definition: Processes are documented, standardized and integrated within an organization wide methodology. 4. Quantitatively Managed - Process measurement: Detailed measures of the process and output quality are collected. The process and products/services are intuitively understood and controlled. 5. Optimizing: Continuous process improvement is enabled by quantitative feedback of the process and from piloting innovative ideas and technologies.

What are the 5 Problem Solving Phases

1. Intelligence - Collecting info leading to a realization that a decision needs to be made 2. Design - Alternative choices formulated 3. Choice - Pick an alternative 4. Implementation 5. Monitoring 1-3 are part of decision making

5 Advantages of 3 Tier Architecture

1. It gives you the ability to update the technology stack of one tier, without impacting other areas of the application. 2. It allows for different development teams to each work on their own areas of expertise. 3. You are able to scale the application up and out. A separate back-end tier, for example, allows you to deploy to a variety of databases instead of being locked into one particular technology. It also allows you to scale up by adding multiple web servers. 4. It adds reliability and more independence of the underlying servers or services. 5. It provides an ease of maintenance of the code base, managing presentation code and business logic separately, so that a change to business logic, for example, does not impact the presentation layer.

What are two goals of enterprise architecture management

1. Optimally align information technology and business processes with each other in order to secure long-term business goals. 2. Mastering the complexity of the IT landscape in order to react rapidly to changing markets.

List the 5/6 Steps of Strategy

1. Setting Goals 2. Internal and External Analysis; SWOT 3. Development of strategic alternatives 4. Strategic Choice - Action planning & Strategy selection 5. Implementation 6. Monitoring / Controlling

List the 5 Step Procedure For Designing and implementing Data models

1. Starting position is an application problem i.e. an expert requirement, described as text, as drawing, or in verbal conversation. 2. Creating the conceptual data model by means of modelling: Capture of entities with their attributes, composition of entity types; Capture and description of the relationships between entity types; Representation of entity types and relationship types using the entity relationship model 3. Conversion of the conceptual data model into a logical (relational) data model 4. Normalisation of the logical data model (check for redundancies) 5. Transfer of the logical data model to a database

Access To A Database Requires:

1. That a person be authorized to use the database. This is done via an admin process. 2. The IS authenticates that the person requesting access is who he claims to be. Done normally via password

What are the 4 categories of security failures

1. Uncontrollable external causes, such as natural disasters and power grid failures. 2. Human error. 3. Internal malicious attacks (by employees, contractors etc.) 4. External malicious attacks.

What is Methods Database, what are the methods and applications.

A Computer-supported collection of methods for solving economic, mathematical, econometric or statistical problems. The methods can be applied to models stored in a database. Typical methods provided by a method database include linear optimization, simulation or time-series analysis. Applications: E.g. in computer-supported business planning, production program planning, statistics, econometrics.

Define Multi Tier Architecture. Give advantages and common layers

A client-server architecture in which presentation, application processing, and data management functions are physically separated. Advantages: Layers are largely independent of each other and can be replaced if the new implementation offers the same kinds of services; the dependency between the components of a system is minimized; reusability, maintainability and portability are supported. Common Layers: Presentation, Processing, and data management

Define Private Cloud Service and list reasons for using it

A cloud service in which both providers and users are in the same company or belong to the same organizational unit. A company as an organization operates its own data center, using the services only for its own (business) purposes within its own private networks. The main reasons for this are: safety aspects - Control over the data remains with the users or within their organization; - Corporate governance i.e. the entirety of the organizational and content structure of corporate management and supervision and reliability, is thus also within their own sphere of influence; - Private clouds are only indirectly included in cloud computing.

Define Business Process

A targeted temporal-logical sequence or process chain of tasks (other terms: activities, business processes) that contributes to value creation for the company or is derived from the corporate strategy. As a rule, these processes are customer-oriented, which means that they also create value for the customer.

Define Public Cloud Service

A cloud service in which the providers and potential users are not in the same company or belong to the same organizational unit. It is a cloud that is publicly accessible and is usually distributed via a web portal, where users can specify the desired scope of services (calculation capacity, storage space, etc.) against payment or free of charge in self-service. Many of the tasks an enterprise performs in the private cloud itself are performed by a third-party provider in the public cloud. The tasks and services of different customers are jointly hosted, managed and processed on the same infrastructure (server, storage, etc.).

Strategic Alignment Model

A conceptual model that has been used to understand strategic alignment from the perspective of four components, i.e. Business Strategy, IT Strategy, Organizational Infrastructure and IT Infrastructure, and their interdependencies.

Define Data Mart

A data mart is basically a condensed and more focused version of a data warehouse that reflects the regulations and process specifications of each business unit within an organization. Each data mart is dedicated to a specific business function or region. Data Marts are easier to set up and easier to use than data warehouses.

Define Data Transmission System

A data station has the task of providing data for transmission, to receive data and all functions necessary for communication to be carried out. Data station consists of Data Terminal Equipment (DTE) and Data Communications Equipment (DCE). Two Data Stations Communicate via a transmission media and connecting interfaces. Computer to computer transmission, a type of computer system. Aka, computers, printers, etc. Connected by modems or networks cards.

What are 3 Requirements For Attributes in the Relational Database Model

A data type must be specified, at the latest when the attributes of the relation are to be transferred to a database system. Value range: Range of the possible values an attribute can take. Example: Length of a text, Values for numbers, dates Integrity rules: DBMSs control the values of attributes with the help of integrity rules. These can be rules for: Mandatory inputs, Standard values (e.g. current date and time), Valid value ranges (e.g. body size), Uniqueness (e.g. for primary keys)

Define Decision Support System (Decision Making System)

A decision support system (DSS) is an organized collection of people, procedures, software, databases, and devices used to make decisions that solve problems. Focus of a DSS is on decision-making effectiveness when faced with unstructured or semi-structured business problems. Computers improve the quality and efficiency of decisions.

Define Capability Maturity Model

A development model created after a study of data collected from organizations that contracted with the U.S. Department of Defense, who funded the research. The term "maturity" relates to the degree of formality and optimization of processes, from ad hoc practices, to formally defined steps, to managed result metrics, to active optimization of the processes. The model's aim is to improve existing software development processes, but it can also be applied to other processes.

Describe the Task/Function Element of the Event-Driven Process Chain

A function is a task or activity. A function is executed on an (information) object to support one or more company goals. Among many other synonyms, activity, process step, action, or operation are used. Representation of functions - Functions are rectangles with rounded corners. The naming convention provides that standard EPC functions call the information object in the nominative singular and the verb in the infinitive, e.g. "Check stock".

What is Information System (IS) Strategy and what questions does it answer?

A functional strategy below the corporate strategy. It answers the question: How should IS and IT be oriented in the long term? It is becoming increasingly important as IS and IT are a central components of a company. IS Strategy can be developed together with or derived from the corporate strategy. IS Strategy is not just an IT matter: the involvement of management and specialist departments is necessary in every phase. It must make early assumptions about market development and technologies. A popular tool for this is the Gartner Hype Cycle.

Define Packet Switching

A fundamental concept of the Internet is packet switching. In packet switching, messages are broken up into packets of about 1,000-2,000 bytes each. Packets are numbered and sent individually. When they arrive, they are reassembled by number. When an entire message is available, it is delivered to its destination. Packet switching lets computers share a network efficiently.

Define Batch Processing Mode

A general term used for frequently used programs that are executed with minimum human interaction. Batch process jobs can run without any end-user interaction or can be scheduled to start up on their own as resources permit. The completely defined order (job) is placed in a queue. The computer processes one of these orders after the other. Examples: Printing systems, Serial e-mails (e.g. newsletter), Automatic creation of invoices. Most applications use Online Transaction Processing instead of Batch Processing

Define Business Process Model and Notation (BPMN)

A graphical representation for specifying business processes in a business process model. One goal of BPMN is to provide a simple process notation that is easy to understand. A small set of elements (activities, events and gateways) with clearly distinguishable shape (rectangle, circle, diamond) BPMN has two, partly contradictory objectives: - Easy-to-use process notation for business users and business analysts - Possibility of translating models into executable form

Define System

A group of components that work together inside a boundary to accomplish a purpose

Describe Recursive Relationship Types With 1:1 Cardinality

A marriage between two peopleis a 1:1 relationship. In the relation «Persons» the secondary key «PartnerNo» refers to the primary key «PNo» in the same relation. Short form of the relation: Persons (PNo, Name, Firstname, PartnerNo)

Define Publish Subscribe Architecture

A messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers, but instead categorize published messages into classes without knowledge of which subscribers, if any, there may be. Similarly, subscribers express interest in one or more classes and only receive messages that are of interest, without knowledge of which publishers, if any, there are (Think Google alerts).

Define AIC (availability, integrity and confidentiality)

A model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people

What are Porter's Five Forces

A model that identifies and analyzes five competitive forces that shape every industry, and helps determine an industry's weaknesses and strengths. Threat of new entrants, customer bargaining power, supplier bargaining power, threat of substitutes, all affecting rivalry among competitors

What are 3 Types of Nesting

A previously saved query is used as the data source. A query is entered directly in a query (e.g. in the SQL editor). A query is used to filter records (as a criterion).

Define Software as a Product (SaaP)

A product, software, which is made to be sold to users, and users pay for licence which allows them to use it. Microsoft office is an example of this.

Define Business Reengineering

A radical process change, usually enabled by new technology. ERP systems can spurn this, completely changing or eliminating some business processes

Define Redundancies

A redundancy is multiple storage of the same information. Redundancies sooner or later lead to memory anomalies (change, deletion and insertion anomalies) and thus to inconsistency of the data (data is no longer unique).

Define First Normal Form 1NF

A relation is in the first normal form, if in each table cell only one value is contained and if all attributes are atomic (indivisible). In this, we have single valued attributes/columns, values should be of some domain, and all columns have unique names, and the order of data storage does not matter

Define second normal form.

A relation is in the second normal form if it is in the first normal form and all attributes that do not belong to the primary key, fully depend on it and are not already determined by a part of the key. Basically, 1NF form and it does not have functional dependency on part of a candidate key.

Define Value Chain

A set of activities that an organization carries out to create value for its customers.

Define Shareware

A software License which can first be tested free of charge. After a certain period of time, use is subject to a fee (usually quite cheap). Or: Parts of the functional scope of the software can be used free of charge, but full use is subject to a fee.

Distinguish between a solution architect and enterprise architect

A solution architect looks at one specific process or problem An enterprise architect looks at the enterprise as a whole and how to benefit it

Define Strategy

A strategy is the way, behaviour or procedure that is chosen in order to achieve the organisation's goals. Strategy is concerned with the long-term (4 to 8 years) and mid-term (2 to 4 years) direction of the company. Strategy is about achieving unique positioning against competitors and deploying the necessary resources. As a consequence, strategy means to choose between different directions and between different ways of deploying resources.

Define Enterprise Modeling

A term for the modeling of various processes, infrastructures, asset groups, or other elements of a business or organization. Various kinds of enterprise modeling help analysts or others to accomplish different tasks. Business process modeling, Data modeling, function or activity modeling, etc. A major part of the utility of enterprise modeling is related to the value of visuals in planning. By effectively representing structures, processes or hierarchies visually, planners can get much better information about a business and what changes would look like. Enterprise modeling software helps by automating a lot of what would otherwise have to be done manually to work up detailed and sophisticated models of complex business processes such as supply chains.

Define 3 Tier Architecture

A three-tier architecture is a client-server architecture in which the functional process logic, data access, computer data storage and user interface are developed and maintained as independent modules on separate platforms.

What are the sequence of activities in Transaction Processing?

A transaction is any business activity that affects the database. Sequence is: 1. Obtain Input from an external source, usually a person 2. Read additional information from a file or database 3. Calculate new data 4. Store updated record

Define open source software

A type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Examples are firefox, openoffice, etc. Source code is open and usually accessible free of charge via the Internet. - Additions and extensions are allowed. - Copying and passing on to third parties is permitted. - The developers or a developer community usually maintain the software. - The developers waive license fees, in return improvements and discovered errors are made available to the general public by the users.

Describe Federated Database

A type of distributed database (data stored in several places) which consists of multiple autonomous databases, each of them accessible independently of the others, that provide controlled access to all their data as a whole. e component databases of a federated database may di er in their internal structure or in other ways. Federated databases are most common when multiple databases were combined.

Describe Replicated Database

A type of distributed database (data stored in several places) which keeps a complete copy of the database in more than one location. These copies are updated when one copy is changed. Two Types: With synchronous replication, copies are updated immediately. This requires complex software and a great deal of computing power. Each organization must decide what to do if some copies cannot be updated right away for any reason, such as failure of the computers on which they reside or the network connections With asynchronous replication, copies may be updated later. If there is a master database, all the locations will eventually match it. If not, a conflict resolution process is necessary to deal with independent changes. For example, a database might store a document that can be edited by several people. If two people edit a paragraph at about the same time, the DBMS must figure out how to handle the update. It may require human intervention, so asynchronous replication is not a good way to store critical corporate data.

Describe the Activities Event in BPMN

An activity describes an action that is performed during the process. Activities are displayed as rectangles with rounded corners. Colors are not predefined. Two types of activities: Tasks (elementary); Sub Processes (can be shown expanded) A task is a unit of work. An additional [+] marks an activity as a collapsed sub process.

Name some requirements for databases

Access rights, analyses, speed, security

Define Virtual Machine Monitor

An OS that mimics the behavior of a real computer is called a hypervisor or virtual machine monitor (VMM), because it creates imitations of real machines called virtual machines. A VMM can run several OSs (called guest OSs) at the same time, just as an OS can run several applications at the same time.

Define Transitive Dependency

An attribute C is transitive dependent on an attribute or attribute combination A if the non-key attribute B is dependent on A and the attribute C is functionally dependent on B, but A is not functionally dependent on C.

What is an attribute in a Relational Model

An attribute is an ordered pair of attribute name and type name. An attribute value is a specific valid value for the type of the attribute. This can be either a scalar value or a more complex type.

Define Secondary (Foreign) Key

An attribute that is related to the primary key attribute of another relation. This is used only to connect tables.

Define Architecture of Integrated Information Systems (ARIS)

An enterprise management framework that offers methods and techniques for management of business processes. The approach helps in organizing information and data in five forms or views: Data Function Organization Output Control

Describe the Event Element in BPMN

An event is something that happens during a process run. It starts, interrupts or ends a process (trigger). Events are represented as circles, with different frames for Start event, Intermediate event, and End event. In addition, a distinction is made between different types of events.

Recursive Relationship Types With n:m Cardinality

An items list describes how a product is composed of other products or parts with lower production levels. Products and parts in an items list are usually a n:m relationship. Many products / parts contain many product / parts. 1 Product / Parts contains many components, many components are part of 1 product / part. Short form of the relation: Products/Parts (ProductNo, Description) Components (SuperiorNo, SubNo, Quantity) In the relation «Components», the secondary keys «SuperiorNo» and «SubNo» refer to the primary key «ProductNo» in the relation «Products»

What is a trend in mobile OS market share in Europe

Android rose from 0% in 2009 to 70% today. Windows from 50% to nearly 0, Ios kinda stable, from 50% now to 30%.

TCP/IP Layers & Examples for Protocols

Application - FTP (FileTransfer) SMTP (E-Mail) HTTP (World Wide Web); Which kind of communication takes place? E.g., sending e-mails (SMTP) Host to host - TCP (Transmission Control Protocol); Which software is used for the communication Internet - IP (Internet Protocol); Which computer is addressed? Network or network access - Ethernet, Token Ring, FDDI; How are data transmitted physically? E.g., transmission via radio link or cable

What is the Conceptual View in 3 Tier Architecture

Application Tier (Conceptual View): Also called the middle tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing. Basically uses an application server and processes the business logic for the application. This might be written in C#, Java, C++, Python, Ruby, etc.

7 Characteristics of Digital Transformation

Application of innovative technologies; shorter innovation & change cycle with parallel developments; Disruptive developments; Changes extend to society as a whole; Stronger individualization; greater involvement of the customer in development & production; Changed communication behavior

Define Nested Query

Aquery within another SQL query and embedded within the WHERE clause. A subquery is used to return data that will be used in the main query as a condition to further restrict the data to be retrieved. Subqueries can be used with the SELECT, INSERT, UPDATE, and DELETE statements along with the operators like =, <, >, >=, <=, IN, BETWEEN, etc.

Define Vertical Software and give pros & cons

Belongs to the standard application software for special requirements of a branch of industry available for almost all industries Advantage: usually cheaper and faster available than individual software, more specific than industry-neutral standard software Disadvantage: Possible technical problems, as the providers focus primarily on the content and often linked to specific hardware and system software

What are the elements of a SW cost-benefit analysis

Benefits vs Costs Benefits - Non-Quantifiable and Quantifiable (Monetarily assessable benefit & Non-monetary benefit) Costs - One-off & running costs

Define cloud computing

Cloud computing is the the use of various services, such as software development platforms, servers, storage and software, over the internet, often referred to as the "cloud."

Define IAAS

Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are made of highly scalable and automated compute resources. IaaS is fully self-service for accessing and monitoring things like computers, networking, storage, and other services, and it allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright.

Define PAAS

Cloud platform services, or Platform as a Service (PaaS), provide cloud components to certain software while being used mainly for applications. PaaS provides a framework for developers that they can build upon and use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain management of the applications.

Models - Why Do we Use Them & What is The Benefit

Companies and administrations must not only organize their data and information, they must also define how they want to work with these data and information and generate a benefit from them. The benefit is the result of activities carried out by means of socio-technical systems. This system must be optimally designed and implemented.

Name some requirements for DBMS outside the view of the user

Data independence: Data is independent of the application programs, the logical data organization is independent of the physical data organization, and data storage is independent of the system platform (operating system, hardware) Usability: Easy to operate via graphical user interface, easy handling of data Multi-user Access: Avoidance of conflicts of concurrent access by multiple users Flexibility: Ability to add and modify objects and attributes without the danger of causing data inconsistencies Efficiency: Good responding time, fast processing Data protection: Protection against unauthorised access to data and data misuse Data security: Avoidance of system, software and hardware errors Data integrity (data consistency): Data are complete, right and free of contradictions Non-redundancy: Every data element and every value exist only once

What are Flat Files Databases

Databases consisting of a single table. These contain files, records, fields, and characters. They are simple to create and easy to use but increase redundancy and inconsistencies, are time consuming, and limit how much data can be recorded. Acceptable for applications of limited scope with small files.

List some forms of data output

Direct data output, such as screens, printers, etc. Can be acoustic, visual Indirect data output

Define Document Management Systems

Document management systems generally deal with the management of coded and non-coded information (digital and non-digital). The term document retrieval is also common (based on text retrieval). Since document management systems can considerably support process control, they are often introduced together with workflow management systems.

Define Domain Name System (DNS)

Domain names are used to make the handling of IP addresses easier. Domain Name Servers translate the domain names in the IP address. This addressing system is called Domain Name System (DNS). Domain names have a hierarchical structure. Their level increases from left to right: - www.fhnw.ch - hostname.secondlevel domain.toplevel domain

Describe the Event Element of the Event-Driven Process Chain

Each process has a start and an end event. An event is an occurred state that is relevant in the respective context. An event can trigger tasks, but it is passive and does not consume time or money. Representation of events - Events are represented as hexagons. The naming convention provides that standard events call the information object in the nominative singular and the change in status as a verb in the present or perfect participle, e.g. "Order received".

What are the steps in selecting software

Establish Requirements; Develop list of potential suppliers, then reduce this to a short list; Request for Proposal; Evaluate RFP via functional, financial, and benchmarking; Negotiate

What are the 4 Elements of the Event-Driven Process Chain

Event Function / Task Operator Control Flow

Define IP Address and Distinguish between IPv4 and IPv6

Every computer on the Internet has a unique numeric IP address. This uniquely identifies all computers on the Internet. An IP address (IP Version 4) consists of 32 bit (4 * 8 bit): Four numbers between 0 and 255 separated by dots -e.g. 216.27.61.137 -Number of theoretically possible addresses: = 4.3 bio.Nowadays, this is not enough anymore so transition to IPv6 IPv6 IP Version 6 uses 128 bit which increases the number of possible addresses. Eight blocks of 16 bit each, hexadecimal, separated by colons -e.g. 2001:0db8:85a3:08d3:1319:8a2e:0370:7344

Define Executive Information Systems

Executive Information Systems (EIS) have the task of providing managers (preferably at higher management levels, i.e. managers) with the relevant information to the management process in timelyand appropriate form.

List the 3 Modeling Elements of BPMN

Flow objects: events, activities, operators (gateways) Connecting objects (connecting objects) Participants (pools, swimlanes), artifacts and data objects This small amount supports the understanding of the models. However, there are a lot of specializations for each element.

Define Support Software

Helps develop, maintain or provide non-application-specific performance. Such as editors, compilers, virus scanners, firewalls, database management software)

Define ITIL

ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization for establishing integration with the organization's strategy, delivering value, and maintaining a minimum level of competency.

Define Hybrid Cloud Service

If both services from the public and private cloud are used together, we call it hybrid cloud. Although companies have their own private cloud, they also use services from the public cloud of external providers to outsource certain functionalities or load peaks. The main attraction is that the external provider can increase or reduce the required infrastructure and services faster and more cost-effectively if required. Regular operation is usually carried out via private resources, whereby it is also necessary to evaluate which functions or data are outsourced. The services are integrated into the private cloud in such a way that the end user does not notice the change of environments while working.

3 fundamental ways IS can make a difference to a company's success

Improving communication within the firm, connecting a firm with its suppliers and customers, helping people in the org make better decisions

Define Computer Planning Systems

In business data processing, a software system to support planning processes in poorly structured or complex problem situations on the basis of planning models (model bank). Computer-supported planning systems mainly determine plan alternatives and provide specifications for administration systems and planning systems. Computer-supported planning systems are closely linked to the use of database systems and planning languages.

Define Planning Languages

In contrast to universal programming languages, planning languages are required to support planning and reporting problems by suitable means of expression, e.g. by stocking financial mathematical functions (interest calculation, etc.), simple creation and modification of planning models, simple data manipulation, convenient evaluation tools (report generator, graphical display, etc.). The use of planning languages is often supported by end user tools.

Define referential integrity

In database modeling, referential integrity prevents any database changes that cause secondary key values to reference nonexisting records (primary key values). A record of a relation can not be deleted if the primary key value of that record is used as a secondary key value in a record of another relation. This ensures that references between records (built through primary and secondary key values) are preserved.

Define peer to peer architecture, identify its main advantage, and identify where we can find it

In peer-to-peer architecture, the individual devices (peers) communicate with each other. This can be done without a central control unit (pure P2P) or with a central control unit (hybrid P2P). An important advantage is the distribution of the load among several devices. Where can we find the P2P architecture? Video and audio conferencing, e. g. Skype (Hybrid); File-sharing networks, e. g. BitTorrent; Update functions, e. g. Windows 1.

Differentiate between Hardware Situation in Private or in Companies for Operating Systems

In the private area: Modern and fast computers, large selection In companies: Little choice and not the latest computer models What are the possible reasons for this? Each additional model needs its own software (driver) high initial effort. Each additional model can have different security vulnerabilities- risks to the company. Each additional model may require different kinds of support. high effort for support. Typical model life cycle in companies: three to five years.

Define Operating System

Includes all programs required for commissioning the computer. The hardware can only be used by the operating system, i.e. without an operating system the hardware cannot be used by a user. With regard to hardware, an operating system manages the resources of a computer, in particular the processors (CPUs), main and external memory, and peripheral devices (such as printers or mice). With regard to the application software, an operating system manages the user orders, checks the program sequences and provides a system for managing the data.

What are Backup Sites

Insurances can pay to rebuild a computer center in case of disaster, but will not pay for the loss of business in the months it takes to rebuild. Hence, companies need to have backup sites (hot sites / cold sites). Hot sites are fully equipped data centers that require only an up-to-date copy of an organization's database in order to take over its information processing (online in seconds to hours). Cold sites are prewired for high-capacity electrical power and communication services, air conditioning to remove computer generate heat, but are otherwise close to empty. Using this will still require software installation, movement of equipment, etc. Cold sites are less expensive but take longer to restart operations. Third-party backup site operators assume not all the customers will have data center failures at the same time, in order to spread costs, but this can go wrong in the case of large area wide disasters (Hurricane Katrina).

List benefits of ERP

Interdepartamental manual info transfer is reduced or eliminated Visibility in overall operation due to central database Data consistency (only stored once) Best practices Financial reporting is faster Cut costs in inventory, delays, etc

Define IP

Internet Protocol - OSI layer 3: Network layer. Setting up and disconnecting of the physical connection. Routing (finding the way). Confirmation of the receptivity etc. If the target computer is not in the same local network, a router forwards the traffic to a computer in the direction of the target destination. In the target LAN: Conversion of the IP address in the physical hardware address (e.g. a media access control address, MAC address for short) of the target computer.

Define Primary Key

Is a feature that can freely be assigned to one or more attributes, consists of one or more attributes, and uniquely identifies a record of a relation. This is used in the logical data model.

What Makes up an Application System

It consists of a user interface, business logic and a database. It has automatable tasks, software (and network), data, and hardware. It is part of an information system but differs bc of the automatable tasks and no people

Describe Lanes in BPMN

Lanes subdivide the participants of a pool. They usually represent organizational roles. Sequence flow can cross the boundaries of lanes. Information flow within a lane is modeled by data objects and not by message flows.

What are two problems with enterprise architecture management

Lengthy process: In the short term, additional costs arise, but in the long term savings result and thus higher profits. Several basic architectures must be coordinated with each other.

Define Logical Model

Logical ERDs also models information gathered from business requirements. It is more complex than conceptual model in that column types are set. Note that the setting of column types is optional and if you do that, you should be doing that to aid business analysis. It has nothing to do with database creation yet.

List disadvantages and risks of cloud computing

Loss of data; Data misuse (access by providers / other companies); Availability (network); Legal restrictions (e. g. banks); Lack of flexibility (standard products); Lack of transparency (you don't know what exactly is behind it); Dependence on provider (lock-in); Cloud provider discontinues service; Unclear financial benefits.

A database free of redundancies entails...

No data can be removed from a database without loss of information. Saves storage space and prevents memory anomalies

Define Secondary Storage

Nonvolatile storage such as Rotating Magnetic Disk (HDD); Optical Disks (CD, DVD), Solid-state storage (SSD), Magnetic tape storage used in bigger companies bc big capacity and cheap but really acts like a tape, enterprise storage subsystems combine multiple into one, cloud storage

What are Normal Forms

Normal Forms describe how Normalization takes place step by step from one normal form to the next. The normal forms are numbered: first, second, third normal form (1NF, 2NF, 3NF). To determine the degree of normalization, the relations must be examined. For this, the attributes of the relations are examined for the following aspects: the values of each attribute and the dependencies between the attributes in each relation

Why Denormalize A Database

Normalization can slow down a database. Database designers denormalize a table when the risk of errors is small, database performance is important, and the potential speed gains are large. Only the users of a database know what harm can come of bypassing normalization, thus they must be involved in this.

Drawbacks of Relational Databases in decision support applications

Not great for ad-hoc retrieval (ad-hoc used more in management) Slower than a database designed specifically for decision making (can be overcome with quicker hardware) Long query can tie them up for a long time, locking out transaction processing users until its complete

Define Functional Dependency

Occurs when the value of one (set of) attribute(s) determines the value of a second (set of) attribute(s). Attribute B is then functionally dependent on an attribute or an attribute combination A if a certain attribute value of A is related to exactly one attribute value of B. The attribute value of A therefore unambiguously yields the attribute value of B. Persons (PNo, Name, Firstname). A is Attribute PNo, B is attribute Firstname.

Distinguish between Off-the-shelf software and custom applications

Off-the-shelf software is purchased (someone else wrote) and used unchanged (most personal computer users buy this). Custom software is written for a specific person or company's use. Can be written by the company or outsourced. Takes time, money, risky, but can result in competitive advantage. Customized packages lie in between. Used when a need is common but details vary (expense reports)

Define Office Systems

Office communication systems, or office systems are application systems that support typical office activities with hardware, software and communication services. Since office activities are carried out in all operational areas of responsibility and functions, office systems belong to the cross-sectional or cross-functional systems. Depending on the operational areas of responsibility, the activities can also be classified according to management tasks, administrative and specialist tasks as well as support tasks. The goals of using office systems include cost reduction, productivity increase and strategic potential benefits.

What are the advantages of using Standard software vs customized (individual) software

Often lower acquisition costs than with individual developments (many customers virtually share the development costs) Expertise and experience of experts and users from various companies is taken into account and is virtually integrated into the software Continuous further development and maintenance of the software by the manufacturer Usually available quickly (immediately) Software can be tested and evaluated in advance (reference visits, free trial periods) Documentation is available, training material has been prepared Reduced risk of failure (software is tested and already in use in many companies)

What are artificial attributes

Often used as primary keys because attributes that describe properties or natural expressions are often not unique. Often the values of artifical attributes are unique numbers.

Define Pivot Tables

One of Excel's most powerful features. A pivot table allows you to extract the significance from a large, detailed data set. Unlike other forms of evaluation, such as partial results, pivot tables are absolutely flexible in the way in which data is prepared. The columns can be categorized according to their contents and arranged in crosstabs. Any pairings of evaluations can be created, at whose intersections totals, average values, etc. are generated.

Linux presence in Computer Categories

Only one to be present in all: mainframes, midsized, etc.

Distinguish between Open source applications and proprietary applications

Open source applications tends to be horizontal and comes in the form of thinks like OpenOffice and Apache Web Server Proprietary Application belongs to someone who controls who can use it and how much they have to pay to use it (could be free like Chrome).

Define Hadoop and its two steps

Open source framework managing big data processing and storage for big data apps. Step 1: Map - multiple computers analyze its part of the data; 2: Reduce Allows data analysis to be done very quickly

Define Circuit Switching

Physical connection between the callers or data stations for the entire duration of the transmission (including breaks). The callers or data stations have their own channel.

Define Planning Systems

Planning systems are application systems that support the planning process (analogous to the terms administration, disposition, control systems, etc.). Planning systems support the phase of the management cycle in which the measures and (planned) values required to achieve the corporate goals are defined for each business unit and for the entire company.

Describe Pools in BPMN

Pools stand for independent participants in a business model (collaboration), e.g. roles in a business model ("buyer" and "seller") or business entities ("Amazon" and "Google"). Each pool has its own process, i.e. a process is completely within a pool. Interaction between pools is represented by message flows. Sequence flow cannot exceed the boundaries of a pool.

Define Precedence Diagram Method

Precedence Diagram Method (Netzplantechnik) a type of model database, a graphical method for scheduling and cost planning of projects. Planning of a large number of successive activities, some of which take place in parallel. Representation takes place through graphs. Main representatives are the Metra-Potential-Method (MPM) and the Critical-Path-Method (CPM).

Define Data Security

Protection of Data! Data security includes all measures to ensure the integrity, availability and confidentiality of the data. (FDPIC, 2011) Analogies: IT security, building security

Define Data Protection

Protection of Persons! Data protection includes all measures to prevent unwanted processing of personal data and its consequences. (FDPIC, 2011) Analogy: personal protection

What are the 4 Key Points in Regards to Importance of Business Process Management

Quality management: An excellent organization has well-founded, well-defined and comprehensible processes Process optimization / business reengineering: Improvement of business processes with regard to costs, time, quality and to realize customer benefits Business information systems: potential for further process improvement through integrated information management Process automation/workflow management: control of the process flow, automatic provision of relevant information, start of application systems (Analogy: assembly line)

What is a Model Database

Quantitative (mathematical) models that are used to perform alternative calculations. Complex mathematical models of operations, such as matrix models, optimization models and simulation procedures (e.g. linear optimization with Excel Solver). Precedence Diagram Method (Netzplantechnik), a graphical method for scheduling and cost planning of projects (Business Process and Project Management module). Planning of a large number of successive activities, some of which take place in parallel. Representation takes place through graphs. Main representatives are the Metra-Potential-Method (MPM) and the Critical-Path-Method (CPM).

In what form should the information be provided in (Executive) information Systems

Representation: Tables: For detailed values; Diagrams: For fast acquisition of facts; Colors: Values in tables or diagrams with signal colors (red = bad, green = good, etc.) A distinction must be made whether the information -can only be queried passively. >Executive information system; can be processed with an end-user tool for variance analyses, forecast and trend calculations, portfolio formations, etc.. > Decision support system; can be analyzed with an application program, e.g. Microsoft Excel

Gartner Hype Cycle

Represents the position of a product during its life cycle of publicity or "hype". The Gartner Hype Cycle shows which technologies are currently in an uptrend and can be a help in assessing future changes in the market.

List some forms of data input

Semi direct data input - Such as paper documents & plastic cards Direct data input - such as automatic data input and manual data input

Describe How Objects Are Connected in BPMN

Sequence Flow defines the sequence of processing within a pool. Message Flow defines the exchange of information between pools. Associations assign data, information and resources to elements. Data associations model the flow of information within a pool.

Define Transport Layer Security & give examples

Serves as a basis for other protocols, such as HTTP to HTTPS. Formerly called Secure Sockets Layer (SSL). Enables encrypted and secure communication over the Internet. Prevents the interception of a connection and the manipulation of transmitted data. However, encryption alone is not sufficient for secure communication, e.g. e-banking! In addition to encryption, the identity of the communication partner must be secured. In addition to encryption, TLS can ensure that the remote site is the legitimate domain owner.

Define Information System

Sociotechincal (man-machine) systems compromising human and mechanical components (subsystems) which are used in particular for the fulfillment of tasks and for the optimal provision of information, coordination, and communication according to economic criteria.

Define SAAS

Software as a Service, also known as cloud application services, represent the most commonly utilized option for businesses in the cloud market. SaaS utilizes the internet to deliver applications to its users, which are managed by a third-party vendor. A majority of SaaS applications are run directly through the web browser, and do not require any downloads or installations on the client side.

Which components does a software product consists of

Software as a product (Software Product) consists of: 1. Software = digital, immaterial good 2. Medium and documentation 3. Services/warranty, installation, support, maintenance, training

What are the advantages of using individualized software vs standard software

Software functionality can be specifically limited (no unnecessary functions) Specific requirements can be taken into account >> Tailor-made solution Low risk of competitors using the same software Possibly less training (users have contributed to the concept, company terminology is used) No dependence on the strategy and economic situation of the standard software manufacturer For in-house development: Special knowledge for further development exists within the company specific change and extension requests of the users can usually be implemented quickly

What are question categories for SW selection

Software in general - Program, user guidance, data management, manuals, demo version, etc. Individual questions (requirements) of the specific discipline (users of the new software) Structure of master data, design of forms, interfaces to other programs, etc. Hardware, system software - Minimum requirements, recommendations, expansion options, installation by provider, etc. Care, support - Distance to provider, remote maintenance, scope of regular adjustments, training costs, etc. Expense -Purchase price, rental model, maintenance costs, etc. Drafting of contracts and references - Number of contractual partners, installation dates, deadlines for remedying defects, rights of withdrawal, etc.

Define Web Browser

Software to access and see web pages Communicates with the web server: Calls for a web page via the HTTP protocol. Shows the answer to the user. The functionality of web browsers increased during the last years due to further developments: Playing videos, supporting video conferences, 3D graphics etc. Examples for software products: Mozilla Firefox, Google Chrome, Apple Safari, Microsoft Internet Explorer.

What are the tasks of IS Planning

Tasks of IS Planning - 1. Observation and evaluation of IT developments and IT trends 2. Design of the IT architecture -> Enterprise Architecture 3. Control and promotion of IT acceptance

Define HTTP

The HTTP (Hypertext Transfer Protocol) is the most important service on the Internet. It is the protocol for the transmission of web pages and their content elements (e.g. pictures) from a web server to a web client (browser) via the Internet. Most important application area: transfer of hypertext files, described in HTML. Basis of the WWW, together with the URL and HTML. Usually, the connection is disconnected after every transfer. Exceptions are sessions on the application layer which are set up when the user logs in to a web site.

Define Application Layer - OSI Model

The Internet protocols used in layers 5 to 7 of the OSI model are called services (includes session, presentation, and application). Examples: World Wide Web: Hypertext Transfer Protocol (HTTP) E-Mail: Simple Mail Transfer Protocol (SMTP) • Domain names: Domain Name System (DNS) Protocols on layers 5 to 7 are identified via ports. Port addresses of your own PC: • MacOSor Linux: /etc/services • Windows: C:\Windows\System32\drivers\etc\services

Describe Data Query in SQL

The SQL SELECT statement is used to fetch the data from a database table which returns this data in the form of a result table. These result tables are called result-sets. This basically pecifies which attributes should be displayed and how they should be processed in calculations and functions. If DISTINCT is used, duplicate, identical data records are displayed only once.

Describe Data Manipulation in SQL

The SQL commands that deals with the manipulation of data present in database belong to DML or Data Manipulation Language and this includes most of the SQL statements. Examples of DML: SELECT - is used to retrieve data from the a database. INSERT - is used to insert data into a table. UPDATE - is used to update existing data within a table. DELETE - is used to delete records from a database table.

Define Top Level Domain

The Top Level Domain (TLD) of a domain name can be used to identify the organisation or the region in which the organisation is settled. Standard types of TLDs are, e.g.: .com = commercial .org = organization

Define URL

The Uniform Resource Locator is the address of a single document on a web server.

The approach to the development of the executive information systems is based on...

The approach to the development of the executive information systems is based on the system development life cycle.

Define Quantum Computing

The area of study focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level

Recursive Relationship Types With 1:n Cardinality

The hierarchical leadership structure in an organisation is usually a 1:n relationship, 1 employee leads many employees. In the relation «Employees», the secondary key «SuperiorNo» refers to the primary key «ENo» in the same relation. Short form of the relation: Employees (ENo, Name, Firstname, SuperiorNo)

The higher the number of the normal form...

The higher the degree of normalization is and the less redundancy exists.

What Makes SQL 'Declaritive' and not 'Procedural'

The individual program steps, which are needed to create the result (HOW) do not have to be specified; only the result itself has to be specified (WHAT).

What are some drawbacks of Normalization

The information contained therein is redundancy-free from a practical point of view. However, this does not always apply to the global database of an organization! A generalized, extended database may prove inefficient and user-unfriendly in practical implementation: As increasing degree of normalization increases, the number of relations increases. Complex and extensive queries can be the result. In practice, certain redundancies are therefore accepted, and data-based applications then need to have program functions in order to maintain data consistency!

Moores Law

The number of electronic components on a chip tends to double every 18-24 months. is has become known as Moore's Law. The reason is that making chips smaller and faster requires increasingly more expensive design and production, o setting much of the savings from smaller components. Why are smaller transistors good? Smaller transistors can be closer together. at reduces the time for electronic signals to travel from one transistor to another, allowing a device to be faster. Smaller transistors also consume less power and generate less heat. With more transistors on a chip, that chip can perform more activities in parallel, thus completing an overall job faster.

Define Management Support Systems

The totality of all systems and tools to support management is covered by the generic term Management Support System (MSS). Tools designed to support management activities are called Executive Support Systems (ESS). They can be further subdivided into: - Executive Information Systems (EIS) provide information relevant to management processes in a timely and appropriate manner. Decision Support Systems (DSS) support planning, decision-making and control processes.

Why Cloud Computing?

The trend is leaning towards using the same data with different devices (Complex synchronization of the data between individual devices; Requirement for a central synchronization platform with interfaces for all devices) Cloud computing makes it possible to make hardware and software resources available dynamically adapted to the individual needs of a user. The technically defined interfaces are provided via the internet-based infrastructure offered by a provider. The aim is to outsource functions and processes to a third party, which is equivalent to IT outsourcing.

What are the 4 Characteristics of Data in a Data Warehouse

Themed: The organization of the data is oriented to analytical questions (e.g. regarding customers, suppliers, products, markets). Unified: Applies especially to the data formats Resistant: Data in the data warehouse is non-volatile, that is, it can no longer be changed by the operational system. Time-related: The time as reference value is explicitly recorded by a time stamp.

Why would a company develop individual software

There is no standard software available on the market that covers the specific requirements. Strategic reasons, e.g. gaining a competitive advantage through special software. Individual programming is cheaper than the introduction of standard software, e.g. in end-user computing.

Define Communication Protocols

These are agreements on the organizational process of data transmission, agreements about the structure, the monitoring (including error messages) and the disconnection of connections, and specifications of the used data formats and commands (structure of the data)

Define Decision Structure

This refers to whether a computer could be programmed to carry out a decision. This is applied to the 3 steps of decision making (intelligence, design, and choice). Decision is structured, semistructured, or unstructured. Many fully structured decisions are carried out by computers. Less structured decisions require human judgement

Describe ACID Properties of Transaction Processing

To avoid problems with large scale transaction processing, IS must ensure transactions have these four properties: 1. Atomicity: Transaction is processed as a unit. If any part can't be processed, none is processed. 2. Consistency: one valid state to another 3. Isolation: One transaction is isolated from processing all other transactions 4. Durability: A transaction that is not reversed remains in the database indefinitely Ensuring ACID requires complex software. Transaction processing is used at the lower levels of the organization

What are three fundamental concepts of the Web (1.0)

Uniform, universal access: Every page on the Web has a uniform resource locator (URL). http:// tells the Internet to use HyperText Transfer Protocol (HTTP) to send this page. This is the standard protocol for Web pages. Other Internet uses, such as email or le transfer, use other protocols. If you see https:// the site encodes data for privacy. Hyperlinks: Wherever you go on the Web, you find clickable text or images. When you point to one, the pointer turns into a pointing hand. Click and you are on a different page. Discovery: Web developers have always been concerned with finding useful content. We use search engines such as Bing or Google for discovery.

Define application software

User-oriented computer programs that deal with user related problems or tasks. Such as MS Word, MS Excel, ERP software, mobile apps. These can be small programs like the ones that monitor hashtags to large ones that coordinate production schedules. Application SW produces results that are of direct value to the organization that uses them.

Define Virtualization, what is its goal, and list some advantages

Virtualization is a process of grouping or sharing resources. The goal is to provide an abstract, logical view of physical resources that conceals the actual facts. In general, the use of virtualization technologies has the following advantages: Better utilization of IT systems; Consolidation of hardware (server, mass storage); Saving of space (computer center area); Increased reliability; Lower energy consumption.

When can we make model driven decisions

We can make a model-driven decision when a decision has enough structure that we can take data we have and infer something about the likely outcome of each choice.

Describe ORDER BY in SQL

With ORDER BY, the resulting data records can be sorted in ascending (ASC for «ascending» (default value)) or descending (DESC for «descending») order.

Define von Neumann Machine and give its theoretical design

first stored-program computer. Earlier computers, such as the ENIAC, were hard-wired to do one task. If the computer had to perform a different task, it had to be rewired, which was a tedious process. With a stored-program computer, a general purpose computer could be built to run different programs. The theoretical design consists of: 1. A central processor consisting of a control unit and an arithmetic/logic und2. A memory unit (RAM and CPU make up electronics subsystem) 3. Mass storage 4. Input and output The von Neumann design thus forms the basis of modern computing


Ensembles d'études connexes

Connect Chapter 6 - Smartbook Study Guide

View Set

Chapter 42: Gas Exchange & Circulation

View Set

i-Ready Kindergarten High Frequency Words lessons in phrases to study

View Set

IC3 Lesson 7: Security and Maintenance

View Set

TestOut Linux Pro Practice Questions (Ch. 1-4)

View Set