Information Systems Management
Multi-core Processor
A chip with multiple, independents, CPUs
Operating System Software Utility Software Application Software
3 Software Categories
Input, output, process and storage
4 basic operations in the computer's information processing cycle:
Dumb Client
A ____ terminal is for input and output, while a ______ can also process instructions
Transaction Processing
A _______ _________ System is a computer system that tracks transactions required to run a business. Highly structured, with predefined rules, provides critical information to other departments and systems within the organization.
Analytical
A data warehouse is considered an _______ database
Denial of Service or DOS attack
A loss of access created by cut cables or power services, malware, hoaxes, bots and botnets, smurf attacks, XYN floods, DNS poisoning or outright hijacking or redirecting of services.
Vertical Market Software
A payroll system is an example of : (specific purpose software)
Software
A set of machine readable instructions that direct a computer.
Database
A set or collection of data that is centrally located in electronic format, organized in tables and easily searchable.
Sales and Marketing Production and Operations
The four major business functions provided by information systems include : Accounting and Finance, Human Resource, _____ __ ______, __________ _____ _________
Open-source
______ _______ software is software whose source-code is freely available to developers and users.
Intranet, Extranet
______ means internal. _______ means external.
Proprietary software
_______ ______ is software where source code development and access is controlled by the developer and typically requires users to purchase a license prior to use.
Open Source
_______ __________ software is free and available to anyone who wants it. Available for viewing and modifying of the source code. Also compatible with many types of hardware
Tuples
_______ are ordered lists of values and are used for grouping and organizing data. _______ can be used to represent related data that belong together, such as student records, and are used in database relational models.
TCP/IP
_______, which defines how data are relayed between networks, is the Internet standard.
Bluetooth
_________ is a benefit to business because it is wireless, allows for easier communication, and is very easy to configure.
Simulation
__________ software simulates actual systems and is typically used for training, entertainment, or research.
EIS (Executive Information Systems) summarized
___________ __________ ___________ are a specific class of DSS that support the strategic decision-making process of top-level executives. These systems incorporate ____________ information from decision support systems and management information systems, along with external factors to forecast and analyze trends.
Organizational knowledge
____________ _____________ is the result of people using systems to generate, manage, and use information to achieve organizational goals.
Application
_____________ software is a set of one or more programs that allows a computer user to perform a group of coordinated activities, functions, or tasks.
Personalization and Marketing
a key e-commerce process that tracks individual customers and creates profiles to adjusts to unique customer needs
Horizontal
applications are more popular and general purpose, such as word processing software.
Server
Manages network resources and services
System
(UML) - is a general-purpose modeling language designed to provide a standard method to represent the design of a ______
relevance stakeholders solutions
3 Critical Issues of ISM (Information Systems Management) 1. Conveying the _________ and value of IT to the rest of the organization. 2. Managing critical relationships between the IT unit and key internal and external ____________. 3. The actual implementation of effective IT ____________.
WBS (work breakdown structure)
A ____ is a broken down list of all deliverables showing what the customer will get at the end of a project.
change
A ______ agent identifies positive improvements and helps train and motivate users.
Analysis Mining
A data warehouse is a collection of business data from multiple systems used for data ________ and _______.
server
A database _____ is a powerful computer that stores the databases and DBMS to access and administer the database.
Microcomputers
A small computer that contains a microprocessor as its central processor. Lower IT costs, user flexibility and computer power, replaced mainframes
Microprocessor
An integrated circuit responsible for a computer's instruction cycle
Input Components
Keyboard, Mouse, Microphone, etc.
Scema
The complete definition of a database, including the tables, records, fields, and relationships.
IT infrastructure, security, E-business and integration
The four primary information technology areas of focus
Crow's Foot
The name of the notation used to diagram the relationship between entities
Enterprise resource planning (ERP)
__________ ____________ ____________ systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. (Ex : Quickbooks)
first normal form (1NF)
A table is in ____ _____ ______ if there is no repeating group or data.
LAN (Local area network)
A type of computer network that connects computer systems of an organization or the floor of a building.
WAN (Wide Area Network)
A type of computer network that typically connects smaller networks creating larger networks. Connected through wifi.
Major reasons a firm would invest in information systems
Achieve operational excellence. Develop new products and services. Attain customer intimacy and service. Improve decision making. Promote competitive advantage. Ensure long-term survival. Develop strong relationships with suppliers.
Third Normal Form (3NF)
All fields in a table depend on the key and nothing but the key. This table is in _______ ________ __________
operational
An _________ database is an online transaction processing database (OLTP) and can be used to gather real-time transactional or operational data.
Vertical
An accounting software application is a ________ application because it is designed for a specific function, department, or industry.
Relational
An entity-relationship model is the basic tool when designing a ________ database.
Executive Information System
An example of an ________ __________ _________ is a digital dashboard, which displays charts and graphs showing up-to-the-moment performance indicators on sales, profit, expenses, and inventory on an executive's computer.
VoIP
Audio or video calls
Velocity
Big data has three characteristics: large volume, variety, and _______
business
COBOL stands for Common Business Oriented Language and was the first computer software language for ___________ applications.
Six hardware categories
CPU (hardware), Primary Storage, Secondary Storage, Input Devices, Output Devices, Communication Devices
LAN
Connecting devices within the same building
Bluetooth
Connecting personal devices within one room
Bus
Connection and data transfer between the computer components. The _________ bus connects motherboard components to the computer, to the CPU.
Bus
Connection and data transfer between the computer's motherboard and CPU are the internal ___.
Domain Name System
Converts domain names to IP addresses
Marketing
Customer Relationship Management beings with _____ to earn customers.
transformation
Data _________ is frequently the most complicated part of the ETL process in terms of processing time. Before data ____________ can occur, the raw data must become accessible for the database. During the _________ step in ETL, the data is cleansed and encoded to ensure data quality.
intelligence
Data mining, predictive analytics, and online analytic processing are all components of business _______
Future
Decision Support systems (DSS) are most concerned with understanding how business decisions will impact the ________.
Copyright
Designed to secure creative expressions
DMCA
Digital Music Copyright Act
4 EDMT EIS, DSS, MIS, TPS
Each type of computer based information system is used for different types of decision making and by a different group of employees or managers. There are __ types. From highest to slowest, what is the abbreviation?
Timeliness, Accuracy, Completeness, Consistency, Uniqueness
Five common characteristics of high quality information, ranked in order of importance.
Examples of storage technologies
Flash drives, hard drives and magnetic disks
Production and Operations
Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance
Bargaining Power of Suppliers
Gas prices fluctuate based on the price of oil, and oil suppliers have almost total control of their bargaining power. Americans are concerned about the extent that consumers rely on gasoline to power their cars, trucks and planes. There is a lot of competition in the marketplace to find a gasoline alternative that is cost effective and easy to distribute as widely as gasoline currently is.
information technology
Hardware, software, data, and networks make up ___________ __________
Broadband
Has enabled data, voice and video to be combined and transmitted over a network through a process known as convergence.
Threat of Substitute Products or Services
If there are lots of choices for consumers for a product, then this threat is high. For example, consumers can buy e-books instead of hard copies of a book and digitized music instead of CDs. These options are usually cheaper, and the quality is high.
Domain Name URL IP Address HTTP
If you want to visit the Barnes & Noble website, you will type the _____ _____ of barnesandnoble.com in the ____ of your web browser. The DNS will convert barnesandnoble.com into ___ _________ and you will use the _______ protocol to communicate with the world wide web.
second normal form (2NF)
In a table, all nonprimary key fields must be dependent on the primary key. A table is in ____ _____ _____ when this has occurred.
Primary and secondary
In computer science, in what two classes is storage composed.
3,7
In system analysis there are __ phases and __ stages
Data Information
Information systems accept ____ as input and process it into ____ as output.
Peripherals
Input and output devices
Structured Decisions
Line level managers and nonmanagement employees typically make _____ _______
Harddrive
Long term storage in a computer.
Malware
Malicious software applications, utilities are merely code, which could be a virus, Trojan horse, worm or spyware.
Accounting and Finance
Managing financial assets and maintaining financial records
MAN
Metropolitan Area Network - The middle ground network coverage
Application
Microsoft Office is an _________ suite that includes the Excel and Word application software.
Semi-structured
Middle managers more commonly make _____ decisions
Output Components
Monitor screens, speakers, printers
Backplane
Motherboard and _______ are used synonymously
TPS (Transaction Processing Systems)
One of the earliest types of IS, developed to decrease costs, decrease processing time, and increase accuracy.
End Users
People are the most important component of an information system (IS) and their requirements are the primary reason IS are developed. Typically, ____ _____ are the people who directly interact with the IS on a regular basis (e.g., daily) and use the information produced to get their work done.
Marketing and Sales
Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization
Human Resources
Recruiting, training, and maintaining employees and their records
partitioning
Relational data warehouses benefit from ____________ (backing up) the data as part of implementation and maintenance.
Objects
Reports are ____ in database.
Data Warehouse
Repositories of data from several sources that are primarily used for reporting and for analysis in order to increase business intelligence and improve business decision making.
SOX Act (Formed in 2002)
Requires organizations to adhere to rules and procedures to ensure the accuracy, integrity and security of financial information that leads to the creation and storage of financial statements.
Management Information Systems (MIS)
Run by lower management employees. A category of information systems that support lower management employees.
Decision Support Systems (DSS)
Run by middle management employees. Uses information from both the transaction processing systems and the management information systems.
Transaction Processing Systems (TPS)
Run by non-managerial employees. Used to collect, store, update and retrieve transaction data within an organization.
Project Management
Scope, time, cost, quality and risk are the five major variables in _____ _______
Unstructured
Senior management frequently makes ______ decisions
Random Access Memory (RAM)
Temporary or short-term storage used by the processor.
Horizontal
The IS function is _________ in structure and its success depends on its cooperation and relationship with the other functions in an organization.
7
The Systems Development Life Cycle (SDLC) consist of __ stages
load
The _____ phase in the ETL process is the actual transfer of the new data to update the data warehouse.
Sniffing
The act of intercepting network traffic.
Moore's Law transistors
The number of __________ in an integrated circuit doubles every two years
Telecommunications
The process of exchanging information between various entities over electrical, electromagnetic or digital networks. (Wireless)
Normalization
The process of removing redundancy in conceptual model in a database.
planning, analysis, design, implementation, maintenance and technology
The seven stage of system analysis
Threat of New Entrants
The threat of new competitors is high when there are few barriers to prevent competitors from entering a business. The Web has removed many of the costly barriers for business startup because a new business does not have to have a physical store front.
Analysis, Design, Implementation
The three phases in system analysis
People, Technology
The two primary lines for defense are through ___ first and ___ second.
Political Microtargeting
The use by political parties and election campaigns of direct marketing datamining techniques that involve predictive market segmentation (aka cluster analysis).
People, Processes, networks, data, hardware, software
There are six components of a computer based information system needed to implement important business tasks. List them.
TPS (Transaction Processing Systems)
This IS automates and records routine business transactions that are too tedious and monotonous for front-line employees to process manually in an effective and efficient manner.
DSS ( Decision-Support System) Upper
This IS focuses on supporting all phases of specific decision-making processes and procedures for arriving at a solution. While MIS are generally applied to structured problems at the organizational level, ___ are often developed to handle unstructured problems at all levels (i.e., single user, group, or organization). Middle to _____ level managers.
MIS (Management Information Systems)
This IS provides information that guides managers with tactical decisions and predictions for future business performance. What-if scenarios are used to create decision-making process simulations to assist with potential changes in the short-to-medium term business direction (i.e., 1 to 2 years), which is the focus of mid-level management.
MIS (Management Information Systems) Lower
This IS provides performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data. Servers _____ to middle managers.
TPS (Transaction Processing Systems)
This type of information system collects, stores, updates and retrieves transaction data within an organization. It is ran by non-managerial employees and handles operational decisions.
Information Processing Analytic Processing Data Mining
Three main types of data warehouse applications
Authentication and authorization Prevention and Resistance Detection and Response
Three primary areas for security
Growth Product Differentiation
Two types of business strategies include _________ and ____________ ________________
Utility
Type of software that performs periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, etc.
Customer Relationship Management Systems (CRM)
Use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.
Router
Used to link computers so they can share resources and information
HTTP
Web browser downloading pages from a server
Intranet
When a company provides limited access to certain components of their internal network of suppliers to monitor inventory levels and quality issues.
Bargaining Power of Customers (Buyers)
When consumers have many options of where to buy a product this threat is high. Some businesses will implement customer loyalty rewards to encourage a buyer to continue using their products.
Intensity of Competitive Rivalry
When there are many competitors in an industry, this threat is high. If a product is proprietary, belonging to a single organization, then this threat is low.
network-based strategy
When three businesses work together as a cohesive team on projects and also pass business to each other, the businesses have created a ______________-_________ ___________ among themselves
Radio
Wireless communication is transmitted over ______ waves.
WAP
Wireless network security is improving because of the new security protocol called ___
Big
___ data is used to describe large, complex data sets.
RAM
___ get instructions from ROM to launch the operating system during bootup
(Integrated Development Environment) IDE
___ is a programming environment that provides tools to developers to write code.
MIS DSS
___ typically replace the decision maker by making automatic decisions. In contrast, ___ support the entire decision-making process, but the actual decision is ultimately made by a human.
DSS
___ use information from both the transaction processing systems and the management information system, along with external factors such as stockholders requirements, regulations, product pricing, and competition. Examples of decisions that might be made at this level are "What types of products should our company be making in five years?" and "Which shipping method should we use to maximize profit and maintain our current customer service?"
Scrum
____ is an incremental form of agile software development that recognizes that customer needs and wants can change throughout the project.
OLAP Decision
____ stands for online analytical processing and are databases used to assist ______ making.
Data mining
______ _____ is the process of analyzing data to gain insight or intelligence.
Relational Object
______ and ______ databases are two types of database models.
ENIAC UNIVAC
______ is considered the first electronic, digital computer and was called "Great Brain" by the press; the ________was the first general purpose computer for commercial use.
Velocity
______ is the speed required to process or analyze big data.
Extraction
________ is the operation of removing data from a source for use in a data warehouse. (First in ETL)
Horizontal
_________ partitioning restricts the rows to replicate in a back up process.
Customer relationship management (CRM)
__________ ______________ ________________ systems use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.
Partitioning
__________ means dividing the database into more manageable parts.
Referential integrity
____________ _______________ establishes relationships between objects in different tables.
Strategic information systems
_____________ ________________ ___________ use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage.