Information Systems Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Multi-core Processor

A chip with multiple, independents, CPUs

Operating System Software Utility Software Application Software

3 Software Categories

Input, output, process and storage

4 basic operations in the computer's information processing cycle:

Dumb Client

A ____ terminal is for input and output, while a ______ can also process instructions

Transaction Processing

A _______ _________ System is a computer system that tracks transactions required to run a business. Highly structured, with predefined rules, provides critical information to other departments and systems within the organization.

Analytical

A data warehouse is considered an _______ database

Denial of Service or DOS attack

A loss of access created by cut cables or power services, malware, hoaxes, bots and botnets, smurf attacks, XYN floods, DNS poisoning or outright hijacking or redirecting of services.

Vertical Market Software

A payroll system is an example of : (specific purpose software)

Software

A set of machine readable instructions that direct a computer.

Database

A set or collection of data that is centrally located in electronic format, organized in tables and easily searchable.

Sales and Marketing Production and Operations

The four major business functions provided by information systems include : Accounting and Finance, Human Resource, _____ __ ______, __________ _____ _________

Open-source

______ _______ software is software whose source-code is freely available to developers and users.

Intranet, Extranet

______ means internal. _______ means external.

Proprietary software

_______ ______ is software where source code development and access is controlled by the developer and typically requires users to purchase a license prior to use.

Open Source

_______ __________ software is free and available to anyone who wants it. Available for viewing and modifying of the source code. Also compatible with many types of hardware

Tuples

_______ are ordered lists of values and are used for grouping and organizing data. _______ can be used to represent related data that belong together, such as student records, and are used in database relational models.

TCP/IP

_______, which defines how data are relayed between networks, is the Internet standard.

Bluetooth

_________ is a benefit to business because it is wireless, allows for easier communication, and is very easy to configure.

Simulation

__________ software simulates actual systems and is typically used for training, entertainment, or research.

EIS (Executive Information Systems) summarized

___________ __________ ___________ are a specific class of DSS that support the strategic decision-making process of top-level executives. These systems incorporate ____________ information from decision support systems and management information systems, along with external factors to forecast and analyze trends.

Organizational knowledge

____________ _____________ is the result of people using systems to generate, manage, and use information to achieve organizational goals.

Application

_____________ software is a set of one or more programs that allows a computer user to perform a group of coordinated activities, functions, or tasks.

Personalization and Marketing

a key e-commerce process that tracks individual customers and creates profiles to adjusts to unique customer needs

Horizontal

applications are more popular and general purpose, such as word processing software.

Server

Manages network resources and services

System

(UML) - is a general-purpose modeling language designed to provide a standard method to represent the design of a ______

relevance stakeholders solutions

3 Critical Issues of ISM (Information Systems Management) 1. Conveying the _________ and value of IT to the rest of the organization. 2. Managing critical relationships between the IT unit and key internal and external ____________. 3. The actual implementation of effective IT ____________.

WBS (work breakdown structure)

A ____ is a broken down list of all deliverables showing what the customer will get at the end of a project.

change

A ______ agent identifies positive improvements and helps train and motivate users.

Analysis Mining

A data warehouse is a collection of business data from multiple systems used for data ________ and _______.

server

A database _____ is a powerful computer that stores the databases and DBMS to access and administer the database.

Microcomputers

A small computer that contains a microprocessor as its central processor. Lower IT costs, user flexibility and computer power, replaced mainframes

Microprocessor

An integrated circuit responsible for a computer's instruction cycle

Input Components

Keyboard, Mouse, Microphone, etc.

Scema

The complete definition of a database, including the tables, records, fields, and relationships.

IT infrastructure, security, E-business and integration

The four primary information technology areas of focus

Crow's Foot

The name of the notation used to diagram the relationship between entities

Enterprise resource planning (ERP)

__________ ____________ ____________ systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. (Ex : Quickbooks)

first normal form (1NF)

A table is in ____ _____ ______ if there is no repeating group or data.

LAN (Local area network)

A type of computer network that connects computer systems of an organization or the floor of a building.

WAN (Wide Area Network)

A type of computer network that typically connects smaller networks creating larger networks. Connected through wifi.

Major reasons a firm would invest in information systems

Achieve operational excellence. Develop new products and services. Attain customer intimacy and service. Improve decision making. Promote competitive advantage. Ensure long-term survival. Develop strong relationships with suppliers.

Third Normal Form (3NF)

All fields in a table depend on the key and nothing but the key. This table is in _______ ________ __________

operational

An _________ database is an online transaction processing database (OLTP) and can be used to gather real-time transactional or operational data.

Vertical

An accounting software application is a ________ application because it is designed for a specific function, department, or industry.

Relational

An entity-relationship model is the basic tool when designing a ________ database.

Executive Information System

An example of an ________ __________ _________ is a digital dashboard, which displays charts and graphs showing up-to-the-moment performance indicators on sales, profit, expenses, and inventory on an executive's computer.

VoIP

Audio or video calls

Velocity

Big data has three characteristics: large volume, variety, and _______

business

COBOL stands for Common Business Oriented Language and was the first computer software language for ___________ applications.

Six hardware categories

CPU (hardware), Primary Storage, Secondary Storage, Input Devices, Output Devices, Communication Devices

LAN

Connecting devices within the same building

Bluetooth

Connecting personal devices within one room

Bus

Connection and data transfer between the computer components. The _________ bus connects motherboard components to the computer, to the CPU.

Bus

Connection and data transfer between the computer's motherboard and CPU are the internal ___.

Domain Name System

Converts domain names to IP addresses

Marketing

Customer Relationship Management beings with _____ to earn customers.

transformation

Data _________ is frequently the most complicated part of the ETL process in terms of processing time. Before data ____________ can occur, the raw data must become accessible for the database. During the _________ step in ETL, the data is cleansed and encoded to ensure data quality.

intelligence

Data mining, predictive analytics, and online analytic processing are all components of business _______

Future

Decision Support systems (DSS) are most concerned with understanding how business decisions will impact the ________.

Copyright

Designed to secure creative expressions

DMCA

Digital Music Copyright Act

4 EDMT EIS, DSS, MIS, TPS

Each type of computer based information system is used for different types of decision making and by a different group of employees or managers. There are __ types. From highest to slowest, what is the abbreviation?

Timeliness, Accuracy, Completeness, Consistency, Uniqueness

Five common characteristics of high quality information, ranked in order of importance.

Examples of storage technologies

Flash drives, hard drives and magnetic disks

Production and Operations

Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance

Bargaining Power of Suppliers

Gas prices fluctuate based on the price of oil, and oil suppliers have almost total control of their bargaining power. Americans are concerned about the extent that consumers rely on gasoline to power their cars, trucks and planes. There is a lot of competition in the marketplace to find a gasoline alternative that is cost effective and easy to distribute as widely as gasoline currently is.

information technology

Hardware, software, data, and networks make up ___________ __________

Broadband

Has enabled data, voice and video to be combined and transmitted over a network through a process known as convergence.

Threat of Substitute Products or Services

If there are lots of choices for consumers for a product, then this threat is high. For example, consumers can buy e-books instead of hard copies of a book and digitized music instead of CDs. These options are usually cheaper, and the quality is high.

Domain Name URL IP Address HTTP

If you want to visit the Barnes & Noble website, you will type the _____ _____ of barnesandnoble.com in the ____ of your web browser. The DNS will convert barnesandnoble.com into ___ _________ and you will use the _______ protocol to communicate with the world wide web.

second normal form (2NF)

In a table, all nonprimary key fields must be dependent on the primary key. A table is in ____ _____ _____ when this has occurred.

Primary and secondary

In computer science, in what two classes is storage composed.

3,7

In system analysis there are __ phases and __ stages

Data Information

Information systems accept ____ as input and process it into ____ as output.

Peripherals

Input and output devices

Structured Decisions

Line level managers and nonmanagement employees typically make _____ _______

Harddrive

Long term storage in a computer.

Malware

Malicious software applications, utilities are merely code, which could be a virus, Trojan horse, worm or spyware.

Accounting and Finance

Managing financial assets and maintaining financial records

MAN

Metropolitan Area Network - The middle ground network coverage

Application

Microsoft Office is an _________ suite that includes the Excel and Word application software.

Semi-structured

Middle managers more commonly make _____ decisions

Output Components

Monitor screens, speakers, printers

Backplane

Motherboard and _______ are used synonymously

TPS (Transaction Processing Systems)

One of the earliest types of IS, developed to decrease costs, decrease processing time, and increase accuracy.

End Users

People are the most important component of an information system (IS) and their requirements are the primary reason IS are developed. Typically, ____ _____ are the people who directly interact with the IS on a regular basis (e.g., daily) and use the information produced to get their work done.

Marketing and Sales

Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization

Human Resources

Recruiting, training, and maintaining employees and their records

partitioning

Relational data warehouses benefit from ____________ (backing up) the data as part of implementation and maintenance.

Objects

Reports are ____ in database.

Data Warehouse

Repositories of data from several sources that are primarily used for reporting and for analysis in order to increase business intelligence and improve business decision making.

SOX Act (Formed in 2002)

Requires organizations to adhere to rules and procedures to ensure the accuracy, integrity and security of financial information that leads to the creation and storage of financial statements.

Management Information Systems (MIS)

Run by lower management employees. A category of information systems that support lower management employees.

Decision Support Systems (DSS)

Run by middle management employees. Uses information from both the transaction processing systems and the management information systems.

Transaction Processing Systems (TPS)

Run by non-managerial employees. Used to collect, store, update and retrieve transaction data within an organization.

Project Management

Scope, time, cost, quality and risk are the five major variables in _____ _______

Unstructured

Senior management frequently makes ______ decisions

Random Access Memory (RAM)

Temporary or short-term storage used by the processor.

Horizontal

The IS function is _________ in structure and its success depends on its cooperation and relationship with the other functions in an organization.

7

The Systems Development Life Cycle (SDLC) consist of __ stages

load

The _____ phase in the ETL process is the actual transfer of the new data to update the data warehouse.

Sniffing

The act of intercepting network traffic.

Moore's Law transistors

The number of __________ in an integrated circuit doubles every two years

Telecommunications

The process of exchanging information between various entities over electrical, electromagnetic or digital networks. (Wireless)

Normalization

The process of removing redundancy in conceptual model in a database.

planning, analysis, design, implementation, maintenance and technology

The seven stage of system analysis

Threat of New Entrants

The threat of new competitors is high when there are few barriers to prevent competitors from entering a business. The Web has removed many of the costly barriers for business startup because a new business does not have to have a physical store front.

Analysis, Design, Implementation

The three phases in system analysis

People, Technology

The two primary lines for defense are through ___ first and ___ second.

Political Microtargeting

The use by political parties and election campaigns of direct marketing datamining techniques that involve predictive market segmentation (aka cluster analysis).

People, Processes, networks, data, hardware, software

There are six components of a computer based information system needed to implement important business tasks. List them.

TPS (Transaction Processing Systems)

This IS automates and records routine business transactions that are too tedious and monotonous for front-line employees to process manually in an effective and efficient manner.

DSS ( Decision-Support System) Upper

This IS focuses on supporting all phases of specific decision-making processes and procedures for arriving at a solution. While MIS are generally applied to structured problems at the organizational level, ___ are often developed to handle unstructured problems at all levels (i.e., single user, group, or organization). Middle to _____ level managers.

MIS (Management Information Systems)

This IS provides information that guides managers with tactical decisions and predictions for future business performance. What-if scenarios are used to create decision-making process simulations to assist with potential changes in the short-to-medium term business direction (i.e., 1 to 2 years), which is the focus of mid-level management.

MIS (Management Information Systems) Lower

This IS provides performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data. Servers _____ to middle managers.

TPS (Transaction Processing Systems)

This type of information system collects, stores, updates and retrieves transaction data within an organization. It is ran by non-managerial employees and handles operational decisions.

Information Processing Analytic Processing Data Mining

Three main types of data warehouse applications

Authentication and authorization Prevention and Resistance Detection and Response

Three primary areas for security

Growth Product Differentiation

Two types of business strategies include _________ and ____________ ________________

Utility

Type of software that performs periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, etc.

Customer Relationship Management Systems (CRM)

Use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.

Router

Used to link computers so they can share resources and information

HTTP

Web browser downloading pages from a server

Intranet

When a company provides limited access to certain components of their internal network of suppliers to monitor inventory levels and quality issues.

Bargaining Power of Customers (Buyers)

When consumers have many options of where to buy a product this threat is high. Some businesses will implement customer loyalty rewards to encourage a buyer to continue using their products.

Intensity of Competitive Rivalry

When there are many competitors in an industry, this threat is high. If a product is proprietary, belonging to a single organization, then this threat is low.

network-based strategy

When three businesses work together as a cohesive team on projects and also pass business to each other, the businesses have created a ______________-_________ ___________ among themselves

Radio

Wireless communication is transmitted over ______ waves.

WAP

Wireless network security is improving because of the new security protocol called ___

Big

___ data is used to describe large, complex data sets.

RAM

___ get instructions from ROM to launch the operating system during bootup

(Integrated Development Environment) IDE

___ is a programming environment that provides tools to developers to write code.

MIS DSS

___ typically replace the decision maker by making automatic decisions. In contrast, ___ support the entire decision-making process, but the actual decision is ultimately made by a human.

DSS

___ use information from both the transaction processing systems and the management information system, along with external factors such as stockholders requirements, regulations, product pricing, and competition. Examples of decisions that might be made at this level are "What types of products should our company be making in five years?" and "Which shipping method should we use to maximize profit and maintain our current customer service?"

Scrum

____ is an incremental form of agile software development that recognizes that customer needs and wants can change throughout the project.

OLAP Decision

____ stands for online analytical processing and are databases used to assist ______ making.

Data mining

______ _____ is the process of analyzing data to gain insight or intelligence.

Relational Object

______ and ______ databases are two types of database models.

ENIAC UNIVAC

______ is considered the first electronic, digital computer and was called "Great Brain" by the press; the ________was the first general purpose computer for commercial use.

Velocity

______ is the speed required to process or analyze big data.

Extraction

________ is the operation of removing data from a source for use in a data warehouse. (First in ETL)

Horizontal

_________ partitioning restricts the rows to replicate in a back up process.

Customer relationship management (CRM)

__________ ______________ ________________ systems use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.

Partitioning

__________ means dividing the database into more manageable parts.

Referential integrity

____________ _______________ establishes relationships between objects in different tables.

Strategic information systems

_____________ ________________ ___________ use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage.


Ensembles d'études connexes

Capítulo # 6 Anatomía y fisiología general

View Set

CAE Book 3 Test 4 Transformations

View Set

Эмбриональное развитие

View Set

Module 10- 13 Preparation Quizzes- Hanna

View Set

Krueger, Explorations in Economics 1e, Module 1

View Set