MIS 101 - Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Domain names

- A worldwide, unique name affiliated with a public IP address. - Affiliation of domain names with IP addresses is dynamic. - Multiple domain names for same IP address. - Owner of domain name can change affiliated IP addresses at its discretion

What are the 3 primary activities in the BI process?

- Acquire data - Perform analysis - Publish results

Revenue models for social media

- Advertising - Pay-per-click - Freemium: free for basic service, pay for upgrades - Sales

What is net neutrality?

- All users and content providers treated equally. - No "fast" or "slow" lanes. - ISPs not allowed to block, or slow, content associated with competitors. - ISPs can't charge heavy Internet users additional fees or taxes.

Elastic

- Automatically adjusts for unpredictable demand - Limits financial risks

How do organizations use business intelligence (BI) systems?

- BI systems are information systems that process operational and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. - Five standard IS components are present in BI systems: hardware, software, data, procedures, and people. - The boundaries of BI systems are blurry.

Common SM strategic goals

- Brand awareness - Conversion rates - Website traffic - User engagement

How do SMIS increase social capital?

- Capital: investment of resources for future profit Types of business capital: - physical capital: produce goods and services - human capital: human knowledge and skills investments - social capital: social relations with expectation of marketplace returns

The Cloud: 2026?

- Cloud services faster, more secure, easier to use, cheaper. - Fewer organizations own their computing infrastructure. - More pooling of servers across organizations. - Overall size of the cloud gets bigger. - Individuals, small businesses, large organizations obtain elastic resources at very low cost. - Cloud fosters new categories of work.

How do organizations use reporting application?

- Create meaningful information from disparate data sources. - Deliver information to user on time. - Basic operations: 1. Sorting 2. Filtering 3. Grouping 4. Calculating 5. Formatting

What is the Cloud?

- Elastic leasing of pooled computer resources via Internet. Organizations are moving their computing infrastructure to the cloud. Leasing computing infrastructure from the cloud will become common practice.

How do organizations develop an effective SMIS?

- Focus on being cost leader or on product differentiation - Industry-wide or segment focus - Premeditated alignment of SMIS with organization's strategy

How do (some) companies earn revenue from social media?

- Hyper-social organization: transform interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities. - You are the product: renting your attention to an advertiser. - Monetize

How do enterprise systems eliminate the problem of information silos?

- Integrate into single database. - Revise applications. - Allow isolation, manage to avoid problems.

Carriers and Net Neutrality

- Messages broken into packets. - Packets move across Internet, passing through networks owned by telecom carriers. - Peering agreements: - carriers freely exchange traffic amongst themselves without paying access fees. - Net Neutrality principle: - all data treated equally - problem: some people use more bandwidth than others

Public IP addresses

- Most common IP addresses format is IPv4. - ICANN administers system for assigning names to IP addresses.

SMIS: 2026?

- New devices with innovative mobile-device UX, coupled with dynamic and agile information systems based on cloud computing and dynamic virtualization. - BYOD policy: Organization the endoskeleton, supporting the work of people on the exterior. Employees craft own relationships with their employers. - Non-routine cognitive skills more important.

What Network technology supports the Cloud?

- Personal Area Network (PAN) - devices connected around a single person - Local Area Network (LAN) - computers connected at a single physical site - Wide Area Network (WAN) - computers connected between two or more separated sites - The Internet and internets - networks of networks

Pooled

- Same physical hardware - Economies of scale

Enterprise 2.0: McAffee's SLATES model

- Search - Links - Authoring - Tags - Extensions - Signals

What is an enterprise social network (ESN)?

- Software platform uses SM to facilitate cooperative work of people within an organization. - Improve communication, collaboration, knowledge sharing, problem solving, and decision making.

Managing the risk of inappropriate content

- User-generated content (UGC) - Problems from external sources - Monitor by employees or use outsource service

How can organizations use Cloud services securely?

- VPN technology uses public Internet to create appearance of a private connection on secure network. - Virtual means something that appears to exist but, in fact, does not.

What are the challenges of implementing and upgrading enterprise information systems?

- collaborative management - requirement gaps - transition problems - employee resistance - new technology Implementation is challenging, difficult, expensive, and risky. It is not unusual for enterprise system projects to be well over budget and a year or more late.

In-House Pros

- control of data location - in-depth visibility of security and disaster preparedness

The Cloud Cons

- dependency on vendor - loss of control over data location - little visibility into true security and disaster preparedness capabilities

What are the elements of an ERP system?

- hardware - ERP application programs - ERP databases - business process procedures - training and consulting

In-House Cons

- significant capital required - significant development effort - annual maintenance costs - ongoing support costs - staff and train personnel - increased management requirements - difficult (impossible?) to accommodate fluctuating demand - cost uncertainties - obsolescence

The Cloud Pros

- small capital requirements - speedy development - superior flexibility and adaptability to growing fluctuating demand - known cost structure - possibly best-of-breed security/disaster preparedness - no obsolescence - industry-wide economies of scale, hence cheaper

Content Delivery Networks (CDN) from Cloud Vendors

- stores user data in many different geographical locations and makes data available on demand - minimizes latency - used to store and deliver content seldom changed

What is a 3-tier Web Architecture?

1. User Tier - consists of computers, phones, other devices with browsers that request and process Web pages. 2. Server Tier - consists of computers running Web servers and application programs 3. Database Tier - consists of computers running a DBMS that processes SQL requests to retrieve and store data.

ABC Inc. is one of the customers of a well-known linen manufacturing company. ABC has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax is most likely to have an RFM score of ________.

511

Is employee monitoring legal?

92% of employers monitor employees' email, telephone, and Internet use. - Key loggers - Log files - Packet sniffers - Text mining First Amendment - Preserves free speech regarding laws Congress may enact, limited protection for federal employees. - Does not protect you at work.

What does a URL consist of?

A protocol (like http://) followed by a domain name or public IP address.

What is the value of social capital?

Adds value in 4 ways: 1. information 2. influence 3. social credentials 4. personal reinforcement

What is BI?

An umbrella term that combines architectures, tools, databases, applications, and methodologies to transform data, to information (and knowledge), to decisions, and finally to action

Commerce server

Application program that runs on server-tier computer. Receives requests from users via Web server, takes some action, and returns a response to users. Typical commerce server functions are to obtain product data from a database, manage items in a shopping cart, and coordinate checkout process.

How do CRM, ERP, and EAI support enterprise processes?

Business Process Reengineering (BPR): - Integrated data, enterprise systems create stronger, faster, more effective linkages in value chains. - Difficult, slow, exceedingly expensive. - Key personnel determine how best to use new technology. - Requires high-level and expensive skills and considerable time.

________ is the activity of altering existing and designing new business processes to take advantage of new information systems.

Business process reengineering

What are the basic types of processes?

Business process with 3 activities: - check inventory - check customer credit - approve social terms

What is RFM analysis?

Considers how recently (R) a customer has ordered, how frequently (F) a customer ordered, and how much money (M) the customer has spent. To produce an RFM score, a program sorts customer purchase records by date of most recent (R) purchase, divides sorts into quintiles, and gives customers a score of 1 to 5. Process is repeated for Frequently and Money.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data acquisition

When an organization has inconsistent duplicated data, it is said to have a(n) ________.

Data integrity problem

How can organizations address SMIS security concerns?

Develop and publicize social media policy - delineate employees' rights and responsibilities

Problematic operational data is termed as ________.

Dirty data

Intel's rules of social media engagement

Disclose Protect Use common sense

Information silos

Exists when data are isolated in separated information systems. Information system silos arise when: - IS supports departmental processes rather than enterprise-level processes. - Personal and workgroup support applications are created over time. - Organizations grow, especially by merger and acquisitions.

What are Expert Systems?

Expert systems are rule-based systems that encode human knowledge as If/Then rules. Expert system shells - programs that process a set of rules.

Business Intelligence Systems: 2026?

Exponentially more information about customers, better data mining techniques. Companies buy and sell your purchasing habits and psyche. Singularity - Computer systems adapt and create their own software without human assistance. - Machines will possess and create information for themselves. - Will we know what the machines will know?

Both structured processes and dynamic processes are formally defined processes. True or False?

False

Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data. True or False?

False

Data warehouses do not include data that is purchased from outside sources.

False

Unlike humans, organizations do not have social capital. True or False?

False

A data mart is larger than a data warehouse.

False.

Social media (SM) communities differ from communities in the past because SM communities are ________.

Formed based on mutual interests

How do organizations use data warehouses to acquire data?

Functions of a data warehouse: - obtain data from operational, internal, and external databases - cleanse data - organize and relate data - catalog data using metadata

What are the 5 components of SMIS?

Hardware Software Data Procedures People

How does the Cloud work?

Hotel reservation example: - Assume you send a message to a server in New Zealand hotel. Message is too big to travel in one piece, so it's broken into packets and each packet passes along from WAN to WAN until it reaches destination. Once all packets arrive, message reconstructed, delivered to server for processing. All accomplished by computers and data communications devices that most likely have not interacted before. - Hop is movement from one network to another.

How do organizations use Big Data applications?

Huge volume - petabyte and larger. Rapid velocity - generated rapidly. Great variety: - Structured data, free-form text, log files, graphics, audio, and video.

Gateway function of connecting LAN to the Internet

ISP receives the communications from your computer and passes them on to the Internet, and receives communications from the Internet and passes them to you.

How can your network connect to the Internet?

Important ISP functions: 1. Provide legitimate Internet access 2. Provide gateway to Internet 3. Pay access fees and other charges to telecoms

Which of the following conditions exists when data are isolated in separated information systems?

Information silo

The primary purpose of an ERP system is ________.

Integration

What is a data mart?

Is a subset of a data warehouse. A data mart addresses a particular component or functional area of the business.

Which of the following is a function of an Internet service provider?

It serves as a user's gateway to the internet

What is the role of knowledge management systems?

Knowledge Management (KM) - Creating value from intellectual capital and sharing knowledge with those who need that capital. Preserving organizational memory - Capturing and storing lessons learned and best practices of key employees. Scope of KM same as SM in hyper-social organizations.

What are communication protocols?

LAN Protocol: IEEE 802.3 - wired LAN, Ethernet IEEE 802.11 - wireless LAN, speeds up to 1.3 Gbps Bluetooth - transmits data short distances.

Which of the following is a social media (SM) application provider?

LinkedIn

JSON (JavaScript Object Notation)

Markup language used for transmitting documents. Contains little metadata. Preferred for transmitting volumes of data between servers and browsers. While notation in format of JavaScript objects, JSON documents can be processed by any language.

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.

Mart

Compared to in-house hosting, cloud-based hosting ________.

Minimizes the risk of investing in technology that will soon become obsolete

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

Network

Which of the following is a characteristic of cloud-based hosting?

No obsolescence

Hadoop

Open-source program Manages thousands of computers

How do organizations use the cloud?

Organizations can use the cloud in several different ways. By far most popular, is to obtain cloud services from cloud service vendors.

How do inter-enterprise IS solve problems of enterprise silos?

PRIDE system: a distributed system because processing is distributed across multiple computing devices. Standards such as http, https, html5, CSS3, JavaScript, and others enable programs on varied and disparate devices to flexibly communicate with cloud servers and database, and indirectly communicate with each other.

Cloud resources are ________ because many different organizations use the same physical hardware.

Pooled

How can information systems improve process quality?

Process efficiency: - Ratio of outputs to inputs. Process effectiveness: - How well a process achieves organizational strategy. How can processes be improved? - Change process structure. - Change process resources. - Change both. Performing an activity. - Partially automated, completely automated. Augmenting human performing activity. - Ex: Common reservation system. Controlling data quality. - Ensure data complete and correct before continuing process activities.

A ________ is a set of rules that programs on two communicating devices follow.

Protocol

SOAP

Protocol for requesting Web services and for sending responses to Web service requests.

Internet Addressing

Public IP addresses: - identifies a unique device on Internet - assigned by ICANN Private IP addresses: - identifies a device on a private network, usually a LAN. - assignment LAN controlled

FCC Approved New Regulations (2015)

Renders Internet a utility. Complaint: Interfering with free markets. ISPs argue loss of potential revenue stream inhibits infrastructure development, limits growth, and stifles innovation. Larger war on net neutrality may have only just begun!

What is SOA?

Service-oriented architecture is a software development model for distributed application components that incorporates discovery, access control, data mapping and security features.

________ is the investment in social relations with the expectation of returns in the marketplace.

Social capital

________ is the use of information technology to support the sharing of content among networks of users.

Social media

What is a social media information system (SMIS)?

Social media (SM) - IT for sharing content among network of users - enables communities of practice Social media information system (SMIS) - sharing content among network of users

3 SMIS roles

Social media providers Users Communities

WSDL (Web Services Description Language)

Standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service.

How do SMIS advance organizational strategy?

Strategy determines value chains - value chains determine business processes - processes determine SMIS requirements How do value chains determine dynamic processes? - dynamic process flows cannot be designed or diagrammed SM fundamentally changes balance of power among users, communities, and organizations

________ are formally defined, standardized processes that involve day-to-day operations.

Structured processes

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

TCP/IP

MapReduce Processing Summary

Technique for harnessing power of thousands of computers working in parallel

What is the purpose of the transport and internet layers?

These protocols manage traffic as it passes across an internet/Internet. Most important protocol layer is TCP.

What is Unsupervised data mining?

Unsupervised: - No a priori hypothesis or model. - Findings obtained solely by data analysis. - Hypothesized model created to explain patterns found. - Example: Cluster analysis. Cluster analysis: Statistical technique to identify groups of entities with similar characteristics; used to find groups of similar customers from customer order and demographic data

XML (eXtensible Markup Language)

Used for transmitting documents. Contains metadata to validate format and completeness of a document, includes considerable overhead.

What is Supervised data mining?

Uses a priori model. Prediction, such as regression analysis. Ex: CellPhoneWeekendMinutes - Predict number of minutes of weekend cell phone use.


Ensembles d'études connexes

PrepU Chapter 3: Values, Ethics, and Legal Issues

View Set

Chapter 28: Developmental and Genetic Influences on Child Health Promotion

View Set

SAFe 4 Advanced Scrum Master (4.5) PRACTICE TEAM (70% Passing)

View Set

L01 - Introduction to Macroeconomics

View Set

MGT 472 Chapter 15, multiple choice

View Set