INFO 311 Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

management information systems MIS

...

project management software

...

Microsoft Solutions Framework

A Microsoft appraoch to systems development. The object is to define and analuze business requirements and provide IT solutions

mission statement

A document or statement that describes the company for its stakeholders and briefly states the company's overall purpose, products, services, and values

computer-resources committee

A group of key managers and users responsible for evaluating systems requests.

systems review committee

A group of key managers and users responsible for evaluating systems requests. The term computer resources committee is also used

Gantt chart

A horizontal bar chart that illustrates a schedule. Designed as a production control technique

total cost of ownership TCO

A number used in assessing costs, which includes ongoing support and maintenance costs, as well as acquisition costs

quality assurance QA

A process or procedure for minimizing errors and ensuring quality in products. Poor quality can result from inaccurate requirements, design problems, coding errors, faulty documentation, and ineffective testing.

technical feasibility

A project or request of an organization has the resources to develop or purchase, install, and operate the system

critical path

A series of events and activities with no slack time. If any activity along the critical path falls behind schedule, the entire project schedule is similarly delayed. Includes all activities that are vital to the project schedule

operational feasibility

A system that will be used effectively after it has been developed

dependent task

A task that has to be completed in a serial sequence

rapid application development RAD

A team-based technique that speeds up information systems development and produces a functioning information system.

waterfall method

A type of graph that depicts the result of each SDLC phase flowing down into the next phase

fishbone diagram

Also called a Ishikawa diagram. It is an analysis tool that represents the possible causes of a problem as a graphical outline

XY chart

Also called a scatter diagram, a tool used by system analysts to graphically show the correlation between two variables.

scatter diagram

Also called an XY chart, a tool used by system analysts to graphically show the correlation between two variables

network administration

An IT function that includes hardware and software maintenance, support, and security. In addition to controlling user access, they install, configure, manage, monitor, and maintain network applications.

feasibility study

An initial investigation to clearly identify the nature and the scope of tghe business opportunity or problem

Brooks' Law

An interesting concept where adding man power to a late software project only makes it later

activity

Any work that has a beginning and an end, and requires the use of company resources including people, time, and/or money.

Pareto chart

Drawn as a vertical bar graph. The bars, which represent various causes of a problem, are arranged in descending order, so the team can focus on the most important causes

systems support and security phase

IT staff maintains, enhances, and protects the system

task pattern

In any project, large or small, tasks depend on each other and must be performed in a sequence, not unlike the commands in a software program.

SWOT analysis

It examines a companies strengths, weaknesses, opportunities, and threats

concurrent tasks

It tasks can be completed at the same time they are said to be concurrent, or parallel

CASE tools

Powerful software used in computer-aided systems engineering to help systems analysts develop and maintain information systems

nondiscretionary projects

Projects where no choice exists. An example of such a project is adding a report required by a new federal law.

inference rules

Rules that identify data patterns and relationships within a knowledge management system

critical thinking skills

The ability to compare, classify, evaluate, recognize patterns, analyze cause and effect, and apply logic. Such skills are valued in the IT industry.

slack time

The amount of time an event can be late without delaying a project. The difference between its latest completion time and earliest completion time

duration

The amount of time it will take to complete a task

just-in-time JIT

The exchange or delivery of information when and where it is needed.

systems implementation

The fourth phase of SDLC. During this phase the new system is constructed - programs are written, tested, and documented, and the system is installed

finish day/date

The time that a task is scheduled to be finished

network diagram

a PERT chart

task name

a brief descriptive name for a task, which does not have to be unique in the project.

help desk

a centralized resource staffed by IT professionals that provides users with the support they need to do their jobs. Three main objectives: show people how to use system resources more effectively, to provide answers to technical or operational questions, and to make users more productive by teaching them how to meet their own information needs

business-to-consumer

a commercial exchange between businesses and consumers conducted over the internet

business-to-business

a commercial exchange between businesses, typically enabled by the internet or electronic means

in-house applications

a company develops its own information systems

task box

a component of PERT/CPM chart that contains important scheduling and duration information about a task. Each task in a project is represented by its own task box

constraint

a condition that must satisfy or an outcome that the system must achieve

certification

a credential an individual earns by demonstrating a certain level of knowledge and skill on a standardized test

scalable

a design that can expand to meet new business requirements and volumes

system design specification

a document that presents the complete design for the new information system, along with detailed costs, staffing, and scheduling for completing the next SDLC phase, systems implementation

what-if

a feature of business support systems that allows analysis to define and account for a wide variety of issues (including issues not completely defined)

extensible markup language XML

a flexible data description language that allows Web-based communication between different hardware and software environments

user support

a function typically performed by individuals within an IT department. Provides users with technical information, training, and productivity support

knowledge base

a large database that allows users to find information by clicking menus, typing keywords, or entering text questions in normal phrases

task ID

a number or code that uniquely identifies a task

case for action

a part of the preliminary investigation report to management that summarizes project requests and makes specific recommendations

end product

a polished, deliverable product, suitable for its intended use

joint application development JAD

a popular systems development technique that uses a cross-matrixed task group of users, managers, and IT professionals that work together to gather information, discuss business needs, and define the new system requirements

Microsoft Project

a powerful, full featured program that holds the dominant share of the project management software market

risk response plan

a proactive effort to anticipate risk and describe an action plan to deal with it. An effective risk response plan can reduce the overall impact by triggering a timely and appropriate action

enterprise resource planning ERP

a process that establishes an enterprise-wide strategy for IT resources. Defines a specific architecture, including standards for data, processing, network, and user interface design

modeling

a process that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify

encryption

a process where data is coded so that only those with the required authorization can access the data

corporate culture

a set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing things

system

a set of related components that produces specific results

project scope

a specific determination of a project's boundaries or extent

business process

a specific set of transactions, events, and results that can be described and documented

System analysis and design

a step-by-step process for developing high-quality information systems.

electronic proof of delivery EPOD

a supplier uses RFID tags on each crate, case, or shipping unit to create a digital shipping list.

horizontal system

a system, such as an inventory or payroll application, that can be adapted for use in many different types of companies

computer-aided systems engineering CASE

a technique that uses powerful programs called CASE tools to provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysis and object-oriented analysis.

class

a term used in object oriented modeling to indicate a collection of similar objects

structured analysis

a traditional systems development technique that uses phases to plan, analyze, design, implement, and support an information system. Processes and data are treated as separate components

empowerment

a trend that places more responsibility and accountability throughout all levels of an organization

systems development life cycle SDLC

activities and functions that systems developers typically perform, regardless of how those activities and functions fit into a particular methodology. The model includes the following steps: 1. Systems planning 2. systems analysis 3. systems design 4. systems implementation 5. systems support and security

supplier relationship management SRM

allows online B2B interaction where buyers, sellers, distributors, and manufacturers can offer products, submit specifications, and transact business

process-centered

an analytic approach that describes processes that transform data into useful information

fuzzy logic

an approach used in knowledge management systems that allows logical inferences to be drawn from imprecise relationships

systems evaluation

an assessment conducted during the systems implementation phase to determine whether the system operates properly and if it costs and benefits are within expectations

business process reengineering BPR

an attempt by companies to simplify operations or reduce costs

prototype

an early, rapidly constructed working version of the proposed information system

risk

an event that could affect the project negatively

weight

an important value that managers add to estimates so they can be analyzed

preliminary investigation

an initial investigation to clearly identify the nature and scope of the business opportunity or problem

message

an object-oriented command that tells an object to perform a certain method

business profile

an overview of a company's mission, functions, organization, products, services, customers, suppliers, competitors, constraints, and future direction

BPMN

analysts apply computer-based modeling tools that use a standard language

bottom-up technique

analyzes a large. complex project as a series of individual tasks, called project tasks

task

any work that has a beginning and an end, and requires the use of company resources including people, time, and/or money.

predictive

because structured analysis is based on a detailed plan, similar to a blueprint for constructing a building

systems planning phase

begins with a formal request to IT department that describes problems or desired changes in an information system or business

intangible benefits

benefits that are difficult to measure in dollars. However, can be very important in the calculation of economic feasibility. An example might be a new Web site improves a company's image

tangible benefits

benefits that can be measured in dollars. Result from a decrease in expenses, an increase in revenues, or both.

work breakdown structure WBS

breaking a project down into a series of smaller tasks

properties

characteristics that objects inherit from their class or possess on their own

Information system

combines information technology, people, and data to support business requirements

service-oriented

companies included vendors, software developers, and service providers

enterprise applications

company-wide applications that include order processing systems, payroll systems, and company communications networks

brick-and-mortar

conduct business primarily from physical locations

data

consists of basic facts that are the system's raw material

hardware

consists of everything in the physical layer of the information system

application software

consists of programs that support day-to-day business functions and provide users with the information they require

system requirements document

contains the requirements for the new system, describes the alternatives that were considered, and makes a specific recommendation to management. It is the end product of the systems analysis phase

information

data that has been transformed into output that is valuable to users

methods

defines a specific tasks that an object must perform, describes what and how an object does something

processes

describe the task and business functions that users, managers, and IT staff members perform to achieve specific results

object-oriented O-O

describes an information system by identifying things called objects. An object represents a real person, place, event, or transaction. Popular approach that sees a system from the viewpoint of the objects themselves as they function and interact with the system

requirements model

describes business functions that an information system must support

data model

describes data structure and design

object model

describes objects, which combine data and processes. End product of object-oriented analysis

process model

describes the system logic and processes that programmers use to develop necessary code modules

vertical system

designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or a video chain

business rules

determine how a system handles data and produces useful information. Reflects the operational requirements of the business.

PERT/CPM

developed to manage very complex projects

biometric devices

devices that identify a person by a retina scan or by mapping a facial pattern

data flow diagram DFD

diagram that shows how the system stores, processes, and transforms data into useful information

successor task

each of the concurrent tasks of a predecessor task

task group

each tasks represents several activities

electronic data interchange EDI

electronic commerce between two companies using data sharing arrangement

qualitative risk analysis

evaluating risk by estimating the probability that it will occur and the degree of impact

quantitative risk analysis

evaluating risks in terms of the actual impact in terms of dollars, time, project scope, or quality

product-oriented

firms manufactured computers, routers, or microchips

BPM

graphically displays one or more business processes

project monitoring

guiding, supervising, and coordinating the project team's workload

project coordinator

handles administrative responsibilities for the development team and negotiates with users who might have conflicting requirements or want changes that would require additional time or expense

risk management plan

includes a review of the project's scope, stakeholders, budget, schedule, and any other internal or external factors that might affect the project. Should define project roles and responsibilities, risk management methods and procedures, categories of risks, and contingency plans

project planning

includes identifying project tasks and estimating completion time and costs

knowledge workers

includes professional staff members such as systems analysts, programmers, accountants, researchers, trainers, and human resource specialists

project reporting

includes regular progress reports to management, users, and the project team itself

enterprise computing

information systems that support company-wide data management requirements, such as airline reservation, or credit card billing systems

users

inside and outside of the company who will interact with the system

deployment team

installs and configures workstations

e-commerce

internet-based commerce

database administration

involves database design, management, security, backup, and user access, and is usually performed by members of the IT department

web support

involves design and construction of Web pages, monitoring traffic, managing hardware and software, and linking web-based applications to the company's existing information system

project scheduling

involves the creation of a specific timetable to facilitate completion of a project. Also involves selecting and staffing the project team and assigning specific tasks to team members

event

is a reference point that marks a major occurrence. Used to monitor progress and manage a project.

code review

is a review of other project team member's work by other members of the team to spot logic errors. Generally, the systems analysts review the work of other systems analysts, and programmers review the work of other programmers, as a form of peer review. Take place throughout the SDLC

economic feasibility

is achieved if the projected benefits of the proposed system outweigh the estimated costs involved in acquiring, installing, and operating it

technical support

is necessary to support the wide variety of IT systems and users

risk identification

listing each risk and assessing the likelihood that it could affect a project

system software

manages the hardware components, which can include a single workstation or a global network with many thousands of clients

schedule feasibility

means that a project can be implemented in an acceptable time frame

requirements modeling

modeling that is used in the systems planning phase of the SDLC. It involves fact-finding to describe the current system and identify the requirements for the new system. Interviews, surveys, observation, and sampling

Rational Unified Process RUP

offers a flexible, iterative process for managing software development projects that can minimize risk, ensure predictable results

predecessor task

often, two or more concurrent tasks depend on a single prior task

transaction processing TP

operational systems used to process day-to-day recurring business transactions, such as customer billing

stakeholders

people who have an interest in an information system

system analysts

plan, develop. and maintain information systems

interactive model

planning, analysis, and design tasks interact continuously to produce prototypes that can be tested and implemented

network model

portrays the design and protocols of telecommunications links

internet-dependent

primary business depends on the internet rather than a traditional business channel

groupware

programs that run on a company intranet that enable users to share data, collaborate on projects, and work in teams

Open Workbench

project management software is available as free software, complete with manuals and sample projects

discretionary project

projects where management has a choice in implementing them. For example, creating a new report for a user

business support systems

provide job related information support to users at all levels of a company

systems support and security

provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transactions processing systems, and corporate IT infrastructure

software packages

purchased systems from outside vendors

Information Technology

refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.

software

refers to the programs that control the hardware and produce the desired information or results

business case

refers to the reasons, or justifications, for a proposal

business process modeling

represent company operations and information needs

objects

represents a real person, place, event, or transaction

spiral model

represents a series of iterations, or revisions, based on user feedback

open-source software

software that is supported by a large group of users and developers

information center IF

supports users by training them on application software. user support specialists answer questions, troubleshoot problems, and serve as a clearinghouse for user problems and solutions

mission-critical system

system that is vital to a company's operations

agile methods

systems development methods that attempt to develop a system incrementally, by building a series of prototypes and constantly adjusting them to user requirements

customer relationship management CRM

systems that integrate all customer-related events and transactions including marketing, sales, and customer service activities

user productivity systems

systems that provide employees of all levels a wide array of tools to improve job performance. Examples include e-mail, word processing, graphics, and company intranets

expert systems

systems that simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied.

radio frequency identification RFID

technology uses high-frequency radio waves to track physical objects

person-days

the amount of work that one person can complete in one day

supply chain management SCM

the coordination, integration, and management of materials, information, and finances as they move from suppliers to customers, both within and between companies.

strategic plans

the long-range plans that define the corporate mission and goals. Typically defined by top management with input from all levels

probable-case estimate

the most likely outcome

best-case estimate

the most optimistic outcome

worst-case estimate

the most pesimistic outcome

Moore's Law

the number of transistors on an integrated circuit would double about every 24 months

project creep

the process by which projects with very general scope definitions expand gradually, without specific authorization

application development

the process of constructing the programs and code modules that are building blocks of an information system

risk management

the process of identifying, evaluating, tracking, and controlling risks to minimize their impact

project management

the process of planning, scheduling, monitoring, controlling, and reporting upon the development of an information system

systems analysis phase

the second SDLC phase, the purpose of this phase is to build a logical model for the new system

systems design phase

the third SDLC phase. The purpose is to create the blueprint for the new system that will satisfy all documented requirements, whether the system is being developed in-house or purchased as a package

start day/date

the time that a task is scheduled to begin

adaptive method

typically uses a spiral development model, which builds on a series of iterations

electronic product code EPC

uses RFID tags to identify and monitor the movement of each individual product, from the factory floor to the retail checkout counter

project manager

usually is a senior analyst or an IT department manager if the project is larger.

critical success factors

vital objectives that must be achieved for the enterprise to fulfill its mission

Critical Path Method CPM

was developed by a private industry and shows a project as a network diagram. The activities are shown as vectors, and the events are displayed geographically as nodes.


संबंधित स्टडी सेट्स

Chapter 12 Section 7 - Explore - Independence Day and Other Holidays Celebrated by Americans

View Set

FIN 605 - Chapter 1 - Role and Objective of Financial Management

View Set

Chapter 19 Documenting, Reporting, Conferring

View Set

1220 Exam 2 Card Set - Amber Folder All Combined

View Set

12 CEH: Evading IDS, Firewalls, and Honeypots

View Set